Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3310273.3323400acmconferencesArticle/Chapter ViewAbstractPublication PagescfConference Proceedingsconference-collections
research-article

A privacy-preserving protocol for indoor wi-fi localization

Published: 30 April 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Location-aware applications have witnessed massive worldwide growth in recent years due to the introduction and advancement of smartphones. Most of these applications rely on the Global Positioning System (GPS) which is not available in indoor environments. As a result, Wi-Fi fingerprinting is becoming increasingly popular as an alternative as it allows localizing users in indoor environments, has lower power consumption, and is also more economical as it does not require a dedicated sensor other than a Wi-Fi card. The technique allows a service provider (SP) to construct a Wi-Fi database (called radio map) that can be used as a reference point to localize a user. However, this process does not preserve the user privacy, as the location can only be computed interactively with the SP. The service provider may also reveal sensitive information on the indoor space (e.g. the building map) to the user. Thus, we need an indoor localization protocol that addresses the privacy of both parties. In this paper, we present a privacy-preserving cryptographic protocol for indoor Wi-Fi localization, that prevents the SP from learning the exact location of the user outside of certain pre-defined sensitive areas, while keeping the SP's database secure. Thus, both parties cannot learn anything about each other's input beyond the implicit output revealed.

    References

    [1]
    Paramvir Bahl and Venkata N. Padmanabhan. 2000. RADAR: An In-Building RF-Based User Location and Tracking System. In Proceedings IEEE INFOCOM 2000, The Conference on Computer Communications, Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Reaching the Promised Land of Communications, Tel Aviv, Israel, March 26--30, 2000. IEEE, 775--784.
    [2]
    Burton H. Bloom. 1970. Space/Time Trade-offs in Hash Coding with Allowable Errors. Commun. ACM 13, 7 (1970), 422--426.
    [3]
    Mauro Brunato and Roberto Battiti. 2005. Statistical learning theory for location fingerprinting in wireless LANs. Computer Networks 47, 6 (2005), 825--845.
    [4]
    Luca Calderoni, Matteo Ferrara, Annalisa Franco, and Dario Maio. 2015. Indoor localization in a hospital environment using Random Forest classifiers. Expert Syst. Appl. 42, 1 (2015), 125--134.
    [5]
    Luca Calderoni, Paolo Palmieri, and Dario Maio. 2015. Location privacy without mutual trust: The spatial Bloom filter. Computer Communications 68 (2015), 4--16.
    [6]
    Luca Calderoni, Paolo Palmieri, and Dario Maio. 2018. Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols. IEEE Trans. Information Forensics and Security 13, 7 (2018), 1710--1721.
    [7]
    Ronald Cramer, Ivan Damgård, and Jesper Buus Nielsen. 2015. Secure Multiparty Computation and Secret Sharing. Cambridge University Press.
    [8]
    IEEE. 2016. IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. In Proceedings IEEE INFOCOM IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 2016.
    [9]
    Kamol Kaemarungsi and Prashant Krishnamurthy. 2004. Modeling of Indoor Positioning Systems Based on Location Fingerprinting. In Proceedings IEEE INFOCOM 2004, The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, March 7--11, 2004. IEEE, 1012--1022.
    [10]
    Hiroaki Kikuchi and Jun Sakuma. 2014. Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection. JIP 22, 2 (2014), 388--400.
    [11]
    Elina Laitinen, Jukka Talvitie, and Prashant Krishnamurthy. 2011. Comparison of Positioning Accuracy of Grid and Path Loss-Based Mobile Positioning Methods Using Receiver Signal Strengths. In Proceedings SPAMEC 2011, Signal Processing and Applied Mathematics for Electronics and Communications, August 26--28, 2011. 1--4.
    [12]
    Anthony LaMarca, Yatin Chawathe, Sunny Consolvo, Jeffrey Hightower, Ian E. Smith, James Scott, Timothy Sohn, James Howard, Jeff Hughes, Fred Potter, Jason Tabert, Pauline Powledge, Gaetano Borriello, and Bill N. Schilit. 2005. Place Lab: Device Positioning Using Radio Beacons in the Wild. In Pervasive Computing, Third International Conference, PERVASIVE 2005, Munich, Germany, May 8--13, 2005, Proceedings (Lecture Notes in Computer Science), Hans-Werner Gellersen, Roy Want, and Albrecht Schmidt (Eds.), Vol. 3468. Springer, 116--133.
    [13]
    Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, and Xiuzhen Cheng. 2014. Achieving privacy preservation in WiFi fingerprint-based localization. In 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014. IEEE, 2337--2345.
    [14]
    Liran Ma, Amin Y. Teymorian, and Xiuzhen Cheng. 2008. A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks. In INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13--18 April 2008, Phoenix, AZ, USA. IEEE, 1220--1228.
    [15]
    Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2--6, 1999, Proceeding (Lecture Notes in Computer Science), Jacques Stern (Ed.), Vol. 1592. Springer, 223--238.
    [16]
    Paolo Palmieri, Luca Calderoni, and Dario Maio. 2014. Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications. In Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13--15, 2014, Revised Selected Papers (Lecture Notes in Computer Science), Dongdai Lin, Moti Yung, and Jianying Zhou (Eds.), Vol. 8957. Springer, 16--36.
    [17]
    Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux. 2011. Quantifying Location Privacy. In 32nd IEEE Symposium on Security and Privacy, S&P 2011, 22--25 May 2011, Berkeley, California, USA. IEEE Computer Society, 247--262.
    [18]
    Zheng Yang and Kimmo Järvinen. 2018. The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption. In 2018 IEEE Conference on Computer Communications, INFOCOM 2018, Honolulu, HI, USA, April 16--19, 2018. IEEE, 1223--1231.
    [19]
    Moustafa Youssef and Ashok K. Agrawala. 2005. The Horus WLAN location determination system. In Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005, Seattle, Washington, USA, June 6--8, 2005, Kang G. Shin, David Kotz, and Brian D. Noble (Eds.). ACM, 205--218.

    Cited By

    View all
    • (2024)A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi LocalizationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337280519(4086-4099)Online publication date: 2024
    • (2023)Privacy-Preserving Wireless Indoor Localization SystemsKocaeli Journal of Science and Engineering10.34088/kojose.10988046:2(114-128)Online publication date: 30-Nov-2023
    • (2022)A differentially private indoor localization scheme with fusion of WiFi and bluetooth fingerprints in edge computingNeural Computing and Applications10.1007/s00521-021-06815-9Online publication date: 28-Jan-2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CF '19: Proceedings of the 16th ACM International Conference on Computing Frontiers
    April 2019
    414 pages
    ISBN:9781450366854
    DOI:10.1145/3310273
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 April 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bloom filter
    2. cryptographic protocols
    3. location privacy

    Qualifiers

    • Research-article

    Conference

    CF '19
    Sponsor:
    CF '19: Computing Frontiers Conference
    April 30 - May 2, 2019
    Alghero, Italy

    Acceptance Rates

    Overall Acceptance Rate 240 of 680 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)18
    • Downloads (Last 6 weeks)4

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi LocalizationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337280519(4086-4099)Online publication date: 2024
    • (2023)Privacy-Preserving Wireless Indoor Localization SystemsKocaeli Journal of Science and Engineering10.34088/kojose.10988046:2(114-128)Online publication date: 30-Nov-2023
    • (2022)A differentially private indoor localization scheme with fusion of WiFi and bluetooth fingerprints in edge computingNeural Computing and Applications10.1007/s00521-021-06815-9Online publication date: 28-Jan-2022
    • (2020)Discovering Influential Positions in RFID-Based Indoor Tracking DataInformation10.3390/info1106033011:6(330)Online publication date: 20-Jun-2020
    • (2020)Privacy in Indoor Positioning Systems: A Systematic Review2020 International Conference on Localization and GNSS (ICL-GNSS)10.1109/ICL-GNSS49876.2020.9115496(1-6)Online publication date: Jun-2020

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media