Skip to main content

Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization

  • Conference paper
  • First Online:
Book cover Advances in Information and Computer Security (IWSEC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9836))

Included in the following conference series:

Abstract

A diversity of indoor localization techniques have become accurate and ready to use. A client first measures its location characteristics, and then calculates its location with the information provided by the localization server. However, this process may reveal the location information of the client or leak the area information stored on the server. This hinders the growth of indoor localization, but there are only a few solutions available in the literature. In this paper, we formulate an adversary model for fingerprint-based indoor localization techniques, and propose a cryptographic scheme to protect the privacy of both parties in a localization process. Our scheme utilizes the current Wi-Fi fingerprint based positioning techniques, including Gaussian radial basis functions and sigmoid kernels.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Of course, a careful implementation is still required in order not to reveal extra information about user locations.

References

  1. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACM International Conference on Management of Data (SIGMOD), pp. 439–450 (2000)

    Google Scholar 

  2. Bahl, P., Padmanabhan, V.N.: RADAR: an in-building RF-based user location and tracking system. In: IEEE Conference on Computer Communications (INFOCOM), pp. 775–784 (2000)

    Google Scholar 

  3. Brunato, M., Battiti, R.: Statistical learning theory for location fingerprinting in wireless LANs. Comput. Netw. 47(6), 825–845 (2005)

    Article  MATH  Google Scholar 

  4. Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2(2), 121–167 (1998)

    Article  Google Scholar 

  5. Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  6. Cover, T.M., Hart, P.E.: Nearest neighbor pattern classification. IEEE Trans. Inf. Theor. 13(1), 21–27 (1967)

    Article  MATH  Google Scholar 

  7. Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: International Conference on Distributed Computing Systems (ICDCS), pp. 620–629 (2005)

    Google Scholar 

  8. Gruteser, M.: Indoor localization: ready for primetime? In: International Conference on Mobile Computing and Networking (MobiCom), pp. 375–376 (2013)

    Google Scholar 

  9. LaMarca, A., Chawathe, Y., Consolvo, S., Hightower, J., Smith, I., Scott, J., Sohn, T., Howard, J., Hughes, J., Potter, F., Tabert, J., Powledge, P.S., Borriello, G., Schilit, B.N.: Place lab: device positioning using radio beacons in the wild. In: Gellersen, H.W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 116–133. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Leppäkoski, H., Collin, J., Takala, J.: Pedestrian navigation based on inertial sensors, indoor map, and WLAN signals. Signal Process. Syst. 71(3), 287–296 (2013)

    Article  Google Scholar 

  11. Li, H., Sun, L., Zhu, H., Lu, X., Cheng, X.: Achieving privacy preservation in Wi-Fi fingerprint-based localization. In: IEEE Conference on Computer Communications (INFOCOM), pp. 2337–2345 (2014)

    Google Scholar 

  12. Liu, X., Liu, K., Guo, L., Li, X., Fang, Y.: A game-theoretic approach for achieving k-anonymity in location based services. In: IEEE Conference on Computer Communications (INFOCOM), pp. 2985–2993 (2013)

    Google Scholar 

  13. Ma, L., Teymorian, A.Y., Cheng, X.: A hybrid rogue access point protection framework for commodity Wi-Fi networks. In: IEEE Conference on Computer Communications (INFOCOM), pp. 1220–1228 (2008)

    Google Scholar 

  14. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  15. Peddinti, S.T., Saxena, N.: On the limitations of query obfuscation techniques for location privacy. In: International Conference on Ubiquitous Computing (UbiComp), pp. 187–196 (2011)

    Google Scholar 

  16. Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The cricket location-support system. In: International Conference on Mobile Computing and Networking (Mobicom), pp. 32–43 (2000)

    Google Scholar 

  17. Rai, A., Chintalapudi, K.K., Padmanabhan, V.N., Sen, R.: Zee: zero-effort crowdsourcing for indoor localization. In: International Conference on Mobile Computing and Networking (Mobicom), pp. 293–304 (2012)

    Google Scholar 

  18. Shokri, R., Theodorakopoulos, G., Boudec, J.L., Hubaux, J.: Quantifying location privacy. In: IEEE Symposium on Security and Privacy (S&P), pp. 247–262 (2011)

    Google Scholar 

  19. Tarzia, S.P., Dinda, P.A., Dick, R.P., Memik, G.: Indoor localization without infrastructure using the acoustic background spectrum. In: International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 155–168 (2011)

    Google Scholar 

  20. Wang, H., Sen, S., Elgohary, A., Farid, M., Youssef, M., Choudhury, R.R.: No need to war-drive: unsupervised indoor localization. In: International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 197–210 (2012)

    Google Scholar 

  21. Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Trans. Inf. Syst. 10(1), 91–102 (1992)

    Article  Google Scholar 

  22. Ward, A., Jones, A., Hopper, A.: A new location technique for the active office. IEEE Pers. Commun. 4(5), 42–47 (1997)

    Article  Google Scholar 

  23. Woodman, O., Harle, R.: Pedestrian localisation for indoor environments. In: International Conference on Ubiquitous Computing (UbiComp), Seoul, Korea, pp. 114–123, 21–24 September 2008

    Google Scholar 

  24. Xu, K., Yue, H., Guo, L., Guo, Y., Fang, Y.: Privacy-preserving machine learning algorithms for big data systems. In: IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 318–327 (2015)

    Google Scholar 

  25. Yang, D., Fang, X., Xue, G.: Truthful incentive mechanisms for k-anonymity location privacy. In: IEEE Conference on Computer Communications (INFOCOM), pp. 2994–3002 (2013)

    Google Scholar 

  26. Yang, Z., Wu, C., Liu, Y.: Locating in fingerprint space: wireless indoor localization with little human intervention. In: International Conference on Mobile Computing and Networking (Mobicom), pp. 269–280 (2012)

    Google Scholar 

  27. Youssef, M., Agrawala, A.K.: The Horus WLAN location determination system. In: International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 205–218 (2005)

    Google Scholar 

  28. Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: ACM Symposium on Applied Computing (SAC), pp. 603–610 (2006)

    Google Scholar 

  29. Yuan, J., Yu, S.: Privacy preserving back-propagation neural network learning made practical with cloud computing. IEEE Trans. Parallel Distrib. Syst. 25(1), 212–221 (2014)

    Article  Google Scholar 

  30. Zhao, Y., Chow, S.S.M.: Privacy preserving collaborative filtering from asymmetric randomized encoding. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 459–477. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  31. Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62–76. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Acknowledgement

Sherman Chow is supported by the Early Career Scheme and the Early Career Award (CUHK 439713), and General Research Funds (CUHK 14201914) of the Research Grants Council, University Grant Committee of Hong Kong. Ming Li is supported by US National Science Foundation grant (CNS-1566634).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang, T., Chow, S.S.M., Zhou, Z., Li, M. (2016). Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. In: Ogawa, K., Yoshioka, K. (eds) Advances in Information and Computer Security. IWSEC 2016. Lecture Notes in Computer Science(), vol 9836. Springer, Cham. https://doi.org/10.1007/978-3-319-44524-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44524-3_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44523-6

  • Online ISBN: 978-3-319-44524-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics