Communications Infrastructure. Systems and Applications in Europe. First International ICST Conference, EuropeComm 2009, London, UK, August 11-13, 2009, Revised Selected Papers

Research Article

Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

Download
420 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-11284-3_18,
        author={Gareth Ayres and Rashid Mehmood and Keith Mitchell and Nicholas Race},
        title={Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints},
        proceedings={Communications Infrastructure. Systems and Applications in Europe. First International ICST Conference, EuropeComm 2009, London, UK, August 11-13, 2009, Revised Selected Papers},
        proceedings_a={EUROPECOMM},
        year={2012},
        month={5},
        keywords={Location-Awareness Security Privacy Visualisation Wireless Networks},
        doi={10.1007/978-3-642-11284-3_18}
    }
    
  • Gareth Ayres
    Rashid Mehmood
    Keith Mitchell
    Nicholas Race
    Year: 2012
    Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints
    EUROPECOMM
    Springer
    DOI: 10.1007/978-3-642-11284-3_18
Gareth Ayres1,*, Rashid Mehmood1,*, Keith Mitchell2,*, Nicholas Race2,*
  • 1: Swasea University
  • 2: Lancaster University
*Contact email: g.j.ayres@Swansea.ac.uk, r.mehmood@Swansea.ac.uk, k.mitchell@lancaster.ac.uk, n.race@lancaster.ac.uk

Abstract

Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations.