Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation

  • Leping Huang
  • Hiroshi Yamane
  • Kanta Matsuura
  • Kaoru Sezaki
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3934)


In a wireless communication network, it is possible to locate a user and track its trajectory based on its transmission, during communication with access points. This type of tracking leads to the breach of a user’s location privacy. Prior solutions to this problem enhances user’s location privacy at the expense of communication Quality of Service(QoS) degradation. In this paper, we propose silent cascade to enhance a user’ location privacy by trading users’ delay in silent cascade for anonymity. As a result, it avoids the problem of QoS degradation in prior solutions. Furthermore, we abstract silent cascade as a mix-network based formal model, and use this model to evaluate the performance of silent cascade. Study results prove the effectiveness of silent cascade under different types of QoS requirements. Besides, we also derive the optimal configuration of silent cascade to achieves target anonymity within minimum duration of time. and the theoretical upper bound of a silent cascade’s anonymity.


Mobile Station Silent Period Location Privacy Silent State Silent Ratio 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference (WCNC 2005), NL, U.S. (2005)Google Scholar
  2. 2.
    Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Towards modeling wireless location privacy. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, Springer, Heidelberg (2006)CrossRefGoogle Scholar
  3. 3.
    Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2, 46–55 (2003)CrossRefGoogle Scholar
  4. 4.
    ITU-T: Methods for subjective determination of transmission quality, p.800 (1996)Google Scholar
  5. 5.
    Diaz, C., Serjantov, A.: Generalising mixes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    3GPP: 1xev-dv evaluation methodology (v14), 3gpp2/tsg-c.r1002 (2003)Google Scholar
  9. 9.
    Castelluccia, C., Mutaf, P.: Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In: MobiSys 2005: Proceedings of the 3rd international conference on Mobile systems, applications, and services, pp. 51–64. ACM Press, New York (2005)Google Scholar
  10. 10.
    Beresford, A.R.: Location privacy in ubiquitous computing. PhD thesis, University of Cambridge (2005)Google Scholar
  11. 11.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of ACM MobiSys 2003, San Francisco, CA, USA, USENIX, pp. 31–42 (2003)Google Scholar
  12. 12.
    Gruteser, M., Hoh, B.: On the anonymity of periodic location samples. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, Springer, Heidelberg (2005)CrossRefGoogle Scholar
  13. 13.
    Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: First International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Leping Huang
    • 1
    • 2
  • Hiroshi Yamane
    • 2
  • Kanta Matsuura
    • 2
  • Kaoru Sezaki
    • 2
  1. 1.Nokia Research Center JapanTokyoJapan
  2. 2.University of TokyoTokyoJapan

Personalised recommendations