The goal of ubiquitous computing research is refine devices to the where their use is transparent. For many applications with mobile devices, transparent operation requires that the device be location-aware. Unfortunately, the location of an individual can be used to infer highly private information. Hence, these devices must be carefully designed, lest they become a ubiquitous surveillance system. This paper overviews existing location-sensing mobile devices, vectors for a privacy invasion, and proposed solutions. Particular attention is paid to required infrastructure and the accuracy of the location information which can be stolen. Solutions are examined from the perspective of attacks which can be reasonably expected against these systems.
CITATION STYLE
Görlach, A., Heinemann, A., & Terpstra, W. W. (2006). Survey on Location Privacy in Pervasive Computing. In Privacy, Security and Trust within the Context of Pervasive Computing (pp. 23–34). Kluwer Academic Publishers. https://doi.org/10.1007/0-387-23462-4_3
Mendeley helps you to discover research relevant for your work.