2016
DOI: 10.1186/s13638-016-0624-2
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization

Abstract: Typically, site survey is an inevitable phase for WiFi fingerprint-based localization which is regarded as one of the most promising techniques for indoor localization. However, the site survey can cause potential location privacy leakage for the participants who contribute their WiFi fingerprint measurements. In this paper, we propose a privacy-preserving site survey scheme for WiFi fingerprint-based localization. In the proposed scheme, we use homomorphic encryption to protect the location privacy of the par… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 22 publications
0
11
0
Order By: Relevance
“…Both entities must sacrifice part of their privacy to enjoy a quality crowdsourcing practice. For example, in No guidance for the user to choose appropriate security level Li et al [59] 2016 Hiding the location information of the suppliers in indoor site survey practices A homomorphic encryption scheme…”
Section: Summary and Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Both entities must sacrifice part of their privacy to enjoy a quality crowdsourcing practice. For example, in No guidance for the user to choose appropriate security level Li et al [59] 2016 Hiding the location information of the suppliers in indoor site survey practices A homomorphic encryption scheme…”
Section: Summary and Discussionmentioning
confidence: 99%
“…High computational complexity Encryption scheme for crowdtesting [57], [59], [86] Add noises to the test results Sensitive data cannot be revealed easily…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Through wardriving, we were able to capture publicly available data about each scanned Wi-Fi access point. Data includes: security protocol (WEP, WPA, WPA2 or OPN), channel being used, router manufacturer, SSID and BSSID [2,5]. The route we took throughout our wardrive spans from Beirut to Kaslik as shown in figure 1.…”
Section: War-drivingmentioning
confidence: 99%