211 research outputs found

    A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems

    Get PDF
    Location fingerprinting is a technique employed when Global Positioning System (GPS) positioning breaks down within indoor environments. Since Location Service Providers (LSPs) would implicitly have access to such information, preserving user privacy has become a challenging issue in location estimation systems. This paper proposes a low-complexity k-anonymity approach for preserving the privacy of user location and trajectory, in which real location/trajectory data is hidden within k fake locations/trajectories held by the LSP, without degrading overall localization accuracy. To this end, three novel location privacy preserving methods and a trajectory privacy preserving algorithm are outlined. The fake trajectories are generated so as to exhibit characteristics of the user’s real trajectory. In the proposed method, no initial knowledge of the environment or location of the Access Points (APs) is required in order for the user to generate the fake location/trajectory. Moreover, the LSP is able to preserve privacy of the fingerprinting database from the users. The proposed approaches are evaluated in both simulation and experimental testing, with the proposed methods outperforming other well-known k-anonymity methods. The method further exhibits a lower implementation complexity and higher movement similarity (of up to 88%) between the real and fake trajectories

    Privacy in Indoor Positioning Systems: A Systematic Review

    Get PDF
    Ponència presentada a 10th International Conference on Localization and GNSS (ICL-GNSS), celebrada a Tampere (Finland) del 2 al 4 de juny de 2020This article presents a systematic review of privacy in indoor positioning systems. The selected 41 articles on location privacy preserving mechanisms employ non-inherently private methods such as encryption, k-anonymity, and differential privacy. The 15 identified mechanisms are categorized and summarized by where they are processed: on device, during transmission, or at a server. Trade-offs such as calculation speed, granularity, or complexity in set-up are identified for each mechanism. In 40% of the papers, some trade-offs are minimized by combining several methods into a hybrid solution. The combinations of mechanisms and their levels of offered privacy are suggested based on a series of user mobility cases

    PILOT : Practical Privacy-Preserving Indoor Localization Using OuTsourcing

    Get PDF
    In the last decade, we observed a constantly growing number of Location-Based Services (LBSs) used in indoor environments, such as for targeted advertising in shopping malls or finding nearby friends. Although privacy-preserving LBSs were addressed in the literature, there was a lack of attention to the problem of enhancing privacy of indoor localization, i.e., the process of obtaining the users' locations indoors and, thus, a prerequisite for any indoor LBS. In this work we present PILOT, the first practically efficient solution for Privacy-Preserving Indoor Localization (PPIL) that was obtained by a synergy of the research areas indoor localization and applied cryptography. We design, implement, and evaluate protocols for Wi-Fi fingerprint-based PPIL that rely on 4 different distance metrics. To save energy and network bandwidth for the mobile end devices in PPIL, we securely outsource the computations to two non-colluding semi-honest parties. Our solution mixes different secure two-party computation protocols and we design size-and depth-optimized circuits for PPIL. We construct efficient circuit building blocks that are of independent interest: Single Instruction Multiple Data (SIMD) capable oblivious access to an array with low circuit depth and selection of the k-Nearest Neighbors with small circuit size. Additionally, we reduce Received Signal Strength (RSS) values from 8 bits to 4 bits without any significant accuracy reduction. Our most efficient PPIL protocol is 553x faster than that of Li et al. (INFOCOM'14) and 500× faster than that of Ziegeldorf et al. (WiSec'14). Our implementation on commodity hardware has practical run-times of less than 1 second even for the most accurate distance metrics that we consider, and it can process more than half a million PPIL queries per day.Peer reviewe

    Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

    Get PDF

    Collaborative Indoor Positioning Systems: A Systematic Review

    Get PDF
    Research and development in Collaborative Indoor Positioning Systems (CIPSs) is growing steadily due to their potential to improve on the performance of their non-collaborative counterparts. In contrast to the outdoors scenario, where Global Navigation Satellite System is widely adopted, in (collaborative) indoor positioning systems a large variety of technologies, techniques, and methods is being used. Moreover, the diversity of evaluation procedures and scenarios hinders a direct comparison. This paper presents a systematic review that gives a general view of the current CIPSs. A total of 84 works, published between 2006 and 2020, have been identified. These articles were analyzed and classified according to the described system’s architecture, infrastructure, technologies, techniques, methods, and evaluation. The results indicate a growing interest in collaborative positioning, and the trend tend to be towards the use of distributed architectures and infrastructure-less systems. Moreover, the most used technologies to determine the collaborative positioning between users are wireless communication technologies (Wi-Fi, Ultra-WideBand, and Bluetooth). The predominant collaborative positioning techniques are Received Signal Strength Indication, Fingerprinting, and Time of Arrival/Flight, and the collaborative methods are particle filters, Belief Propagation, Extended Kalman Filter, and Least Squares. Simulations are used as the main evaluation procedure. On the basis of the analysis and results, several promising future research avenues and gaps in research were identified

    A Meta-Review of Indoor Positioning Systems

    Get PDF
    An accurate and reliable Indoor Positioning System (IPS) applicable to most indoor scenarios has been sought for many years. The number of technologies, techniques, and approaches in general used in IPS proposals is remarkable. Such diversity, coupled with the lack of strict and verifiable evaluations, leads to difficulties for appreciating the true value of most proposals. This paper provides a meta-review that performed a comprehensive compilation of 62 survey papers in the area of indoor positioning. The paper provides the reader with an introduction to IPS and the different technologies, techniques, and some methods commonly employed. The introduction is supported by consensus found in the selected surveys and referenced using them. Thus, the meta-review allows the reader to inspect the IPS current state at a glance and serve as a guide for the reader to easily find further details on each technology used in IPS. The analyses of the meta-review contributed with insights on the abundance and academic significance of published IPS proposals using the criterion of the number of citations. Moreover, 75 works are identified as relevant works in the research topic from a selection of about 4000 works cited in the analyzed surveys

    Crowding detection combining trace elements from heterogeneous wireless technologies

    Get PDF
    Non-invasive crowding detection in quasi-real-time is required for a number of use cases, such as for mitigating tourism overcrowding. The present goal is a low-cost crowding detection technique combining personal trace elements obtained from heterogeneous wireless technologies (4G, 3G, GSM, Wi- Fi and Bluetooth) supported by mobile devices carried by most people. This work proposes detection nodes containing Raspberry-Pi boards equipped with several off-the-shelf Software Defined Radio (SDR) dongles. Those nodes perform spectrum analysis on the bands corresponding to the aforementioned wireless technologies, based on several open source software components. The outcome of this edge computing, performed in each node, is integrated in a cloud server using a Long Range Wide Area Network (LoRaWAN), a recent technology developed for IoT applications. Our preliminary results show that is possible to determine the number of mobile devices in the vicinity of each node, by combining information from several wireless technologies, each with its own detection range and precision.info:eu-repo/semantics/acceptedVersio

    Indoor navigation systems based on data mining techniques in internet of things: a survey

    Full text link
    © 2018, Springer Science+Business Media, LLC, part of Springer Nature. Internet of Things (IoT) is turning into an essential part of daily life, and numerous IoT-based scenarios will be seen in future of modern cities ranging from small indoor situations to huge outdoor environments. In this era, navigation continues to be a crucial element in both outdoor and indoor environments, and many solutions have been provided in both cases. On the other side, recent smart objects have produced a substantial amount of various data which demands sophisticated data mining solutions to cope with them. This paper presents a detailed review of previous studies on using data mining techniques in indoor navigation systems for the loT scenarios. We aim to understand what type of navigation problems exist in different IoT scenarios with a focus on indoor environments and later on we investigate how data mining solutions can provide solutions on those challenges
    • …
    corecore