Abstract
Current Wireless LAN(WLAN) specification require all stations to use globally unique fixed MAC addresses. The MAC address is visible in all WLAN packets. Globally unique and fixed addresses enable an observer to collect history and profile data of wireless users. This cause a serious location privacy breach especially in public access networks. Several protection methods based on temporal address and periodical address updates have already been proposed. In this paper, we identify a new wireless location privacy attack-correlation attack-in the context of wireless LAN and high accuracy localization technique. Correlation attack is a method of utilizing the temporal and spatial correlation between the old and new pseudonym of nodes. we identified that solutions based on periodical address update cannot protect users from advanced tracking methods including correlation attack under such context. To combat such attacks, we propose the concept of a silent period. A silent period is defined as a transition period between the use of new and old pseudonyms, when a node is not allowed to disclose either the old or the new address. This makes it more difficult to associate two separately received pseudonyms with the same station, because the silent period disrupts the temporal and/or spatial correlation between two separately received pseudonyms, and obscures the time and place where a pseudonym changed. we generalizes a wireless LAN system into a MIX based anonymity model. The model offers two insights: a way of evaluating location privacy protection systems; and serving as a bridge between the new location privacy protection problem and existing defense and attack approaches in the MIX related research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bandara, U., Hasegawa, M., Inoue, M., Morikawa, H., Aoyama, T.: Design and implementation of a bluetooth signal strength based location sensing system. In: Proc. of IEEE Radio and Wireless Conference (RAWCON 2004), Atlanta, U.S.A (2004)
Hitachi: Hitachi’s air location (2004) http://www.hitachi.co.jp/airlocation/.
Bahl, P., Padmanabhan, V.: Radar: an in-building rf-based user location and tracking system. In: Proc. of IEEE INFOCOM 2000, Tel-Aviv, Israel (2000)
Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2 (2003) 46–55
BluetoothSIG: Bluetooth 1.2 draft 4 (2003)
IEEE: 802.11-1999(reaffr 2003) (2003)
Mauw, S., Verschuren, J., Vink, E.d.: A formalization of anonymity and onion routing. In: ESORICS 2004, Sophia Antipolis, France (2004)
Steinbrecher, S., Kopsell, S.: Modelling unlinkability. In: Proc. of PET 2003, Elbflorenz Dresden, Germany (2003)
Yamazaki, K., Sezaki, K.: Spatio-temporal addressing scheme for mobile ad hoc networks. In: Proc. of IEEE TENCON 2004, Chiang Mai, Thailand (2004)
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Proc. of PET 2002. Volume 2482 of LNCS., Springer (2002)
Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: 5th International Workshop on Information Hiding(IH2002), Noordwijkerhout, The Netherlands, spinger (2002)
Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1 (1988) 65–75
Diaz, C., Serjantov, A.: Generalising mixes. In: Proc. of PET 2003. LNCS 2760, Dresden, Germany, Springer-Verlag (2003)
Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1 (1998) 66–92
Guvenc, I., Abdallah, C., Jordan, R., Dedeoglu, O.: Enhancements to rss based indoor tracking systems using kalman filter. In: Proc. of Intl. Signal Processing Conf.(ISPC), Dallas, TX, U.S. (2003)
Pahlavan, K., Li, X., Makela, J.P.: Indoor geolocation science and technology. IEEE Communications Magazine (2002)
Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis. In: Proc. of 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots(WMASH 2003), San Diego, CA, USA (2003)
Gruteser, M., Grunwald, D.: A methodological assessment of location privacy risks in wireless hotspot networks. In: Proc. of 1st Intl. Conf. on Security in Pervasive Computing(SPC 2003). Volume 2802 of LNCS., Boppard, Germany, Springer (2003)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of ACM MobiSys 2003, San Francisco, CA, USA, USENIX (2003) 31–42
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (1981) 84–88
Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference (WCNC 2005), NL, U.S. (2005)
Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Proc. of PET 2002. Volume 2482 of LNCS., Springer (2002)
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Proc. of Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA (2000)
Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security 12 (2004) 3–36
Shmatikov, V.: Probabilistic model checking of an anonymity system. Journal of Computer Security (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this paper
Cite this paper
Huang, L., Yamane, H., Matsuura, K., Sezaki, K. (2007). Location Privacy in Wireless LAN. In: Poovendran, R., Roy, S., Wang, C. (eds) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-46276-9_13
Download citation
DOI: https://doi.org/10.1007/978-0-387-46276-9_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-32721-1
Online ISBN: 978-0-387-46276-9
eBook Packages: Computer ScienceComputer Science (R0)