IEEE INFOCOM 2018 - IEEE Conference on Computer Communications 2018
DOI: 10.1109/infocom.2018.8486221
|View full text |Cite
|
Sign up to set email alerts
|

The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption

Abstract: Localization based on premeasured WiFi fingerprints is a popular method for indoor localization where satellite based positioning systems are unavailable. In these systems, privacy of the user's location is lost because the location is computed by the service provider. In INFOCOM'14, Li et al. presented PriWFL, a WiFi fingerprint localization system based on additively homomorphic Paillier encryption, that was claimed to protect both the users' location privacy and the service provider's database privacy. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
59
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 50 publications
(61 citation statements)
references
References 27 publications
1
59
0
Order By: Relevance
“…Recently, several solutions, e.g. [13,12,24,22], have been proposed to protect the clients' location privacy in ILSs. However, only a few pieces of research (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, several solutions, e.g. [13,12,24,22], have been proposed to protect the clients' location privacy in ILSs. However, only a few pieces of research (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…We provide detailed benchmarking results for our best-performing and most precise algorithms for ranges of Reference Points (RPs) and Wi-Fi Access Points (APs). In addition, we provide even more detailed benchmarks for the same practical setting as in [35] with M =505 RPs and N =241 APs. Our most efficient algorithm has an online run-time of 0.15 s on two commodity servers which is orders of magnitude faster than prior work.…”
Section: B Our Contributionsmentioning
confidence: 99%
“…Li et al [37] design algorithms for Privacy-Preserving Indoor Localization (PPIL) based on the k-Nearest Neighbors (k-NN) algorithm relying on Paillier encryption. Their work has several shortcomings: Yang and Järvinen [35] very recently presented an attack against this system that reveals the server's database under a realistic attack model. Our most efficient Euclidean distance-based PPIL protocol performs 121× faster with respect to the total run-time and 553× faster in the online phase than the protocol of [37] (see §VI-E for details).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations