ABSTRACT
In health assistive environments the possibility of knowing patient's position can be very important, since may represent a valid support to medical activities and assistance strategies. However, we cannot assume in general that the utility of having precise information about patients' location is stronger than the right of keeping private the access to some place and, more in general, the exact movements that patients do in the environment. Thus, besides the standard precise localization issue, we consider also the issue of providing approximate non-deterministic answers about patients' positions in such a way that privacy is protected but they can be anyway found with a small number of attempts. The solution enforces the general concept of k-anonymity, which we adapt in our context in a way different from the classical one. An important aspect of our technique is that it is strongly efficient and implementable via very cheap devices, which is a very relevant issue in pervasive environments where wireless devices with limited processing capability and power have to be utilized.
- A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46--55, 2003. Google ScholarDigital Library
- A. R. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In Conference on Pervasive Computing and Communications Workshops, pages 127--131. IEEE Computer Society, 2004. Google ScholarDigital Library
- N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: the insecurity of 802.11. In MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking, pages 180--189, New York, NY, USA, 2001. ACM Press. Google ScholarDigital Library
- F. Buccafurri and G. Lax. A pervasive identification service for physical access control. In ICPS '08: Proceedings of the 5th international conference on Pervasive services, pages 65--68, New York, NY, USA, 2008. ACM. Google ScholarDigital Library
- R. C. W. C. C. Yang and T. Y. Chang. An improvement of the yang-shieh password authentication schemes. Applied Mathematics and Computation, 162:1391--1396, 2005.Google ScholarDigital Library
- C.-Y. Chow, M. F. Mokbel, and X. Liu. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In GIS '06: Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, pages 171--178, New York, NY, USA, 2006. ACM. Google ScholarDigital Library
- F. Classes and E. M. for Deterministic Random Number Generators (AIS 20, Version 2.0, 2 December 1999). http://www.bsi.de/zertifiz/zert/interpr/ais20e.pdf.Google Scholar
- B. für Sicherheit in der Informationstechnik. http://www.bsi.de/english/index.htm.Google Scholar
- M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys '03: Proceedings of the 1st international conference on Mobile systems, applications and services, pages 31--42. ACM, 2003. Google ScholarDigital Library
- J. R. Hill. A table driven approach to cyclic redundancy check calculations. SIGCOMM Comput. Commun. Rev., 9(2):40--60, 1979. Google ScholarDigital Library
- H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. Random-data perturbation techniques and privacy-preserving data mining. Knowl. Inf. Syst., 7(4):387--414, 2005. Google ScholarDigital Library
- J. Krumm. Inference attacks on location tracks. In International Conference Pervasive on Pervasive Computing, Lecture Notes in Computer Science, pages 127--143. Springer, 2007. Google ScholarDigital Library
- M. Kumar. New remote user authentication scheme using smart cards. IEEE Trans. Consumer Electronic, 50(2):597--600, 2004. Google ScholarDigital Library
- L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770--772, Nov. 1981. Google ScholarDigital Library
- M. Li, K. Sampigethaya, L. Huang, and R. Poovendran. Swing & swap: user-centric approaches towards maximizing location privacy. In WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic society, pages 19--28, New York, NY, USA, 2006. ACM. Google ScholarDigital Library
- Y. Li and X. Zhang. Securing credit card transactions with one-time payment scheme. Electronic Commerce Research and Applications, 4:413--426, 2005. Google ScholarDigital Library
- W. Peterson. Error-correcting codes. M.I.T. Press and John Wiley & Sons, 1961.Google Scholar
- M. Peyravian and C. Jeffries. Secure remote user access over insecure networks. Computer Communications, 29(5):660--667, 2006. Google ScholarDigital Library
- A. Rubin and N. Wright. Off-line generation of limited-use credit card numbers. In Proceedings of the Fifth International Conference on Financial Cryptography, pages 165--175, 2001. Google ScholarDigital Library
- A. D. Rubin. Independent one-time passwords. In USENIX Journal of Computer Systems, 1996. Google ScholarDigital Library
- P. Samarati. Protecting respondents' identities in microdata release. IEEE Trans, on Knowl. and Data Eng., 13(6):1010--1027, 2001. Google ScholarDigital Library
- K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. Caravan: Providing location privacy for vanet. In Embedded Security in Cars (ESCAR), 2005.Google Scholar
- A. Stubblefield, J. Ioannidis, and A. D. Rubin. A key recovery attack on the 802.11b wired equivalent privacy protocol (wep). ACM Trans. Inf. Syst. Secur., 7(2):319--332, 2004. Google ScholarDigital Library
- T. Xu and Y. Cai. Location anonymity in continuous location-based services. In GIS '07: Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems, pages 1--8, New York, NY, USA, 2007. ACM. Google ScholarDigital Library
Index Terms
- An efficient k-anonymous localization technique for assistive environments
Recommendations
Tracking a moving user in indoor environments using Bluetooth low energy beacons
Graphical abstractDisplay Omitted
Highlights- RSSI-based location tracking approaches require a laborious calibration process.
Abstract BackgroundBluetooth low energy (BLE) beacons have been used to track the locations of individuals in indoor environments for clinical applications such as workflow analysis and infectious disease modelling. Most current ...
Localization Using Anonymous Measurements
DCOSS '15: Proceedings of the 2015 International Conference on Distributed Computing in Sensor SystemsRange-based IEEE 802.15.4 localization systems currently require relatively high anchor density for indoor deployments. It can therefore be beneficial to use external sources of transmission as additional anchors. We present methods for using WiFi ...
Procedurally generated environments for simulating RSSI- localization applications
CNS '17: Proceedings of the 20th Communications & Networking SymposiumReceived signal strength indicator (RSSI) is often used in wireless localization applications as it attenuates as the signal propagates through the environment. Signal strength attenuation models allow distance to be estimated between transceivers and ...
Comments