An Experimental Study of CSI Management to Preserve Location Privacy

被引:11
|
作者
Cominelli, Marco [1 ]
Kosterhon, Felix [2 ]
Gringoli, Francesco [1 ]
Lo Cigno, Renato [1 ]
Asadi, Arash [3 ]
机构
[1] Univ Brescia, DII, Brescia, Italy
[2] Tech Univ Darmstadt, SEEMOO, Darmstadt, Germany
[3] Tech Univ Darmstadt, WISE SEEMOO, Darmstadt, Germany
基金
欧盟地平线“2020”;
关键词
localization; privacy; channel state information; neural networks; Wi-Fi; randomization; experiments and measures;
D O I
10.1145/3411276.3412187
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Passive device-free localization of a person exploiting the Channel State Information (CSI) from Wi-Fi signals is quickly becoming a reality. While this capability would enable new applications and services, it also raises concerns about citizens' privacy. In this work, we propose a carefully-crafted obfuscating technique against one of such CSI-based localization methods. In particular, we modify the transmitted I/Q samples by leveraging an irreversible randomized sequence. I/Q symbol manipulation at the transmitter distorts the location-specific information in the CSI while preserving communication, so that an attacker can no longer derive information on user's location. We test this technique against a Neural Network (NN)-based localization system and show that the randomization of the CSI makes undesired localization practically unfeasible. Both the localization system and the randomization CSI management are implemented in real devices. The experimental results obtained in our laboratory show that the considered localization method (first proposed in an MSc thesis) works smoothly regardless of the environment, and that adding random information to the CSI mess up the localization, thus providing the community with a system that preserve location privacy and communication performance at the same time.
引用
收藏
页码:64 / 71
页数:8
相关论文
共 50 条
  • [31] Multiple k-hop clusters based routing scheme to preserve source-location privacy in WSNs
    任炬
    张尧学
    刘康
    Journal of Central South University, 2014, 21 (08) : 3155 - 3168
  • [32] The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study
    Alnajrani, Hussain Mutlaq
    Norman, Azah Anir
    SYMMETRY-BASEL, 2020, 12 (12): : 1 - 24
  • [33] Locus of Control and Location Privacy: An Empirical Study in Singapore
    Xu, Heng
    JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT, 2010, 13 (03) : 63 - 87
  • [34] SIoT identity management with the ability to preserve owner privacy and built-in resistance to Sybil attacks
    Dayyani, Aboulfazl
    Abbaspour, Maghsoud
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23):
  • [35] LOCATION OBFUSCATION FOR LOCATION DATA PRIVACY
    Kachore, Vaibhav Ankush
    Lakshmi, J.
    Nandy, S. K.
    2015 IEEE WORLD CONGRESS ON SERVICES, 2015, : 213 - 220
  • [36] A Data Pipeline to Preserve Privacy in Educational Settings
    Tsoni, Rozita
    Zorkadis, Vasilios
    Verykios, Vassilios S.
    25TH PAN-HELLENIC CONFERENCE ON INFORMATICS WITH INTERNATIONAL PARTICIPATION (PCI2021), 2021, : 138 - 142
  • [37] Can Cryptocurrencies Preserve Privacy and Comply With Regulations?
    Goodell, Geoff
    Aste, Tomaso
    FRONTIERS IN BLOCKCHAIN, 2019, 2
  • [38] Cache Management Techniques for Privacy Preserving Location-based Services
    Chen, Yu
    Bao, Jie
    Ku, Wei-Shinn
    Huang, Jiun-Long
    2008 NINTH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT WORKSHOPS, 2008, : 80 - +
  • [39] RFID-based location information management system with privacy awareness
    Iwai, M
    Tokuda, H
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 468 - 471
  • [40] Privacy Management on Facebook: Do Device Type and Location of Posting Matter?
    Suh, Jennifer Jiyoung
    Hargittai, Eszter
    SOCIAL MEDIA + SOCIETY, 2015, 1 (02):