Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation
In a wireless communication network, it is possible to locate a user and track its trajectory based on its transmission, during communication with access points. This type of tracking leads to the breach of a user’s location privacy. Prior solutions to this problem enhances user’s location privacy at the expense of communication Quality of Service(QoS) degradation. In this paper, we propose silent cascade to enhance a user’ location privacy by trading users’ delay in silent cascade for anonymity. As a result, it avoids the problem of QoS degradation in prior solutions. Furthermore, we abstract silent cascade as a mix-network based formal model, and use this model to evaluate the performance of silent cascade. Study results prove the effectiveness of silent cascade under different types of QoS requirements. Besides, we also derive the optimal configuration of silent cascade to achieves target anonymity within minimum duration of time. and the theoretical upper bound of a silent cascade’s anonymity.
KeywordsMobile Station Silent Period Location Privacy Silent State Silent Ratio
Unable to display preview. Download preview PDF.
- 1.Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference (WCNC 2005), NL, U.S. (2005)Google Scholar
- 4.ITU-T: Methods for subjective determination of transmission quality, p.800 (1996)Google Scholar
- 8.3GPP: 1xev-dv evaluation methodology (v14), 3gpp2/tsg-c.r1002 (2003)Google Scholar
- 9.Castelluccia, C., Mutaf, P.: Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In: MobiSys 2005: Proceedings of the 3rd international conference on Mobile systems, applications, and services, pp. 51–64. ACM Press, New York (2005)Google Scholar
- 10.Beresford, A.R.: Location privacy in ubiquitous computing. PhD thesis, University of Cambridge (2005)Google Scholar
- 11.Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of ACM MobiSys 2003, San Francisco, CA, USA, USENIX, pp. 31–42 (2003)Google Scholar
- 13.Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: First International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece (2005)Google Scholar