A theoretical foundation for location secrecy

Sharing users' positional information is often required for high accuracy localization, which is a cornerstone for numerous wireless applications in commercial, military, and social sectors. This raises a concern of leaking positional information to adversaries during the localization process. This paper establishes a mathematical foundation for location secrecy. In particular, we determine the location secrecy metric (LSM) for a localization network in which an eavesdropper has a generic measurement capability. We obtain a simple and closed-form expression of the LSM for the case where the eavesdropper's measurement of a user's position is corrupted by a Gaussian noise. We further extend this result to a more general measurement model, and design location secrecy protection strategies based on the insights gained from our analysis. The performance of the proposed algorithms is verified through numerical simulation.

[1]  Kang G. Shin,et al.  Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.

[2]  Moe Z. Win,et al.  Network Navigation: Theory and Interpretation , 2012, IEEE Journal on Selected Areas in Communications.

[3]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.

[4]  Marco Gruteser,et al.  USENIX Association , 1992 .

[5]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[6]  Moe Z. Win,et al.  Fundamental Limits of Wideband Localization— Part II: Cooperative Networks , 2010, IEEE Transactions on Information Theory.

[7]  Lars Kulik,et al.  Location privacy and location-aware computing , 2006 .

[8]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[9]  Hui Xiong,et al.  Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.

[10]  G.B. Giannakis,et al.  Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks , 2005, IEEE Signal Processing Magazine.

[11]  Moe Z. Win,et al.  Fundamental Limits of Wideband Localization— Part I: A General Framework , 2010, IEEE Transactions on Information Theory.

[12]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[13]  Moe Z. Win,et al.  Network localization and navigation via cooperation , 2011, IEEE Communications Magazine.

[14]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.