Abstract
Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Location Awareness Trial, Janet UK
Bahl, P., Padmanabhan, V.N.: RADAR: an in-building RF-based user location and tracking system (2000)
Harter, A., et al.: The Anatomy of a Context-Aware Application. In: Proc. 5th Annual ACM/IEEE Int. Conf. on Mobile Computing and Networking (1999)
Want, R., et al.: The Active Badge Location System. ACM Transaction on Information Systems, 1992 (10), 91–102 (1992)
Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The Cricket location-support system. In: Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, Boston (2000)
Grlach, A., Heinemann, A., Terpstra, W.W.: Survey on location privacy in pervasive computing, in Privacy, Security and Trust within the Context of Pervasive Computing. The Kluwer International Series in Engineering and Computer Science. Kluwer Academic Publishers, Dordrecht (2004)
Hightower, J., Borriello, G.: A Survey and Taxonomy of Location Systems for Ubiquitous Computing, pp. 57–66 (2001)
González, M.C., Mehmood, R.: Experiences in Designing a UWB-based Indoor Localisation System. In: Eighth IASTED international conferences on Wireless and Optical Communications (WOC) 2008, Montreal, Canada. ACTA Press (2008)
Castro, P., et al.: A Probabilistic Room Location Service for Wireless Networked Environments. In: Proceedings of the 3rd international conference on Ubiquitous Computing. Springer, Atlanta (2001)
Jason Small, A.S., Seiwiorek, D.P.: Determining user location for context aware computing through the use of a wireless LAN infrastructure. ACM Mobile Networks and Applications 6 (2001)
Haeberlen, A., et al.: Practical robust localization over large-scale 802.11 wireless networks. In: Proceedings of the 10th annual international conference on Mobile computing and networking. ACM, Philadelphia (2004)
Youngjune, G., Jain, R., Kawahara, T.: Robust indoor location estimation of stationary and mobile users. In: INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies (2004)
John Krumm, J.C.P.: Minimizing Calibration Effort for an Indoor 802.11 Device Location Measurement System. Microsoft Research, MSR-TR-2003-82 (2003)
Koo, S.G.M., et al.: Location Discovery in Enterprise-based Wireless Networks: Implementation and Applications. In: Proceedings of the 2nd IEEE Workshop on Applications and Services in Wireless Networks (ASWN 2002), pp. 3–5 (2002)
Ferreres, A.I.G.T., Alvarez, B.R., Garnacho, A.R.: Guaranteeing the Authenticity of Location Information. IEEE Pervasive Computing 7(3), 72–80 (2008)
Aura, T., Roe, M., Murdoch, S.J.: Securing network location awareness with authenticated DHCP. In: Security and Privacy in Communications Networks and the Workshops. SecureComm. (2007)
Garg, S., Kappes, M., Mani, M.: Wireless access server for quality of service and location based access control in 802.11 networks. In: Proceedings of Seventh International Symposium on Computers and Communications. ISCC 2002 (2002)
Anderson, R., Brown, I., Dowty, T., Inglesant, P., Heath, W., Sasse, A.: Database State. Joseph Rowntree Reform Trust (2009)
Gauardian, 25 Million Peoples Data Lost (2007)
Nations, U., Universal Declaration of Human Rights, General Assembly Resolution 217 A (III) (1948)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM (24), 84–88 (1981)
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the 1st international conference on Mobile systems, applications and services. ACM, San Francisco (2003)
Beresford, A.R., Frank Stajano, U.o.C.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 10 (2003)
Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1), 26–33 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ayres, G., Mehmood, R., Mitchell, K., Race, N.J.P. (2009). Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints. In: Mehmood, R., Cerqueira, E., Piesiewicz, R., Chlamtac, I. (eds) Communications Infrastructure. Systems and Applications in Europe. EuropeComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 16. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11284-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-11284-3_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11283-6
Online ISBN: 978-3-642-11284-3
eBook Packages: Computer ScienceComputer Science (R0)