Location Privacy in Pervasive Computing

As location-aware applications begin to track our movements in the name of convenience, how can we protect our privacy? This article introduces the mix zone-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity. It is based on frequently changing pseudonyms.

[1]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[2]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[3]  George Coulouris,et al.  Middleware Support for Context-Aware Multimedia Applications , 2001, DAIS.

[4]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[5]  Birgit Pfitzmann,et al.  Real-time mixes: a bandwidth-efficient anonymity protocol , 1998, IEEE J. Sel. Areas Commun..

[6]  J. Rubenfeld The Right of Privacy , 1989 .

[7]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[8]  Pete,et al.  SPIRIT : a Resource Database for Mobile , 1997 .

[9]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[10]  Andy Hopper,et al.  A new location technique for the active office , 1997, IEEE Wirel. Commun..

[11]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[12]  Ian W. Jackson Anonymous Addresses and Confidentiality of Location , 1996, Information Hiding.

[13]  J. Mcneff The global positioning system , 2002 .

[14]  L ChaumDavid Untraceable electronic mail, return addresses, and digital pseudonyms , 1981 .

[15]  I.A. Getting,et al.  Perspective/navigation-The Global Positioning System , 1993, IEEE Spectrum.

[16]  George Danezis,et al.  Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.