Enhancing wireless location privacy using silent period

The advance of ISM-band radio-based tracking systems (for example, wireless LAN-based tracking system) extends the application of location-based services (LBS), but it also threatens to allow the movement of users to be tracked when they are transmitting frames. Several protection methods based on periodic address updates have already been proposed. However, new correlation attacks, which utilize the correlation between the old and new addresses of the same node, can defeat current protection methods. To combat such attacks, we propose the concept of a silent period. A silent period is defined as a transition period between the use of new and old pseudonyms, when a node is not allowed to disclose either the old or the new address. Through analysis, we find that a silent period should contain a constant period and a variable period. The effect of the constant period is to mix the spatial relation between the node's disappearing points and emerging points. The variable period mixes the temporal relation between the node's disappearing times and emerging times. We evaluate the performance of the silent period through simulation. The results show that the silent period proposal significantly reduces the duration of time a node can be tracked continuously. There are still many open research problems before random address can be implemented to protect wireless location privacy, but silent period protocol is the first step to realizing it.

[1]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[2]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[3]  Marco Gruteser,et al.  Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.

[4]  Marco Gruteser,et al.  USENIX Association , 1992 .

[5]  Marco Gruteser,et al.  A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks , 2003, SPC.

[6]  Ismail Guvenc,et al.  Enhancements to RSS Based Indoor Tracking Systems Using Kalman Filters , 2003 .

[7]  Pekka Savola,et al.  RFC 3041 Considered Harmful , 2004 .

[8]  Gene Tsudik,et al.  Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[9]  K. Sezaki,et al.  Spatio-temporal addressing scheme for mobile ad hoc networks , 2004, 2004 IEEE Region 10 Conference TENCON 2004..

[10]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[11]  Thomas Narten,et al.  Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2001, RFC.

[12]  M. Hasegawa,et al.  Design and implementation of a Bluetooth signal strength based location sensing system , 2004, Proceedings. 2004 IEEE Radio and Wireless Conference (IEEE Cat. No.04TH8746).

[13]  Marco Gruteser,et al.  Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2005, Mob. Networks Appl..

[14]  Gabriel Montenegro,et al.  Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.