Abstract
A diversity of indoor localization techniques have become accurate and ready to use. A client first measures its location characteristics, and then calculates its location with the information provided by the localization server. However, this process may reveal the location information of the client or leak the area information stored on the server. This hinders the growth of indoor localization, but there are only a few solutions available in the literature. In this paper, we formulate an adversary model for fingerprint-based indoor localization techniques, and propose a cryptographic scheme to protect the privacy of both parties in a localization process. Our scheme utilizes the current Wi-Fi fingerprint based positioning techniques, including Gaussian radial basis functions and sigmoid kernels.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Of course, a careful implementation is still required in order not to reveal extra information about user locations.
References
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACM International Conference on Management of Data (SIGMOD), pp. 439–450 (2000)
Bahl, P., Padmanabhan, V.N.: RADAR: an in-building RF-based user location and tracking system. In: IEEE Conference on Computer Communications (INFOCOM), pp. 775–784 (2000)
Brunato, M., Battiti, R.: Statistical learning theory for location fingerprinting in wireless LANs. Comput. Netw. 47(6), 825–845 (2005)
Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2(2), 121–167 (1998)
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)
Cover, T.M., Hart, P.E.: Nearest neighbor pattern classification. IEEE Trans. Inf. Theor. 13(1), 21–27 (1967)
Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: International Conference on Distributed Computing Systems (ICDCS), pp. 620–629 (2005)
Gruteser, M.: Indoor localization: ready for primetime? In: International Conference on Mobile Computing and Networking (MobiCom), pp. 375–376 (2013)
LaMarca, A., Chawathe, Y., Consolvo, S., Hightower, J., Smith, I., Scott, J., Sohn, T., Howard, J., Hughes, J., Potter, F., Tabert, J., Powledge, P.S., Borriello, G., Schilit, B.N.: Place lab: device positioning using radio beacons in the wild. In: Gellersen, H.W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 116–133. Springer, Heidelberg (2005)
Leppäkoski, H., Collin, J., Takala, J.: Pedestrian navigation based on inertial sensors, indoor map, and WLAN signals. Signal Process. Syst. 71(3), 287–296 (2013)
Li, H., Sun, L., Zhu, H., Lu, X., Cheng, X.: Achieving privacy preservation in Wi-Fi fingerprint-based localization. In: IEEE Conference on Computer Communications (INFOCOM), pp. 2337–2345 (2014)
Liu, X., Liu, K., Guo, L., Li, X., Fang, Y.: A game-theoretic approach for achieving k-anonymity in location based services. In: IEEE Conference on Computer Communications (INFOCOM), pp. 2985–2993 (2013)
Ma, L., Teymorian, A.Y., Cheng, X.: A hybrid rogue access point protection framework for commodity Wi-Fi networks. In: IEEE Conference on Computer Communications (INFOCOM), pp. 1220–1228 (2008)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Peddinti, S.T., Saxena, N.: On the limitations of query obfuscation techniques for location privacy. In: International Conference on Ubiquitous Computing (UbiComp), pp. 187–196 (2011)
Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The cricket location-support system. In: International Conference on Mobile Computing and Networking (Mobicom), pp. 32–43 (2000)
Rai, A., Chintalapudi, K.K., Padmanabhan, V.N., Sen, R.: Zee: zero-effort crowdsourcing for indoor localization. In: International Conference on Mobile Computing and Networking (Mobicom), pp. 293–304 (2012)
Shokri, R., Theodorakopoulos, G., Boudec, J.L., Hubaux, J.: Quantifying location privacy. In: IEEE Symposium on Security and Privacy (S&P), pp. 247–262 (2011)
Tarzia, S.P., Dinda, P.A., Dick, R.P., Memik, G.: Indoor localization without infrastructure using the acoustic background spectrum. In: International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 155–168 (2011)
Wang, H., Sen, S., Elgohary, A., Farid, M., Youssef, M., Choudhury, R.R.: No need to war-drive: unsupervised indoor localization. In: International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 197–210 (2012)
Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Trans. Inf. Syst. 10(1), 91–102 (1992)
Ward, A., Jones, A., Hopper, A.: A new location technique for the active office. IEEE Pers. Commun. 4(5), 42–47 (1997)
Woodman, O., Harle, R.: Pedestrian localisation for indoor environments. In: International Conference on Ubiquitous Computing (UbiComp), Seoul, Korea, pp. 114–123, 21–24 September 2008
Xu, K., Yue, H., Guo, L., Guo, Y., Fang, Y.: Privacy-preserving machine learning algorithms for big data systems. In: IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 318–327 (2015)
Yang, D., Fang, X., Xue, G.: Truthful incentive mechanisms for k-anonymity location privacy. In: IEEE Conference on Computer Communications (INFOCOM), pp. 2994–3002 (2013)
Yang, Z., Wu, C., Liu, Y.: Locating in fingerprint space: wireless indoor localization with little human intervention. In: International Conference on Mobile Computing and Networking (Mobicom), pp. 269–280 (2012)
Youssef, M., Agrawala, A.K.: The Horus WLAN location determination system. In: International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 205–218 (2005)
Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: ACM Symposium on Applied Computing (SAC), pp. 603–610 (2006)
Yuan, J., Yu, S.: Privacy preserving back-propagation neural network learning made practical with cloud computing. IEEE Trans. Parallel Distrib. Syst. 25(1), 212–221 (2014)
Zhao, Y., Chow, S.S.M.: Privacy preserving collaborative filtering from asymmetric randomized encoding. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 459–477. Springer, Heidelberg (2015)
Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62–76. Springer, Heidelberg (2007)
Acknowledgement
Sherman Chow is supported by the Early Career Scheme and the Early Career Award (CUHK 439713), and General Research Funds (CUHK 14201914) of the Research Grants Council, University Grant Committee of Hong Kong. Ming Li is supported by US National Science Foundation grant (CNS-1566634).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhang, T., Chow, S.S.M., Zhou, Z., Li, M. (2016). Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. In: Ogawa, K., Yoshioka, K. (eds) Advances in Information and Computer Security. IWSEC 2016. Lecture Notes in Computer Science(), vol 9836. Springer, Cham. https://doi.org/10.1007/978-3-319-44524-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-44524-3_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44523-6
Online ISBN: 978-3-319-44524-3
eBook Packages: Computer ScienceComputer Science (R0)