Advertisement

KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network

  • Yuanbo Cui
  • Fei Gao
  • Hua ZhangEmail author
  • Wenmin Li
  • Zhengping Jin
Methodologies and Application
  • 19 Downloads

Abstract

The widely used smartphone with powerful positioning capability makes it easy for a user to find his precise physical location. However, this may reveal a user’s geo-location information, making the real-time tracking of the user possible. For example, on the basis of a sequence of numbers (i.e., Cell-IDs) received in the Cell-ID positioning, an entity can gain access to a person’s movement routes without his consent. We argue that if the trajectory of a person is traced, then all his visits may be exposed. Therefore, trajectory cloaking against the mobile positioning is urgently necessary. In this paper, we propose a dummy base station replacement (DBSR) algorithm. It mainly uses the idea of dummy trajectory anonymity and is achieved by replacing the true Cell-ID provided by the network with a fake but nearby Cell-ID. We also implement our DBSR algorithm on an Android-based smartphone to evaluate its performance. Experimental results show that the DBSR algorithm can efficiently tackle the privacy breach caused by the single-base-station positioning in cellular network.

Keywords

Cellular network Cell-ID positioning Hausdorff distance Trajectory privacy KNN search 

Notes

Acknowledgements

This work is supported by NSFC (Grant No. 61502044), the Fundamental Research Funds for the Central Universities (Grant No. 2015RC23).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. Cheung AS (2014) Location privacy: the challenges of mobile service devices. Comput Law Secur Rev 30(1):41–54CrossRefGoogle Scholar
  2. Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. ACM Sigkdd Explor Newsl 13(1):19–29CrossRefGoogle Scholar
  3. Chow CY, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2):351–380CrossRefGoogle Scholar
  4. Drane C, Macnaughtan M, Scott C (1998) Positioning GSM telephones. IEEE Commun Mag 36(4):46–54CrossRefGoogle Scholar
  5. Firoozjaei MD, Yu J, Choi H, Kim H (2016) Privacy-preserving nearest neighbor queries using geographical features of cellular networks. Comput Commun 98:11–19CrossRefGoogle Scholar
  6. Garcia V, Debreuve E, Barlaud M (2008) Fast k nearest neighbor search using GPU. In: IEEE computer society conference on computer vision and pattern recognition workshops, 2008. CVPRW’08. IEEE, pp 1–6Google Scholar
  7. Gedik B, Liu L (2007) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1–18CrossRefGoogle Scholar
  8. Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services, ACM, pp 31–42Google Scholar
  9. Gustafsson F, Gunnarsson F (2005) Mobile positioning using wireless networks: possibilities and fundamental limitations based on available wireless network measurements. IEEE Sig Process Mag 22(4):41–53CrossRefGoogle Scholar
  10. Hu H, Xu J (2009) Non-exposure location anonymity. In: 2009 IEEE 25th international conference on data engineering, IEEE, pp 1120–1131Google Scholar
  11. Huo Z, Huang Y, Meng X (2011) History trajectory privacy-preserving through graph partition. In: Proceedings of the 1st international workshop on Mobile location-based service, ACM, pp 71–78Google Scholar
  12. Kane S, Thurm S (2010) Your apps are watching you. WALL ST J (Dec 17, 2010). http://on.wsj.com/wq7Wiw
  13. Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: ICPS’05. Proceedings. International Conference on Pervasive Services, 2005, IEEE, pp 88–97Google Scholar
  14. Krievs R (2002) Using fading to improve accuracy of cell id based mobile positioning algorithms: analysis of special cases. In: Scientific Proceedings of RTU, Series, vol 7Google Scholar
  15. Lei PR, Peng WC, Su IJ, Chang CP et al (2012) Dummy-based schemes for protecting movement trajectories. J Inf Sci Eng 28(2):335–350MathSciNetGoogle Scholar
  16. Ma T, Jia J, Xue Y, Tian Y, Al-Dhelaan A, Al-Rodhaan M (2018) Protection of location privacy for moving knn queries in social networks. Appl Soft Comput 66:525–532.  https://doi.org/10.1016/j.asoc.2017.08.027 CrossRefGoogle Scholar
  17. Mokbel MF, Chow CY, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on Very large data bases, VLDB Endowment, pp 763–774Google Scholar
  18. Niu B, Li Q, Zhu X, Cao G, Li H (2014a) Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014-IEEE conference on computer communications, IEEE, pp 754–762Google Scholar
  19. Niu B, Zhang Z, Li X, Li H (2014b) Privacy-area aware dummy generation algorithms for location-based services. In: 2014 IEEE international conference on communications (ICC), IEEE, pp 957–962Google Scholar
  20. Niu B, Zhu X, Li W, Li H, Wang Y, Lu Z (2015) A personalized two-tier cloaking scheme for privacy-aware location-based services. In: 2015 International conference on computing, networking and communications (ICNC), IEEE, pp 94–98Google Scholar
  21. Paek J, Kim KH, Singh JP, Govindan R (2011) Energy-efficient positioning for smartphones using cell-id sequence matching. In: Proceedings of the 9th international conference on Mobile systems, applications, and services, ACM, pp 293–306Google Scholar
  22. Peng T, Liu Q, Wang G, Xiang Y (2016) Privacy preserving scheme for location and content protection in location-based services. In: International conference on securityGoogle Scholar
  23. Peng WC, Ko YZ, Lee WC (2006) On mining moving patterns for object tracking sensor networks. In: 7th international conference on mobile data management (MDM’06), IEEE, pp 41–41Google Scholar
  24. Pro (2018) Profone GSM tracker. http://cellphonetrackers.org/gsm/gem-tracker.php
  25. Sohn T, Varshavsky A, LaMarca A, Chen MY, Choudhury T, Smith I, Consolvo S, Hightower J, Griswold WG, De Lara E (2006) Mobility detection using everyday GSM traces. In: International conference on ubiquitous computing, Springer, pp 212–224Google Scholar
  26. Sun G, Chen J, Guo W, Liu KR (2005) Signal processing techniques in network-aided positioning: a survey of state-of-the-art positioning designs. IEEE Signal Process Mag 22(4):12–23CrossRefGoogle Scholar
  27. Tao P, Qin L, Wang G (2014) Enhanced location privacy preserving scheme in location-based services. IEEE Syst J PP(99):1–12Google Scholar
  28. Trevisani E, Vitaletti A (2004) Cell-id location technique, limits and benefits: an experimental study. In: Sixth IEEE workshop on mobile computing systems and applications, 2004 WMCSA 2004. IEEE, pp 51–60Google Scholar
  29. Varshavsky A (2005) Are GSM phones the solution for localization? In: Seventh IEEE workshop on mobile computing systems and applications (WMCSA’06 Supplement), IEEE, pp 34–42Google Scholar
  30. Web (2018) Network architecture. http://www.3gpp.org/ftp/Specs/html-info/0302.htm
  31. Wigren T (2007) Adaptive enhanced cell-id fingerprinting localization by clustering of precise position measurements. IEEE Trans Veh Technol 56(5):3199–3209CrossRefGoogle Scholar
  32. Wiki (2018) Cell global identity. https://en.wikipedia.org/wiki/Cell_GlobalIdentity
  33. Yin C, Xi J, Sun R, Wang J (2018) Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Trans Ind Inf 14(8):3628–3636.  https://doi.org/10.1109/TII.2017.2773646 CrossRefGoogle Scholar
  34. Zhu X, Chi H, Niu B, Zhang W, Li Z, Li H (2014) Mobicache: when k-anonymity meets cache. In: Global communications conference, pp 820–825Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingChina

Personalised recommendations