2009
DOI: 10.1007/978-3-642-11284-3_18
|View full text |Cite
|
Sign up to set email alerts
|

Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

Abstract: Abstract. Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy -access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…On the other hand, the position of the user may also be represented by geometric coordinates; in other words, longitude and latitude are the map coordinates that are used to indicate the location of the user. This indicates that the user's position, denoted by l, is a two-dimensional vector, with the first element being denoted by l [1] and another element being denoted by l [2]. As displayed in Figure 3, there is a user located at s 10 , and the user's coordinates may be stated as follows:…”
Section: Two Coordinate Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, the position of the user may also be represented by geometric coordinates; in other words, longitude and latitude are the map coordinates that are used to indicate the location of the user. This indicates that the user's position, denoted by l, is a two-dimensional vector, with the first element being denoted by l [1] and another element being denoted by l [2]. As displayed in Figure 3, there is a user located at s 10 , and the user's coordinates may be stated as follows:…”
Section: Two Coordinate Systemsmentioning
confidence: 99%
“…In addition to bringing convenience to people's daily life, LBS also makes great efforts in network services. In References 1 and 2, the network firewall can gain control of network services based on specific location messages. However, the service providers totally control over the location information of users, and consumers are progressively starting to wonder if this control will lead to the improper use or sale of their information.…”
Section: Introductionmentioning
confidence: 99%