Location privacy through secret sharing techniques

We present a novel architecture to protect the location and the identification of a mobile user. This architecture, called "share the secret - STS", simply divides the secret, i.e., the location of a user, and uses totally untrusted entities to distribute portions of this anonymous location information. STS avoids cryptography methods. As a lightweight scheme it can be applied to a network of nodes demonstrating low processing and computational power, such as the nodes of an ad-hoc network and sensors.

[1]  Dogan Kesdogan,et al.  Analysis of Security and Privacy in Mobile-IP , 1996 .

[2]  Bradford W. Parkinson,et al.  Development of Indoor Navigation System using Asynchronous Pseudolites , 2000 .

[3]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[4]  Roy H. Campbell,et al.  Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[5]  Gaetano Borriello,et al.  SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength , 2000 .

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Andy Hopper,et al.  The Anatomy of a Context-Aware Application , 2002, Wirel. Networks.

[8]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[9]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[10]  Dharma P. Agrawal,et al.  GPS: Location-Tracking Technology , 2002, Computer.

[11]  Stathes Hadjiefthymiades,et al.  Brokering Positioning Data From Heterogeneous Infrastructures , 2004, Wirel. Pers. Commun..

[12]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[13]  Jeff Magee,et al.  Security Considerations for a Distributed Location Service , 1998, Journal of Network and Systems Management.

[14]  M. Dennis Mickunas,et al.  Routing through the Mist : Design and Implementation , 2002 .

[15]  Tom Rodden,et al.  A lightweight approach to managing privacy in location-based services , 2002 .

[16]  Marco Gruteser,et al.  Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.

[17]  Peter Reichl,et al.  Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks , 1998, ESORICS.

[18]  Ted Kremenek,et al.  A Probabilistic Room Location Service for Wireless Networked Environments , 2001, UbiComp.

[19]  Dogan Kesdogan,et al.  Variable and scalable security: protection of location information in mobile IP , 1996, Proceedings of Vehicular Technology Conference - VTC.

[20]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[21]  A. Harter,et al.  The Anatomy of a ContextAware Application , 1999, MobiCom 1999.

[22]  Amitava Mukherjee,et al.  Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.

[23]  Andy Hopper,et al.  The Anatomy of a Context-Aware Application , 1999, Wirel. Networks.

[24]  Robert P. Minch,et al.  Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.