Skip to main content

Abstract

The goal of ubiquitous computing research is refine devices to the where their use is transparent. For many applications with mobile devices, transparent operation requires that the device be location-aware. Unfortunately, the location of an individual can be used to infer highly private information. Hence, these devices must be carefully designed, lest they become a ubiquitous surveillance system.

This paper overviews existing location-sensing mobile devices, vectors for a privacy invasion, and proposed solutions. Particular attention is paid to required infrastructure and the accuracy of the location information which can be stolen. Solutions are examined from the perspective of attacks which can be reasonably expected against these systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Joseph Bailey. Internet Price Discrimination: Self-Regulation, Public Policy, and Global Electronic Commerce, 1998.

    Google Scholar 

  2. Alastair R. Beresford and Prank Stajano. Location Privacy in Pervasive Computing. PERVASIVE computing, IEEE CS and IEEE Communications Society, (1):46–55, 2003.

    Article  Google Scholar 

  3. David Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84–88, 1981.

    Article  Google Scholar 

  4. Lorrie Cranor, Marc Langheinrich, Massimo Marchiori, Martin Presler-Marshall, and Joseph Reagle. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. http://www.w3.org/TR/P3P/, seen 2004.

    Google Scholar 

  5. Sastry Duri, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, and Jung-Mu Tang. Framework for Security and Privacy in Automotive Telematics. In International Conference on Mobile Computing and Networking, pages 25–32. ACM Press, 2002.

    Google Scholar 

  6. Hannes Federrath, Anja Jerichow, and Andreas Pfitzmann. MIXes in Mobile Communication Systems: Location Management with Privacy. In Information Hiding, pages 121–135, 1996.

    Google Scholar 

  7. Hannes Federrath and Jürgen Thees. Schutz der Vertraulichkeit des Aufenthaltsorts von Mobilfunkteilnehmern. Datenschutz und Datensicherung, Verlag Vieweg, Wiesbaden, 6(6):338–348, 1995.

    Google Scholar 

  8. Klaus Finkenzeller. RFID-Handbook, 2nd Edition. Wiley & Sons LTD, 2003.

    Google Scholar 

  9. I. A. Getting. The Global Positioning System. IEEE Spectrum, 30(12):36–47, December 1993.

    Article  Google Scholar 

  10. Marco Gruteser and Dirk Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In MobiSys, pages 31–42. USENIX, 2003.

    Google Scholar 

  11. Jason Hong, Gaetano Borriello, James Landay, David McDonald, Bill Schilit, and Doug Tygar. Privacy and Security in the Location-enhanced World Wide Web. In Proceedings of Ubicomp 2003, October 2003.

    Google Scholar 

  12. Ari Juels, Ronald L. Rivest, and Michael Szydlo. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In V. Atluri, ed. 8th ACM Conference on Computer and Communications Security, pages 103–111. ACM Press, 2003.

    Google Scholar 

  13. Jiejun Kong and Xiaoyan Hong. ANODR: A Nonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, pages 291–302. ACM Press, 2003.

    Google Scholar 

  14. Marc Langheinrich. Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems. In Gregory D. Abowd, Barry Brumitt, and Steven A. Shafer, editors, Ubicomp, volume 2201 of Lecture Notes in Computer Science, pages 273–291. Springer, 2001.

    Google Scholar 

  15. Marc Langheinrich. A Privacy Awareness System for Ubiquitous Computing Environments. In Gaetano Borriello and Lars Erik Holmquist, editors, Ubicomp, volume 2498 of Lecture Notes in Computer Science, pages 237–245. Springer, 2002.

    Google Scholar 

  16. Adam Laurie. Serious Flaws in Bluetooth Security Lead to Disclosure of Personal Data, http://www.bluestumbler.org, 2003.

    Google Scholar 

  17. Mobiloco-Location Based Services for Mobile Communities. http://www.mobiloco.de/.

    Google Scholar 

  18. Nissanka B. Priyantha, Anit Chakraborty, and Hari Balakrishnan. The Cricket Location-Support System. In Mobile Computing and Networking, pages 32–43, 2000.

    Google Scholar 

  19. Jeffrey H. Reed, Kevin J. Krizman, Brian D. Woerner, and Theodore S. Rappaport. An Overview of the Challenges and Progress in Meeting the E-911 Requirement for Location Service. IEEE Communications Magazine, 5(3):30–37, April 1998.

    Article  Google Scholar 

  20. Bill Schilit, Anthony LaMarca, Gaetano Borriello, William Griswold, David McDonald, Edward Lazowska, Anand Balachandran, Jason Hong, and Vaughn Iverson. Challenge: Ubiquitous Location-Aware Computing and the Place Lab Initiative. In Proceedings of The First ACM International Workshop on Wireless Mobile Applications and Services on WLAN (WMASH 2003). ACM Press, September 2003.

    Google Scholar 

  21. Asim Smailagic, Daniel P. Siewiorek, Joshua Anhalt, David Kogan, and Yang Wang. Location Sensing and Privacy in a Context Aware Computing Environment. In Pervasive Computing, 2001.

    Google Scholar 

  22. Einar Snekkenes. Concepts for Personal Location Privacy Policies. In Proceedings of the 3rd ACM Conference on Electronic Commerce, pages 48–57. ACM Press, 2001.

    Google Scholar 

  23. Roy Want, Andy Hopper, Veronica Falcão, and Jonathan Gibbons. The Active Badge Location System. ACM Transactions on Information Systems, 10(1):91–102, 1992.

    Article  Google Scholar 

  24. Andy Ward, Alan Jones, and Andy Hopper. A New Location Technique for the Active Office. IEEE Personal Communication, 4(5):42–47, 1997.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Görlach, A., Heinemann, A., Terpstra, W.W. (2005). Survey on Location Privacy in Pervasive Computing. In: Robinson, P., Vogt, H., Wagealla, W. (eds) Privacy, Security and Trust within the Context of Pervasive Computing. The International Series in Engineering and Computer Science, vol 780. Springer, Boston, MA. https://doi.org/10.1007/0-387-23462-4_3

Download citation

  • DOI: https://doi.org/10.1007/0-387-23462-4_3

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-23461-8

  • Online ISBN: 978-0-387-23462-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics