scispace - formally typeset
Journal ArticleDOI

Location privacy in pervasive computing

Alastair R. Beresford, +1 more
- 01 Jan 2003 - 
- Vol. 2, Iss: 1, pp 46-55
Reads0
Chats0
TLDR
The mix zone is introduced-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity, based on frequently changing pseudonyms.
Abstract
As location-aware applications begin to track our movements in the name of convenience, how can we protect our privacy? This article introduces the mix zone-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity. It is based on frequently changing pseudonyms.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A survey of indoor positioning systems for wireless personal networks

TL;DR: A comprehensive survey of numerous IPSs, which include both commercial products and research-oriented solutions are given, and the trade-offs among these systems are outlined from the viewpoint of a user in a PN.
Journal ArticleDOI

Trajectory Data Mining: An Overview

TL;DR: A systematic survey on the major research into trajectory data mining, providing a panorama of the field as well as the scope of its research topics, and introduces the methods that transform trajectories into other data formats, such as graphs, matrices, and tensors.
Proceedings ArticleDOI

The new Casper: query processing for location services without compromising privacy

TL;DR: Zhang et al. as mentioned in this paper presented Casper1, a new framework in which mobile and stationary users can entertain location-based services without revealing their location information, which consists of two main components, the location anonymizer and the privacy-aware query processor.
Proceedings ArticleDOI

An anonymous communication technique using dummies for location-based services

TL;DR: This paper proposes an anonymous communication technique to protect the location privacy of the users of location-based services and describes a cost reduction technique for communication between a client and a server.
Journal ArticleDOI

A survey of computational location privacy

TL;DR: This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information, which includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data.
References
More filters
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Journal ArticleDOI

The active badge location system

TL;DR: A novel system for the location of people in an office environment is described, where members of staff wear badges that transmit signals providing information about their location to a centralized location service, through a network of sensors.
Proceedings ArticleDOI

The Cricket location-support system

TL;DR: The randomized algorithm used by beacons to transmit information, the use of concurrent radio and ultrasonic signals to infer distance, the listener inference algorithms to overcome multipath and interference, and practical beacon configuration and positioning techniques that improve accuracy are described.
Journal ArticleDOI

Untraceable electronic mail, return addresses, and digital pseudonyms

TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.

Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms.

TL;DR: In this article, a technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication -in spite of an unsecured underlying telecommunication system.
Related Papers (5)