Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization

被引:17
作者
Li, Shujun [1 ]
Li, Hong [2 ]
Sun, Limin [2 ]
机构
[1] Yancheng Teachers Univ, Sch Informat Engn, Yancheng, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IOT Informat Secur Technol, Beijing, Peoples R China
基金
中国国家自然科学基金; 英国工程与自然科学研究理事会;
关键词
Privacy; Crowdsourcing; Site survey; Differential privacy;
D O I
10.1186/s13638-016-0624-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Typically, site survey is an inevitable phase for WiFi fingerprint-based localization which is regarded as one of the most promising techniques for indoor localization. However, the site survey can cause potential location privacy leakage for the participants who contribute their WiFi fingerprint measurements. In this paper, we propose a privacy-preserving site survey scheme for WiFi fingerprint-based localization. In the proposed scheme, we use homomorphic encryption to protect the location privacy of the participants which get involved in the site survey. Further, we employ differential privacy model to ensure that the released data will not breach an individual's location privacy regardless of whether she is present or absent in the site survey group. We theoretically analyze the security of the proposed scheme and use simulation experiments on a real-world data to validate the efficiency of the proposed scheme.
引用
收藏
页数:9
相关论文
共 24 条
  • [1] Andres M.E., 2013, P ACM SIGSAC C COMP, P901
  • [2] Bahl P., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P775, DOI 10.1109/INFCOM.2000.832252
  • [3] Mix zones: User privacy in location-aware services
    Beresford, AR
    Stajano, F
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 127 - 131
  • [4] Privacy in Mobile Computing for Location-Sharing-Based Services
    Bilogrevic, Igor
    Jadliwala, Murtuza
    Kalkan, Kubra
    Hubaux, Jean-Pierre
    Aad, Imad
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2011, 6794 : 77 - +
  • [5] Chen A., 2007, ACM SIGMOBILE MOBILE, V11, P48
  • [6] Cheng W, 2012, LECT NOTES COMPUT SC, V7405, P31, DOI 10.1007/978-3-642-31869-6_3
  • [7] Dwork C., 2011, Differential Privacy, P338, DOI 10.1007/978-1-4419-5906-5_752
  • [8] Garcia FD, 2011, LECT NOTES COMPUT SC, V6710, P226, DOI 10.1007/978-3-642-22444-7_15
  • [9] A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
    He, Yunhua
    Sun, Limin
    Yang, Weidong
    Li, Hong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [10] Hua Y, 2013, IEEE INFOCOM SER, P1303