Change search
ReferencesLink to record
Permanent link

Direct link
Assessing location privacy in mobile communication networks
KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.ORCID iD: 0000-0002-7102-8153
Show others and affiliations
2011 (English)In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 2001, 309-324 p.Article in journal (Refereed) Published
Abstract [en]

In this paper we analyze a class of location disclosure in which location information from individuals is generated in an automated way, i.e. is observed by a ubiquitous infrastructure. Since such information is valuable for both scientific research and commercial use, location information might be passed on to third parties. Users are usually aware neither of the extent of the information disclosure (e.g. by carrying a mobile phone), nor how the collected data is used and by whom. In order to assess the expected privacy risk in terms of the possible extent of exposure, we propose an adversary model and a privacy metric that allow an evaluation of the possible privacy loss by using mobile communication infrastructure. Furthermore, a case study on the privacy effects of using GSM infrastructure was conducted with the goal of analyzing the side effects of using a mobile handset. Based on these results requirements for a privacy-aware mobile handheld device were derived.

Place, publisher, year, edition, pages
2011. Vol. 2001, 309-324 p.
Keyword [en]
Adversary models, Information disclosure, Location information, Location privacy, Mobile communication networks, Mobile communications, Mobile handheld devices, Mobile handsets, Privacy risks, Scientific researches, Side effect, Third parties, Data privacy, Telecommunication equipment, Telephone sets, Global system for mobile communications
National Category
Computer Science
URN: urn:nbn:se:kth:diva-150720DOI: 10.1007/978-3-642-24861-0_21ISI: 000306719400021ScopusID: 2-s2.0-80054821880ISBN: 9783642248603OAI: diva2:745489
14th International Conference on Information Security, ISC 2011; Xi'an; China

QC 20140910

Available from: 2014-09-10 Created: 2014-09-09 Last updated: 2014-09-10Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Greschbach, Benjamin
By organisation
Theoretical Computer Science, TCS
In the same journal
Lecture Notes in Computer Science
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 23 hits
ReferencesLink to record
Permanent link

Direct link