Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 30))

Abstract

Current Wireless LAN(WLAN) specification require all stations to use globally unique fixed MAC addresses. The MAC address is visible in all WLAN packets. Globally unique and fixed addresses enable an observer to collect history and profile data of wireless users. This cause a serious location privacy breach especially in public access networks. Several protection methods based on temporal address and periodical address updates have already been proposed. In this paper, we identify a new wireless location privacy attack-correlation attack-in the context of wireless LAN and high accuracy localization technique. Correlation attack is a method of utilizing the temporal and spatial correlation between the old and new pseudonym of nodes. we identified that solutions based on periodical address update cannot protect users from advanced tracking methods including correlation attack under such context. To combat such attacks, we propose the concept of a silent period. A silent period is defined as a transition period between the use of new and old pseudonyms, when a node is not allowed to disclose either the old or the new address. This makes it more difficult to associate two separately received pseudonyms with the same station, because the silent period disrupts the temporal and/or spatial correlation between two separately received pseudonyms, and obscures the time and place where a pseudonym changed. we generalizes a wireless LAN system into a MIX based anonymity model. The model offers two insights: a way of evaluating location privacy protection systems; and serving as a bridge between the new location privacy protection problem and existing defense and attack approaches in the MIX related research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 229.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bandara, U., Hasegawa, M., Inoue, M., Morikawa, H., Aoyama, T.: Design and implementation of a bluetooth signal strength based location sensing system. In: Proc. of IEEE Radio and Wireless Conference (RAWCON 2004), Atlanta, U.S.A (2004)

    Google Scholar 

  2. Hitachi: Hitachi’s air location (2004) http://www.hitachi.co.jp/airlocation/.

    Google Scholar 

  3. Bahl, P., Padmanabhan, V.: Radar: an in-building rf-based user location and tracking system. In: Proc. of IEEE INFOCOM 2000, Tel-Aviv, Israel (2000)

    Google Scholar 

  4. Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2 (2003) 46–55

    Article  Google Scholar 

  5. BluetoothSIG: Bluetooth 1.2 draft 4 (2003)

    Google Scholar 

  6. IEEE: 802.11-1999(reaffr 2003) (2003)

    Google Scholar 

  7. Mauw, S., Verschuren, J., Vink, E.d.: A formalization of anonymity and onion routing. In: ESORICS 2004, Sophia Antipolis, France (2004)

    Google Scholar 

  8. Steinbrecher, S., Kopsell, S.: Modelling unlinkability. In: Proc. of PET 2003, Elbflorenz Dresden, Germany (2003)

    Google Scholar 

  9. Yamazaki, K., Sezaki, K.: Spatio-temporal addressing scheme for mobile ad hoc networks. In: Proc. of IEEE TENCON 2004, Chiang Mai, Thailand (2004)

    Google Scholar 

  10. Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Proc. of PET 2002. Volume 2482 of LNCS., Springer (2002)

    Google Scholar 

  11. Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: 5th International Workshop on Information Hiding(IH2002), Noordwijkerhout, The Netherlands, spinger (2002)

    Google Scholar 

  12. Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1 (1988) 65–75

    Article  MATH  MathSciNet  Google Scholar 

  13. Diaz, C., Serjantov, A.: Generalising mixes. In: Proc. of PET 2003. LNCS 2760, Dresden, Germany, Springer-Verlag (2003)

    Google Scholar 

  14. Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1 (1998) 66–92

    Article  Google Scholar 

  15. Guvenc, I., Abdallah, C., Jordan, R., Dedeoglu, O.: Enhancements to rss based indoor tracking systems using kalman filter. In: Proc. of Intl. Signal Processing Conf.(ISPC), Dallas, TX, U.S. (2003)

    Google Scholar 

  16. Pahlavan, K., Li, X., Makela, J.P.: Indoor geolocation science and technology. IEEE Communications Magazine (2002)

    Google Scholar 

  17. Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis. In: Proc. of 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots(WMASH 2003), San Diego, CA, USA (2003)

    Google Scholar 

  18. Gruteser, M., Grunwald, D.: A methodological assessment of location privacy risks in wireless hotspot networks. In: Proc. of 1st Intl. Conf. on Security in Pervasive Computing(SPC 2003). Volume 2802 of LNCS., Boppard, Germany, Springer (2003)

    Google Scholar 

  19. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of ACM MobiSys 2003, San Francisco, CA, USA, USENIX (2003) 31–42

    Google Scholar 

  20. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (1981) 84–88

    Article  Google Scholar 

  21. Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference (WCNC 2005), NL, U.S. (2005)

    Google Scholar 

  22. Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Proc. of PET 2002. Volume 2482 of LNCS., Springer (2002)

    Google Scholar 

  23. Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Proc. of Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA (2000)

    Google Scholar 

  24. Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security 12 (2004) 3–36

    Google Scholar 

  25. Shmatikov, V.: Probabilistic model checking of an anonymity system. Journal of Computer Security (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this paper

Cite this paper

Huang, L., Yamane, H., Matsuura, K., Sezaki, K. (2007). Location Privacy in Wireless LAN. In: Poovendran, R., Roy, S., Wang, C. (eds) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-46276-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-46276-9_13

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-32721-1

  • Online ISBN: 978-0-387-46276-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics