Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Safeguarding Location Privacy in Wireless Ad-Hoc Networks

Identifieur interne : 003038 ( Istex/Corpus ); précédent : 003037; suivant : 003039

Safeguarding Location Privacy in Wireless Ad-Hoc Networks

Auteurs : Tanzima Hashem ; Lars Kulik

Source :

RBID : ISTEX:1D94B713E6BE61C9192732B1117AE302C83FB005

Abstract

Abstract: We present a novel algorithm that safeguards the location privacy of users accessing location-based services via mobile devices. Our technique exploits the capability of mobile devices to form wireless ad-hoc networks in order to hide a user’s identity and position. Local ad-hoc networks enable us to separate an agent’s request for location information, the query initiator, from the agent that actually requests this service on its behalf, the query requestor. Since a query initiator can select itself or one of the k − 1 agents in its ad-hoc network as a query requestor, the query initiator remains k-anonymous. In addition, the location revealed to the location service provider is a rectangle instead of an exact coordinate. We develop an anonymous selection algorithm that selects a query requestor with near-uniform randomness, which is a key component to ensure anonymity in an ad-hoc network. Our experiments show that a system can ensure a high quality of service and maintain a high degree of privacy in terms of anonymity and obfuscation while accessing location-based services.

Url:
DOI: 10.1007/978-3-540-74853-3_22

Links to Exploration step

ISTEX:1D94B713E6BE61C9192732B1117AE302C83FB005

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Safeguarding Location Privacy in Wireless Ad-Hoc Networks</title>
<author>
<name sortKey="Hashem, Tanzima" sort="Hashem, Tanzima" uniqKey="Hashem T" first="Tanzima" last="Hashem">Tanzima Hashem</name>
<affiliation>
<mods:affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: thashem@csse.unimelb.edu.au</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Kulik, Lars" sort="Kulik, Lars" uniqKey="Kulik L" first="Lars" last="Kulik">Lars Kulik</name>
<affiliation>
<mods:affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: lars@csse.unimelb.edu.au</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:1D94B713E6BE61C9192732B1117AE302C83FB005</idno>
<date when="2007" year="2007">2007</date>
<idno type="doi">10.1007/978-3-540-74853-3_22</idno>
<idno type="url">https://api.istex.fr/document/1D94B713E6BE61C9192732B1117AE302C83FB005/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">003038</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">003038</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Safeguarding Location Privacy in Wireless Ad-Hoc Networks</title>
<author>
<name sortKey="Hashem, Tanzima" sort="Hashem, Tanzima" uniqKey="Hashem T" first="Tanzima" last="Hashem">Tanzima Hashem</name>
<affiliation>
<mods:affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: thashem@csse.unimelb.edu.au</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Kulik, Lars" sort="Kulik, Lars" uniqKey="Kulik L" first="Lars" last="Kulik">Lars Kulik</name>
<affiliation>
<mods:affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: lars@csse.unimelb.edu.au</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2007</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">1D94B713E6BE61C9192732B1117AE302C83FB005</idno>
<idno type="DOI">10.1007/978-3-540-74853-3_22</idno>
<idno type="ChapterID">22</idno>
<idno type="ChapterID">Chap22</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: We present a novel algorithm that safeguards the location privacy of users accessing location-based services via mobile devices. Our technique exploits the capability of mobile devices to form wireless ad-hoc networks in order to hide a user’s identity and position. Local ad-hoc networks enable us to separate an agent’s request for location information, the query initiator, from the agent that actually requests this service on its behalf, the query requestor. Since a query initiator can select itself or one of the k − 1 agents in its ad-hoc network as a query requestor, the query initiator remains k-anonymous. In addition, the location revealed to the location service provider is a rectangle instead of an exact coordinate. We develop an anonymous selection algorithm that selects a query requestor with near-uniform randomness, which is a key component to ensure anonymity in an ad-hoc network. Our experiments show that a system can ensure a high quality of service and maintain a high degree of privacy in terms of anonymity and obfuscation while accessing location-based services.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Tanzima Hashem</name>
<affiliations>
<json:string>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</json:string>
<json:string>E-mail: thashem@csse.unimelb.edu.au</json:string>
</affiliations>
</json:item>
<json:item>
<name>Lars Kulik</name>
<affiliations>
<json:string>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</json:string>
<json:string>E-mail: lars@csse.unimelb.edu.au</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<abstract>Abstract: We present a novel algorithm that safeguards the location privacy of users accessing location-based services via mobile devices. Our technique exploits the capability of mobile devices to form wireless ad-hoc networks in order to hide a user’s identity and position. Local ad-hoc networks enable us to separate an agent’s request for location information, the query initiator, from the agent that actually requests this service on its behalf, the query requestor. Since a query initiator can select itself or one of the k − 1 agents in its ad-hoc network as a query requestor, the query initiator remains k-anonymous. In addition, the location revealed to the location service provider is a rectangle instead of an exact coordinate. We develop an anonymous selection algorithm that selects a query requestor with near-uniform randomness, which is a key component to ensure anonymity in an ad-hoc network. Our experiments show that a system can ensure a high quality of service and maintain a high degree of privacy in terms of anonymity and obfuscation while accessing location-based services.</abstract>
<qualityIndicators>
<score>7.052</score>
<pdfVersion>1.3</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>1103</abstractCharCount>
<pdfWordCount>8696</pdfWordCount>
<pdfCharCount>45445</pdfCharCount>
<pdfPageCount>19</pdfPageCount>
<abstractWordCount>171</abstractWordCount>
</qualityIndicators>
<title>Safeguarding Location Privacy in Wireless Ad-Hoc Networks</title>
<genre.original>
<json:string>OriginalPaper</json:string>
</genre.original>
<chapterId>
<json:string>22</json:string>
<json:string>Chap22</json:string>
</chapterId>
<genre>
<json:string>conference [eBooks]</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>David Hutchison</name>
</json:item>
<json:item>
<name>Takeo Kanade</name>
</json:item>
<json:item>
<name>Josef Kittler</name>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
</json:item>
<json:item>
<name>John C. Mitchell</name>
</json:item>
<json:item>
<name>Moni Naor</name>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
</json:item>
<json:item>
<name>Madhu Sudan</name>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
</json:item>
<json:item>
<name>Doug Tygar</name>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2007</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>John Krumm</name>
</json:item>
<json:item>
<name>Gregory D. Abowd</name>
</json:item>
<json:item>
<name>Aruna Seneviratne</name>
</json:item>
<json:item>
<name>Thomas Strang</name>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
<json:item>
<value>Software Engineering</value>
</json:item>
<json:item>
<value>Systems and Data Security</value>
</json:item>
<json:item>
<value>Information Systems Applications (incl.Internet)</value>
</json:item>
<json:item>
<value>User Interfaces and Human Computer Interaction</value>
</json:item>
<json:item>
<value>Computers and Society</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-540-74852-6</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>UbiComp 2007: Ubiquitous Computing</title>
<genre.original>
<json:string>Proceedings</json:string>
</genre.original>
<bookId>
<json:string>978-3-540-74853-3</json:string>
</bookId>
<volume>4717</volume>
<pages>
<last>390</last>
<first>372</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>Book Series</json:string>
</genre>
<eisbn>
<json:string>978-3-540-74853-3</json:string>
</eisbn>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-74853-3</json:string>
</doi>
</host>
<publicationDate>2007</publicationDate>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-74853-3_22</json:string>
</doi>
<id>1D94B713E6BE61C9192732B1117AE302C83FB005</id>
<score>1</score>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/1D94B713E6BE61C9192732B1117AE302C83FB005/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/1D94B713E6BE61C9192732B1117AE302C83FB005/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/1D94B713E6BE61C9192732B1117AE302C83FB005/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Safeguarding Location Privacy in Wireless Ad-Hoc Networks</title>
<respStmt xml:id="ISTEX-API" resp="Références bibliographiques récupérées via GROBID" name="ISTEX-API (INIST-CNRS)"></respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>SPRINGER</p>
</availability>
<date>2007</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Safeguarding Location Privacy in Wireless Ad-Hoc Networks</title>
<author>
<persName>
<forename type="first">Tanzima</forename>
<surname>Hashem</surname>
</persName>
<email>thashem@csse.unimelb.edu.au</email>
<affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</affiliation>
</author>
<author>
<persName>
<forename type="first">Lars</forename>
<surname>Kulik</surname>
</persName>
<email>lars@csse.unimelb.edu.au</email>
<affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</affiliation>
</author>
</analytic>
<monogr>
<title level="m">UbiComp 2007: Ubiquitous Computing</title>
<title level="m" type="sub">9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007. Proceedings</title>
<idno type="pISBN">978-3-540-74852-6</idno>
<idno type="eISBN">978-3-540-74853-3</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/978-3-540-74853-3</idno>
<idno type="BookID">978-3-540-74853-3</idno>
<idno type="BookTitleID">152522</idno>
<idno type="BookSequenceNumber">4717</idno>
<idno type="BookVolumeNumber">4717</idno>
<idno type="BookChapterCount">29</idno>
<editor>
<persName>
<forename type="first">John</forename>
<surname>Krumm</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Gregory</forename>
<forename type="first">D.</forename>
<surname>Abowd</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Aruna</forename>
<surname>Seneviratne</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Thomas</forename>
<surname>Strang</surname>
</persName>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2007"></date>
<biblScope unit="volume">4717</biblScope>
<biblScope unit="page" from="372">372</biblScope>
<biblScope unit="page" to="390">390</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
</editor>
<biblScope>
<date>2007</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesId">558</idno>
</series>
<idno type="istex">1D94B713E6BE61C9192732B1117AE302C83FB005</idno>
<idno type="DOI">10.1007/978-3-540-74853-3_22</idno>
<idno type="ChapterID">22</idno>
<idno type="ChapterID">Chap22</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2007</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: We present a novel algorithm that safeguards the location privacy of users accessing location-based services via mobile devices. Our technique exploits the capability of mobile devices to form wireless ad-hoc networks in order to hide a user’s identity and position. Local ad-hoc networks enable us to separate an agent’s request for location information, the query initiator, from the agent that actually requests this service on its behalf, the query requestor. Since a query initiator can select itself or one of the k − 1 agents in its ad-hoc network as a query requestor, the query initiator remains k-anonymous. In addition, the location revealed to the location service provider is a rectangle instead of an exact coordinate. We develop an anonymous selection algorithm that selects a query requestor with near-uniform randomness, which is a key component to ensure anonymity in an ad-hoc network. Our experiments show that a system can ensure a high quality of service and maintain a high degree of privacy in terms of anonymity and obfuscation while accessing location-based services.</p>
</abstract>
<textClass>
<keywords scheme="Book Subject Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book Subject Group">
<list>
<label>I</label>
<label>I13022</label>
<label>I14029</label>
<label>I14050</label>
<label>I18040</label>
<label>I18067</label>
<label>I24040</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Computer Communication Networks</term>
</item>
<item>
<term>Software Engineering</term>
</item>
<item>
<term>Systems and Data Security</term>
</item>
<item>
<term>Information Systems Applications (incl.Internet)</term>
</item>
<item>
<term>User Interfaces and Human Computer Interaction</term>
</item>
<item>
<term>Computers and Society</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2007">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-3-19">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/1D94B713E6BE61C9192732B1117AE302C83FB005/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-74853-3</BookID>
<BookTitle>UbiComp 2007: Ubiquitous Computing</BookTitle>
<BookSubTitle>9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007. Proceedings</BookSubTitle>
<BookVolumeNumber>4717</BookVolumeNumber>
<BookSequenceNumber>4717</BookSequenceNumber>
<BookDOI>10.1007/978-3-540-74853-3</BookDOI>
<BookTitleID>152522</BookTitleID>
<BookPrintISBN>978-3-540-74852-6</BookPrintISBN>
<BookElectronicISBN>978-3-540-74853-3</BookElectronicISBN>
<BookChapterCount>29</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I13022" Priority="1" Type="Secondary">Computer Communication Networks</BookSubject>
<BookSubject Code="I14029" Priority="2" Type="Secondary">Software Engineering</BookSubject>
<BookSubject Code="I14050" Priority="3" Type="Secondary">Systems and Data Security</BookSubject>
<BookSubject Code="I18040" Priority="4" Type="Secondary">Information Systems Applications (incl.Internet)</BookSubject>
<BookSubject Code="I18067" Priority="5" Type="Secondary">User Interfaces and Human Computer Interaction</BookSubject>
<BookSubject Code="I24040" Priority="6" Type="Secondary">Computers and Society</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<FamilyName>Krumm</FamilyName>
</EditorName>
<Contact>
<Email>jckrumm@microsoft.com</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Gregory</GivenName>
<GivenName>D.</GivenName>
<FamilyName>Abowd</FamilyName>
</EditorName>
<Contact>
<Email>abowd@cc.gatech.edu</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Aruna</GivenName>
<FamilyName>Seneviratne</FamilyName>
</EditorName>
<Contact>
<Email>aruna.seneviratne@nicta.com.au</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Thomas</GivenName>
<FamilyName>Strang</FamilyName>
</EditorName>
<Contact>
<Email>Thomas.Strang@dlr.de</Email>
</Contact>
</Editor>
</EditorGroup>
</BookHeader>
<Chapter ID="Chap22" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingStyle="Unnumbered" TocLevels="0">
<ChapterID>22</ChapterID>
<ChapterDOI>10.1007/978-3-540-74853-3_22</ChapterDOI>
<ChapterSequenceNumber>22</ChapterSequenceNumber>
<ChapterTitle Language="En">Safeguarding Location Privacy in Wireless Ad-Hoc Networks</ChapterTitle>
<ChapterFirstPage>372</ChapterFirstPage>
<ChapterLastPage>390</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<BookID>978-3-540-74853-3</BookID>
<BookTitle>UbiComp 2007: Ubiquitous Computing</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Tanzima</GivenName>
<FamilyName>Hashem</FamilyName>
</AuthorName>
<Contact>
<Email>thashem@csse.unimelb.edu.au</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Lars</GivenName>
<FamilyName>Kulik</FamilyName>
</AuthorName>
<Contact>
<Email>lars@csse.unimelb.edu.au</Email>
</Contact>
</Author>
<Affiliation ID="Aff1">
<OrgName>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010</OrgName>
<OrgAddress>
<Country>Australia</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>We present a novel algorithm that safeguards the location privacy of users accessing location-based services via mobile devices. Our technique exploits the capability of mobile devices to form wireless ad-hoc networks in order to hide a user’s identity and position. Local ad-hoc networks enable us to separate an agent’s request for location information, the query initiator, from the agent that actually requests this service on its behalf, the query requestor. Since a query initiator can select itself or one of the
<Emphasis Type="Italic">k</Emphasis>
 − 1 agents in its ad-hoc network as a query requestor, the query initiator remains
<Emphasis Type="Italic">k</Emphasis>
-anonymous. In addition, the location revealed to the location service provider is a rectangle instead of an exact coordinate. We develop an anonymous selection algorithm that selects a query requestor with near-uniform randomness, which is a key component to ensure anonymity in an ad-hoc network. Our experiments show that a system can ensure a high quality of service and maintain a high degree of privacy in terms of anonymity and obfuscation while accessing location-based services.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Safeguarding Location Privacy in Wireless Ad-Hoc Networks</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Safeguarding Location Privacy in Wireless Ad-Hoc Networks</title>
</titleInfo>
<name type="personal">
<namePart type="given">Tanzima</namePart>
<namePart type="family">Hashem</namePart>
<affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</affiliation>
<affiliation>E-mail: thashem@csse.unimelb.edu.au</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Lars</namePart>
<namePart type="family">Kulik</namePart>
<affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</affiliation>
<affiliation>E-mail: lars@csse.unimelb.edu.au</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference [eBooks]" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2007</dateIssued>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: We present a novel algorithm that safeguards the location privacy of users accessing location-based services via mobile devices. Our technique exploits the capability of mobile devices to form wireless ad-hoc networks in order to hide a user’s identity and position. Local ad-hoc networks enable us to separate an agent’s request for location information, the query initiator, from the agent that actually requests this service on its behalf, the query requestor. Since a query initiator can select itself or one of the k − 1 agents in its ad-hoc network as a query requestor, the query initiator remains k-anonymous. In addition, the location revealed to the location service provider is a rectangle instead of an exact coordinate. We develop an anonymous selection algorithm that selects a query requestor with near-uniform randomness, which is a key component to ensure anonymity in an ad-hoc network. Our experiments show that a system can ensure a high quality of service and maintain a high degree of privacy in terms of anonymity and obfuscation while accessing location-based services.</abstract>
<relatedItem type="host">
<titleInfo>
<title>UbiComp 2007: Ubiquitous Computing</title>
<subTitle>9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="family">Krumm</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gregory</namePart>
<namePart type="given">D.</namePart>
<namePart type="family">Abowd</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Aruna</namePart>
<namePart type="family">Seneviratne</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Thomas</namePart>
<namePart type="family">Strang</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="Book Series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book Subject Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book Subject Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14029">Software Engineering</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14050">Systems and Data Security</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18040">Information Systems Applications (incl.Internet)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18067">User Interfaces and Human Computer Interaction</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24040">Computers and Society</topic>
</subject>
<identifier type="DOI">10.1007/978-3-540-74853-3</identifier>
<identifier type="ISBN">978-3-540-74852-6</identifier>
<identifier type="eISBN">978-3-540-74853-3</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">152522</identifier>
<identifier type="BookID">978-3-540-74853-3</identifier>
<identifier type="BookChapterCount">29</identifier>
<identifier type="BookVolumeNumber">4717</identifier>
<identifier type="BookSequenceNumber">4717</identifier>
<part>
<date>2007</date>
<detail type="volume">
<number>4717</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>372</start>
<end>390</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">1D94B713E6BE61C9192732B1117AE302C83FB005</identifier>
<identifier type="DOI">10.1007/978-3-540-74853-3_22</identifier>
<identifier type="ChapterID">22</identifier>
<identifier type="ChapterID">Chap22</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2007</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</mods>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 003038 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 003038 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:1D94B713E6BE61C9192732B1117AE302C83FB005
   |texte=   Safeguarding Location Privacy in Wireless Ad-Hoc Networks
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024