Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations.

[1]  Marco Gruteser,et al.  USENIX Association , 1992 .

[2]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[3]  Rashid Mehmood,et al.  Experiences in designing a UWB-based indoor localisation system , 2008 .

[4]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[5]  Ted Kremenek,et al.  A Probabilistic Room Location Service for Wireless Networked Environments , 2001, UbiComp.

[6]  Andreas Haeberlen,et al.  Practical robust localization over large-scale 802.11 wireless networks , 2004, MobiCom '04.

[7]  Gaetano Borriello,et al.  A Survey and Taxonomy of Location Systems for Ubiquitous Computing , 2001 .

[8]  Sachin Garg,et al.  Wireless access server for quality of service and location based access control in 802.11 networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[9]  Arturo Ribagorda,et al.  Guaranteeing the Authenticity of Location Information , 2008, IEEE Pervasive Computing.

[10]  John Platt,et al.  Minimizing Calibration Effort for an Indoor 802.11 Device Location Measurement System , 2003 .

[11]  Andreas Heinemann,et al.  Survey on Location Privacy in Pervasive Computing , 2005 .

[12]  HopperAndy,et al.  The anatomy of a context-aware application , 2002 .

[13]  Toshiro Kawahara,et al.  Robust indoor location estimation of stationary and mobile users , 2004, IEEE INFOCOM 2004.

[14]  Daniel P. Siewiorek,et al.  Determining User Location For Context Aware Computing Through the Use of a Wireless LAN Infrastructure , 2000 .

[15]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[16]  Michael Roe,et al.  Securing network location awareness with authenticated DHCP , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[17]  Ross Anderson,et al.  Database State: A Report Commissioned by the Joseph Rowntree Reform Trust Ltd. , 2009 .

[18]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .

[19]  Catherine Rosenberg,et al.  Location Discovery in Enterprise-based Wireless Networks: Implementation and Applications , 2002 .

[20]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[21]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[22]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[23]  Andy Hopper,et al.  The Anatomy of a Context-Aware Application , 1999, Wirel. Networks.