1st International Conference on Collaborative Computing: Networking, Applications and Worksharing

Research Article

An architecture and key management approach for maintaining privacy in location based group services

  • @INPROCEEDINGS{10.1109/COLCOM.2005.1651222,
        author={Y. Sun and P. Liu and P. Kermani and T. F. La Porta},
        title={An architecture and key management approach for maintaining privacy in location based group services},
        proceedings={1st International Conference on Collaborative Computing: Networking, Applications and Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2006},
        month={7},
        keywords={Cities and towns  Communication system security  Information security  Intelligent networks  Network servers  Permission  Power system protection  Privacy  Sun},
        doi={10.1109/COLCOM.2005.1651222}
    }
    
  • Y. Sun
    P. Liu
    P. Kermani
    T. F. La Porta
    Year: 2006
    An architecture and key management approach for maintaining privacy in location based group services
    COLLABORATECOM
    IEEE
    DOI: 10.1109/COLCOM.2005.1651222
Y. Sun1,*, P. Liu1,*, P. Kermani2,*, T. F. La Porta1,*
  • 1: Networking and Security Research Center, Penn State University
  • 2: IBM T.J. Watson
*Contact email: yasun@cse.psu.edu, pliu@ist.psu.edu, parviz@us.ibm.com, tlp@cse.psu.edu

Abstract

Location based services are becoming increasingly important to the success and attractiveness of next generation wireless systems. Service providers will use location information to introduce new services and greatly enhance many existing services. Maintaining location privacy is an important requirement that must be met for these services to be widely deployed. It is a challenge to maintain location privacy while still providing the flexible access to location information required to enable a rich set of location based services. In this paper we define a high-level architecture for providing LBS and classify services according to several basic criteria. To support these services we propose a hierarchical key distribution method. Four methods are proposed to deliver hierarchical location information while maintaining privacy. We evaluate the efficiency of the system in terms of message delivery and key management overhead.