41,854 research outputs found

    An Enhanced Communication Protocol for Location Privacy in WSN

    Get PDF
    Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing. WSN is used in many applications, such as object tracking and security monitoring. The objects in many situations need physical and location protection. In addition to the source location privacy, sink location privacy should be provided. Providing an efficient location privacy solution would be challenging due to the open nature of the WSN. Anonymity is a key solution for location privacy. We present a network model that is protected against local, multilocal, and global adversaries that can launch sophisticated passive and active attacks against the WSN.http://dx.doi.org/10.1155/2015/69709

    M-commerce: The Notion of Consumer Consent in Receiving Location-based Advertising

    Get PDF
    The development of location-based advertising, for all its convenience and usefulness, introduces new and heightened privacy risks for consumers that must be addressed. The portability of wireless devices and the ubiquity of their applications, coupled with an ability to pinpoint the location of wireless users and reveal it to others, could produce a system where the everyday activities and movements of these users are tracked and recorded. Wireless users would receive unanticipated advertising messages on their wireless device, commonly referred to as ‘‘wireless spam’’, generally considered a form of privacy violation. In order to obtain a valid consent from the wireless user, the service provider will have to make an effective disclosure that covers all of the tracking- and storage- related issues. Also, an analysis of the present laws, regula- tions and directives, as well as the specific nature of this type of service, may help determine what aspects the consent of the wireless user should cover in order to protect the user from receiving wireless spam. This paper is, therefore, meant to propose a solution, demonstrating how a service provider may obtain informed and meaningful consent from the wireless users prior to providing them with location-based adver- tising. Consent would also comply with the different laws and regulations regarding the protection of personal and location data as well as spam control

    Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    Get PDF
    Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.http://dx.doi.org/10.3390/s15030582

    Query Processing In Location-based Services

    Get PDF
    With the advances in wireless communication technology and advanced positioning systems, a variety of Location-Based Services (LBS) become available to the public. Mobile users can issue location-based queries to probe their surrounding environments. One important type of query in LBS is moving monitoring queries over mobile objects. Due to the high frequency in location updates and the expensive cost of continuous query processing, server computation capacity and wireless communication bandwidth are the two limiting factors for large-scale deployment of moving object database systems. To address both of the scalability factors, distributed computing has been considered. These schemes enable moving objects to participate as a peer in query processing to substantially reduce the demand on server computation, and wireless communications associated with location updates. In the first part of this dissertation, we propose a distributed framework to process moving monitoring queries over moving objects in a spatial network environment. In the second part of this dissertation, in order to reduce the communication cost, we leverage both on-demand data access and periodic broadcast to design a new hybrid distributed solution for moving monitoring queries in an open space environment. Location-based services make our daily life more convenient. However, to receive the services, one has to reveal his/her location and query information when issuing locationbased queries. This could lead to privacy breach if these personal information are possessed by some untrusted parties. In the third part of this dissertation, we introduce a new privacy protection measure called query l-diversity, and provide two cloaking algorithms to achieve both location kanonymity and query l-diversity to better protect user privacy. In the fourth part of this dissertation, we design a hybrid three-tier architecture to help reduce privacy exposure. In the fifth part of this dissertation, we propose to use Road Network Embedding technique to process privacy protected queries

    WSN Location Privacy Scheme Enhancement through Epidemical Information Dissemination

    Get PDF
    Wireless Sensor Networks (WSNs) are commonly used for animal tracking. Over the years, a significant number of studies have been presented for monitoring moving targets through WSN. At the same time, the location / position information of each target should be available only to authorized entities, e.g., Animal Protection Centers, thus, the position should be kept private. The iHIDE is a location privacy mechanism that uses a non-geographical based routing scheme for packet delivery over WSN. In this paper, we elaborate on that scheme by introducing a routing plan construction algorithm. Furthermore, we enhance iHIDE by adopting the use of epidemical data dissemination as an enforcing privacy technique. Finally, we evaluate through simulations the scheme against other commonly used location privacy overlays in terms of network overhead and safety period

    Self-certified sybil-free pseudonyms

    Get PDF
    Accurate and trusted identifiers are a centerpiece for any security architecture. Protecting against Sybil attacks in a privacy-friendly manner is a non-trivial problem in wireless infrastructureless networks, such as mobile ad hoc networks. In this paper, we introduce self-certified Sybil-free pseudonyms as a means to provide privacy-friendly Sybil-freeness without requiring continuous online availability of a trusted third party. These pseudonyms are self-certified and computed by the users themselves from their cryptographic longterm identities. Contrary to identity certificates, we preserve location privacy and improve protection against some notorious attacks on anonymous communication systems

    Private Eyes Are Watching You: With the Implementation of the E-911 Mandate, Who Will Watch Every Move You Make?

    Get PDF
    The FCC\u27s E-911 mandate, which will ensure that emergency operators automatically receive a caller\u27s location information, should help save lives. However, privacy advocates have expressed concern over the potential for wireless carriers, the government, and third parties to collect and store personal information. Congress has addressed these concerns with legislation, but privacy advocates still worry that consumers are not adequately protected. This Note addresses this concern and argues that in order to ensure consumer protection, additions are needed to section 222 of the Telecommunications Act of 1996. The Note discusses the importance of individual privacy and balances it against the benefits of location technology. The Note then suggests regulatory changes that should both protect consumers and allow this technology to continue to develop

    Private Eyes Are Watching You: With the Implementation of the E-911 Mandate, Who Will Watch Every Move You Make?

    Get PDF
    The FCC\u27s E-911 mandate, which will ensure that emergency operators automatically receive a caller\u27s location information, should help save lives. However, privacy advocates have expressed concern over the potential for wireless carriers, the government, and third parties to collect and store personal information. Congress has addressed these concerns with legislation, but privacy advocates still worry that consumers are not adequately protected. This Note addresses this concern and argues that in order to ensure consumer protection, additions are needed to section 222 of the Telecommunications Act of 1996. The Note discusses the importance of individual privacy and balances it against the benefits of location technology. The Note then suggests regulatory changes that should both protect consumers and allow this technology to continue to develop
    • …
    corecore