Enabling Location Privacy in Wireless Personal Area Networks
2007
Abstract
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). An eavesdropper can keep track of the place and time mobile devices are communicating. The hardware address of a device can often be linked to the identity of the user operating the mobile device; this represents a violation of the user's privacy. In this paper, we consider four communication scenarios and present several techniques to solve the location privacy problem in each of these scenarios. We will also show that these scenarios are related to each other. As mobile devices in a WPAN are typically operated by a user and energy constrained, we focused on user-friendliness and energy consumption during the design of our solutions.
References (23)
- D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to Strangers: Authentication in Adhoc Wireless Networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS '02). The Internet Society, 2002.
- Bluetooth Specification. https://www.bluetooth.org/spec/.
- H. Cheung. The Bluesniper Rifle, 2004. http://www.tomsnetworking.com/ Sections-article106.php.
- DEFCON. Computer Underground Hackers Convention. http://www.defcon.org.
- W. Diffie and M. Hellman. New Directions in Cryptography. In IEEE Transactions on Information Theory, pages 644-654, 1976.
- M. Gruteser and D. Grunwald. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. In Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH '03), pages 46-55. ACM Press, 2003.
- J. Haartsen, M. Naghshineh, J. Inouye, O. Joeressen, and W. Allen. Bluetooth: Visions, Goals and Architecture. In ACM Mobile Computing and Communications Review, pages 38-45, 1998.
- J. H. Hoepman. The Ephemeral Pairing Problem. In Financial Cryptography, Lecture Notes in Computer Science, LNCS 3110, pages 212-226. Springer- Verlag, 2004.
- J. H. Hoepman. Ephemeral Pairing on Anonymous Networks. In Proceedings of the Second International Conference on Security in Pervasive Computing (SPC 05), Lecture Notes in Computer Science, LNCS 3450, pages 101-116. Springer-Verlag, 2005.
- IEEE 802.15, the Wireless Personal Area Network Working Group. http://www.ieee802.org/15/.
- Infrared Data Association. http://www.irda.org/.
- M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. In Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA '01), Lecture Notes in Computer Science, LNCS 2020, pages 176-191. Springer-Verlag, 2001.
- A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym Systems. In Proceedings of the 6th Annual International Workshop of Selected Areas in Cryptography (SAC '99), Lecture Notes in Computer Science, LNCS 1758, pages 184-199. Springer-Verlag, 1999.
- A. J. Menezes. Elliptic Curve Public Key Cryptosystems. Springer, July 1993.
- A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, October 1996.
- New European Schemes for Signatures, Integrity, and Encryption. http://www.cryptonessie.org.
- N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. Analyzing the Energy Consumption of Security Protocols. In Proceedings of the 2003 International Symposium on Low Power Electronics and Design (ISLPED '03), pages 30-35. ACM Press, 2003.
- A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology -CRYPTO '84, Lecture Notes in Computer Science, LNCS 196, pages 47-53. Springer-Verlag, 1984.
- D. Singelée and B. Preneel. Location Privacy in Wireless Personal Area Networks. In ACM Workshop on Wireless Security (WISE '06), pages 11-18. ACM Press, 2006.
- D. Singelée and B. Preneel. Improved Pairing Protocol for Bluetooth. In Proceedings of the 5th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW '06), Lecture Notes in Computer Science, LNCS 4104, pages 252-265. Springer-Verlag, 2006.
- D. Singelée and B. Preneel. Review of the Bluetooth Security Architecture. Information Security Bulletin, 11(2):45-53, 2006.
- F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In Proceedings of the 7th International Workshop on Security Protocols, Lecture Notes in Computer Science, LNCS 1796, pages 172-182. Springer-Verlag, 1999.
- F. Wong and F. Stajano. Location Privacy in Bluetooth. In Proceedings of 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS '05), Lecture Notes in Computer Science, LNCS 3813, pages 176-188. Springer-Verlag, 2005.