Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

  • Gareth Ayres
  • Rashid Mehmood
  • Keith Mitchell
  • Nicholas J. P. Race
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 16)


Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations.


Location-Awareness Security Privacy Visualisation Wireless Networks 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Location Awareness Trial, Janet UKGoogle Scholar
  2. 2.
    Bahl, P., Padmanabhan, V.N.: RADAR: an in-building RF-based user location and tracking system (2000)Google Scholar
  3. 3.
    Harter, A., et al.: The Anatomy of a Context-Aware Application. In: Proc. 5th Annual ACM/IEEE Int. Conf. on Mobile Computing and Networking (1999)Google Scholar
  4. 4.
    Want, R., et al.: The Active Badge Location System. ACM Transaction on Information Systems, 1992 (10), 91–102 (1992)Google Scholar
  5. 5.
    Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The Cricket location-support system. In: Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, Boston (2000)Google Scholar
  6. 6.
    Grlach, A., Heinemann, A., Terpstra, W.W.: Survey on location privacy in pervasive computing, in Privacy, Security and Trust within the Context of Pervasive Computing. The Kluwer International Series in Engineering and Computer Science. Kluwer Academic Publishers, Dordrecht (2004)Google Scholar
  7. 7.
    Hightower, J., Borriello, G.: A Survey and Taxonomy of Location Systems for Ubiquitous Computing, pp. 57–66 (2001)Google Scholar
  8. 8.
    González, M.C., Mehmood, R.: Experiences in Designing a UWB-based Indoor Localisation System. In: Eighth IASTED international conferences on Wireless and Optical Communications (WOC) 2008, Montreal, Canada. ACTA Press (2008)Google Scholar
  9. 9.
    Castro, P., et al.: A Probabilistic Room Location Service for Wireless Networked Environments. In: Proceedings of the 3rd international conference on Ubiquitous Computing. Springer, Atlanta (2001)Google Scholar
  10. 10.
    Jason Small, A.S., Seiwiorek, D.P.: Determining user location for context aware computing through the use of a wireless LAN infrastructure. ACM Mobile Networks and Applications 6 (2001)Google Scholar
  11. 11.
    Haeberlen, A., et al.: Practical robust localization over large-scale 802.11 wireless networks. In: Proceedings of the 10th annual international conference on Mobile computing and networking. ACM, Philadelphia (2004)Google Scholar
  12. 12.
    Youngjune, G., Jain, R., Kawahara, T.: Robust indoor location estimation of stationary and mobile users. In: INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies (2004)Google Scholar
  13. 13.
    John Krumm, J.C.P.: Minimizing Calibration Effort for an Indoor 802.11 Device Location Measurement System. Microsoft Research, MSR-TR-2003-82 (2003)Google Scholar
  14. 14.
    Koo, S.G.M., et al.: Location Discovery in Enterprise-based Wireless Networks: Implementation and Applications. In: Proceedings of the 2nd IEEE Workshop on Applications and Services in Wireless Networks (ASWN 2002), pp. 3–5 (2002)Google Scholar
  15. 15.
    Ferreres, A.I.G.T., Alvarez, B.R., Garnacho, A.R.: Guaranteeing the Authenticity of Location Information. IEEE Pervasive Computing 7(3), 72–80 (2008)CrossRefGoogle Scholar
  16. 16.
    Aura, T., Roe, M., Murdoch, S.J.: Securing network location awareness with authenticated DHCP. In: Security and Privacy in Communications Networks and the Workshops. SecureComm. (2007)Google Scholar
  17. 17.
    Garg, S., Kappes, M., Mani, M.: Wireless access server for quality of service and location based access control in 802.11 networks. In: Proceedings of Seventh International Symposium on Computers and Communications. ISCC 2002 (2002)Google Scholar
  18. 18.
    Anderson, R., Brown, I., Dowty, T., Inglesant, P., Heath, W., Sasse, A.: Database State. Joseph Rowntree Reform Trust (2009)Google Scholar
  19. 19.
    Gauardian, 25 Million Peoples Data Lost (2007)Google Scholar
  20. 20.
    Nations, U., Universal Declaration of Human Rights, General Assembly Resolution 217 A (III) (1948) Google Scholar
  21. 21.
    Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM (24), 84–88 (1981)Google Scholar
  22. 22.
    Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the 1st international conference on Mobile systems, applications and services. ACM, San Francisco (2003)Google Scholar
  23. 23.
    Beresford, A.R., Frank Stajano, U.o.C.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 10 (2003)Google Scholar
  24. 24.
    Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1), 26–33 (2005)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2009

Authors and Affiliations

  • Gareth Ayres
    • 1
  • Rashid Mehmood
    • 1
  • Keith Mitchell
    • 2
  • Nicholas J. P. Race
    • 2
  1. 1.Civil and Computational Engineering CentreSwasea UniversitySwanseaUK
  2. 2.Computing Department, InfoLab21Lancaster UniversityLancasterUSA

Personalised recommendations