Advertisement

Enhancement to the Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems

  • Jhonattan J. Barriga A.
  • Sang Guun YooEmail author
  • Juan Carlos Polo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11605)

Abstract

Indoor location-based application and services based on Wi-Fi have serious problems in terms of privacy since attackers could track users by capturing their MAC addresses. Although several initiatives have been proposed by scientific community to properly address authentication by strongly preserving privacy, there are still improvements and steps that need to be developed as it is not clearly stated what would occur if a device is lost, stole or compromised. It has not been said how an affected user should proceed in such case. In this situation, this work provides an enhancement to a previous solution based on pseudo-certificates issued by third-party authorities for anonymous authentication of mobile devices. The proposed scheme provides privacy to users willing to remove a device that has been stolen or lost. The proposed system offers security while maintaining minimal cryptographic overhead.

Keywords

Privacy Anonymous de-authentication Indoor positioning system IPS WLAN 

Notes

Acknowledgements

The authors gratefully acknowledge the financial support provided by the Escuela Politécnica Nacional, for the development of the project PIJ-17-08 – “Diseño e Implementación de un Sistema de Parqueadero Inteligente”.

References

  1. 1.
    Farid, Z., Nordin, R., Ismail, M.: Recent advances in wireless indoor localization techniques and system. J. Comput. Netw. Commun. 2013 (2013)Google Scholar
  2. 2.
    He, S., Chan, S.H.G.: Wi-Fi fingerprint-based indoor positioning: Recent advances and comparisons. IEEE Commun. Surv. Tutorials 18(1), 466–490 (2016)CrossRefGoogle Scholar
  3. 3.
    Stojanović, D.H., Stojanović, N.M.: Indoor localization and tracking: Methods, technologies and research challenges. Facta Univ. Ser.: Autom. Control Robot. 13(1), 57–72 (2014)Google Scholar
  4. 4.
    Deng, Z., Yu, Y., Yuan, X., Wan, N., Yang, L.: Situation and development tendency of indoor positioning. China Commun. 10(3), 42–55 (2013)CrossRefGoogle Scholar
  5. 5.
    Lohan, E.: User privacy risks and protection in WLAN-Based (2015)Google Scholar
  6. 6.
    Mendez, D., Papapanagiotou, I., Yang, B.: Internet of things: survey on security and privacy. Inf. Secur. J. Glob. Perspect. 1–16 (2017)Google Scholar
  7. 7.
    Chen, L., et al.: Robustness, security and privacy in location-based services for future IoT: a survey. IEEE Access 5, 8956–8977 (2017)CrossRefGoogle Scholar
  8. 8.
    Yoo, S.G., Barriga, J.J.: Privacy-aware authentication for Wi-Fi based indoor positioning systems. In: Batten, L., Kim, D.S., Zhang, X., Li, G. (eds.) ATIS 2017. CCIS, vol. 719, pp. 201–213. Springer, Singapore (2017).  https://doi.org/10.1007/978-981-10-5421-1_17CrossRefGoogle Scholar
  9. 9.
    Shah, M.D., Gala, S.N.: Lightweight authentication protocol used in wireless sensor network. In: 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA) Lightweight, pp. 138–143 (2014)Google Scholar
  10. 10.
    Ziegeldorf, J.H., Viol, N., Henze, M., Wehrle, K.: POSTER : privacy-preserving indoor localization. In: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), Oxford, United Kingdom (2014)Google Scholar
  11. 11.
    Wang, W., Chen, Y., Zhang, Q.: Privacy-preserving location authentication in Wi-Fi networks using fine-grained physical layer signatures. IEEE Trans. Wirel. Commun. 15, 1218–1225 (2015)CrossRefGoogle Scholar
  12. 12.
    Kim, S., Yoo, S.G., Kim, J.: Privacy protection mechanism for indoor positioning systems. Int. J. Appl. Eng. Res. 12(9), 1982–1986 (2017)Google Scholar
  13. 13.
    Agudo, I., Rios, R., Lopez, J.: A privacy-aware continuous authentication scheme for proximity-based access control. Comput. Secur. 39, 117–126 (2013)CrossRefGoogle Scholar
  14. 14.
    Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285–1292 (2012)Google Scholar
  15. 15.
    Fawaz, K., Kim, K., Shin, K.G.: Privacy vs. reward in indoor location-based services. Proc. Priv. Enhancing Technol. 2016(4), 102–122 (2016)CrossRefGoogle Scholar
  16. 16.
    Konstantinidis, A., Chatzimilioudis, G., Zeinalipour-Yazti, D., Mpeis, P., Pelekis, N., Theodoridis, Y.: Privacy-preserving indoor localization on smartphones. IEEE Trans. Knowl. Data Eng. 27(11), 3042–3055 (2015)CrossRefGoogle Scholar
  17. 17.
    Fal Sadikin, M., Kyas, M.: IMAKA-Tate: secure and efficient privacy preserving for indoor positioning applications, vol. 5760, March 2016Google Scholar
  18. 18.
    Yang, Z., Järvinen, K.: The death and rebirth of privacy-preserving WiFi fingerprint localization with paillier encryption (full version). In: IEEE International Conference on Computer Communications 2018 (INFOCOM 2018), p. 21 (2018)Google Scholar
  19. 19.
    Järvinen, K., et al.: PILOT: practical privacy-preserving indoor localization using outsourcing. In: 4th IEEE European Symposium on Security and Privacy, p. 16 (2019)Google Scholar
  20. 20.
    Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Facultad de Ingeniería de SistemasEscuela Politécnica NacionalQuitoEcuador
  2. 2.Smart LabEscuela Politécnica NacionalQuitoEcuador
  3. 3.Departamento de Ciencias de la ComputaciónUniversidad de las Fuerzas Armadas ESPESangolquiEcuador

Personalised recommendations