Home > Research > Publications & Outputs > Localization to Enhance Security and Services i...
View graph of relations

Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints. / Ayres, Gareth; Mehmood, Rashid; Mitchell, Keith et al.
Communications Infrastructure. Systems and Applications in Europe. ed. / Rashid Mehmood; Eduardo Cerqueira; Radoslaw Piesiewicz; Imrich Chlamtac; Ozgur Akan; Paolo Bellavista; Jiannong Cao; Falko Dressler; Domenico Ferrari; Mario Gerla; Hisashi Kobayashi; Sergio Palazzo; Sartaj Sahni; Xuemin (Sherman) Shen; Mircea Stan; Jia Xiaohua; Albert Zomaya; Geoffrey Coulson. Vol. 16 Berlin: Springer-Verlag, 2009. p. 175-188 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Ayres, G, Mehmood, R, Mitchell, K & Race, NJP 2009, Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints. in R Mehmood, E Cerqueira, R Piesiewicz, I Chlamtac, O Akan, P Bellavista, J Cao, F Dressler, D Ferrari, M Gerla, H Kobayashi, S Palazzo, S Sahni, X Shen, M Stan, J Xiaohua, A Zomaya & G Coulson (eds), Communications Infrastructure. Systems and Applications in Europe. vol. 16, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer-Verlag, Berlin, pp. 175-188, First International ICST Conference, London, United Kingdom, 11/08/09. https://doi.org/10.1007/978-3-642-11284-3_18

APA

Ayres, G., Mehmood, R., Mitchell, K., & Race, N. J. P. (2009). Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints. In R. Mehmood, E. Cerqueira, R. Piesiewicz, I. Chlamtac, O. Akan, P. Bellavista, J. Cao, F. Dressler, D. Ferrari, M. Gerla, H. Kobayashi, S. Palazzo, S. Sahni, X. Shen, M. Stan, J. Xiaohua, A. Zomaya, & G. Coulson (Eds.), Communications Infrastructure. Systems and Applications in Europe (Vol. 16, pp. 175-188). (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering). Springer-Verlag. https://doi.org/10.1007/978-3-642-11284-3_18

Vancouver

Ayres G, Mehmood R, Mitchell K, Race NJP. Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints. In Mehmood R, Cerqueira E, Piesiewicz R, Chlamtac I, Akan O, Bellavista P, Cao J, Dressler F, Ferrari D, Gerla M, Kobayashi H, Palazzo S, Sahni S, Shen X, Stan M, Xiaohua J, Zomaya A, Coulson G, editors, Communications Infrastructure. Systems and Applications in Europe. Vol. 16. Berlin: Springer-Verlag. 2009. p. 175-188. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering). doi: 10.1007/978-3-642-11284-3_18

Author

Ayres, Gareth ; Mehmood, Rashid ; Mitchell, Keith et al. / Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints. Communications Infrastructure. Systems and Applications in Europe. editor / Rashid Mehmood ; Eduardo Cerqueira ; Radoslaw Piesiewicz ; Imrich Chlamtac ; Ozgur Akan ; Paolo Bellavista ; Jiannong Cao ; Falko Dressler ; Domenico Ferrari ; Mario Gerla ; Hisashi Kobayashi ; Sergio Palazzo ; Sartaj Sahni ; Xuemin (Sherman) Shen ; Mircea Stan ; Jia Xiaohua ; Albert Zomaya ; Geoffrey Coulson. Vol. 16 Berlin : Springer-Verlag, 2009. pp. 175-188 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

Bibtex

@inproceedings{c8b02ffb5ca24d8a9147ed2310a3fa2c,
title = "Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints",
abstract = "Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations.",
author = "Gareth Ayres and Rashid Mehmood and Keith Mitchell and Race, {Nicholas J. P.}",
year = "2009",
doi = "10.1007/978-3-642-11284-3_18",
language = "English",
isbn = "978-3-642-11283-6",
volume = "16",
series = "Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering",
publisher = "Springer-Verlag",
pages = "175--188",
editor = "Rashid Mehmood and Eduardo Cerqueira and Radoslaw Piesiewicz and Imrich Chlamtac and Ozgur Akan and Paolo Bellavista and Jiannong Cao and Falko Dressler and Domenico Ferrari and Mario Gerla and Hisashi Kobayashi and Sergio Palazzo and Sartaj Sahni and Shen, {Xuemin (Sherman)} and Mircea Stan and Jia Xiaohua and Albert Zomaya and Geoffrey Coulson",
booktitle = "Communications Infrastructure. Systems and Applications in Europe",
note = "First International ICST Conference ; Conference date: 11-08-2009 Through 13-08-2009",

}

RIS

TY - GEN

T1 - Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

AU - Ayres, Gareth

AU - Mehmood, Rashid

AU - Mitchell, Keith

AU - Race, Nicholas J. P.

PY - 2009

Y1 - 2009

N2 - Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations.

AB - Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations.

U2 - 10.1007/978-3-642-11284-3_18

DO - 10.1007/978-3-642-11284-3_18

M3 - Conference contribution/Paper

SN - 978-3-642-11283-6

VL - 16

T3 - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

SP - 175

EP - 188

BT - Communications Infrastructure. Systems and Applications in Europe

A2 - Mehmood, Rashid

A2 - Cerqueira, Eduardo

A2 - Piesiewicz, Radoslaw

A2 - Chlamtac, Imrich

A2 - Akan, Ozgur

A2 - Bellavista, Paolo

A2 - Cao, Jiannong

A2 - Dressler, Falko

A2 - Ferrari, Domenico

A2 - Gerla, Mario

A2 - Kobayashi, Hisashi

A2 - Palazzo, Sergio

A2 - Sahni, Sartaj

A2 - Shen, Xuemin (Sherman)

A2 - Stan, Mircea

A2 - Xiaohua, Jia

A2 - Zomaya, Albert

A2 - Coulson, Geoffrey

PB - Springer-Verlag

CY - Berlin

T2 - First International ICST Conference

Y2 - 11 August 2009 through 13 August 2009

ER -