Enhancement to the Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems
Indoor location-based application and services based on Wi-Fi have serious problems in terms of privacy since attackers could track users by capturing their MAC addresses. Although several initiatives have been proposed by scientific community to properly address authentication by strongly preserving privacy, there are still improvements and steps that need to be developed as it is not clearly stated what would occur if a device is lost, stole or compromised. It has not been said how an affected user should proceed in such case. In this situation, this work provides an enhancement to a previous solution based on pseudo-certificates issued by third-party authorities for anonymous authentication of mobile devices. The proposed scheme provides privacy to users willing to remove a device that has been stolen or lost. The proposed system offers security while maintaining minimal cryptographic overhead.
KeywordsPrivacy Anonymous de-authentication Indoor positioning system IPS WLAN
The authors gratefully acknowledge the financial support provided by the Escuela Politécnica Nacional, for the development of the project PIJ-17-08 – “Diseño e Implementación de un Sistema de Parqueadero Inteligente”.
- 1.Farid, Z., Nordin, R., Ismail, M.: Recent advances in wireless indoor localization techniques and system. J. Comput. Netw. Commun. 2013 (2013)Google Scholar
- 3.Stojanović, D.H., Stojanović, N.M.: Indoor localization and tracking: Methods, technologies and research challenges. Facta Univ. Ser.: Autom. Control Robot. 13(1), 57–72 (2014)Google Scholar
- 5.Lohan, E.: User privacy risks and protection in WLAN-Based (2015)Google Scholar
- 6.Mendez, D., Papapanagiotou, I., Yang, B.: Internet of things: survey on security and privacy. Inf. Secur. J. Glob. Perspect. 1–16 (2017)Google Scholar
- 9.Shah, M.D., Gala, S.N.: Lightweight authentication protocol used in wireless sensor network. In: 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA) Lightweight, pp. 138–143 (2014)Google Scholar
- 10.Ziegeldorf, J.H., Viol, N., Henze, M., Wehrle, K.: POSTER : privacy-preserving indoor localization. In: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), Oxford, United Kingdom (2014)Google Scholar
- 12.Kim, S., Yoo, S.G., Kim, J.: Privacy protection mechanism for indoor positioning systems. Int. J. Appl. Eng. Res. 12(9), 1982–1986 (2017)Google Scholar
- 14.Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285–1292 (2012)Google Scholar
- 17.Fal Sadikin, M., Kyas, M.: IMAKA-Tate: secure and efficient privacy preserving for indoor positioning applications, vol. 5760, March 2016Google Scholar
- 18.Yang, Z., Järvinen, K.: The death and rebirth of privacy-preserving WiFi fingerprint localization with paillier encryption (full version). In: IEEE International Conference on Computer Communications 2018 (INFOCOM 2018), p. 21 (2018)Google Scholar
- 19.Järvinen, K., et al.: PILOT: practical privacy-preserving indoor localization using outsourcing. In: 4th IEEE European Symposium on Security and Privacy, p. 16 (2019)Google Scholar