Home > Research > Publications & Outputs > Localization to Enhance Security and Services i...
View graph of relations

Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

Research output: Contribution in Book/Report/ProceedingsPaper

Published
Publication date2009
Host publicationCommunications Infrastructure. Systems and Applications in Europe
EditorsRashid Mehmood, Eduardo Cerqueira, Radoslaw Piesiewicz, Imrich Chlamtac, Ozgur Akan, Paolo Bellavista, Jiannong Cao, Falko Dressler, Domenico Ferrari, Mario Gerla, Hisashi Kobayashi, Sergio Palazzo, Sartaj Sahni, Xuemin (Sherman) Shen, Mircea Stan, Jia Xiaohua, Albert Zomaya, Geoffrey Coulson
Place of PublicationBerlin
PublisherSpringer-Verlag
Pages175-188
Number of pages14
Volume16
ISBN (Electronic)978-3-642-11284-3
ISBN (Print)978-3-642-11283-6
<mark>Original language</mark>English
EventFirst International ICST Conference - London, United Kingdom

Conference

ConferenceFirst International ICST Conference
CountryUnited Kingdom
CityLondon
Period11/08/0913/08/09

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
PublisherSpringer Berlin Heidelberg

Conference

ConferenceFirst International ICST Conference
CountryUnited Kingdom
CityLondon
Period11/08/0913/08/09

Abstract

Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations.