Survey on Location Privacy in Pervasive Computing

  • Görlach A
  • Heinemann A
  • Terpstra W
N/ACitations
Citations of this article
49Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The goal of ubiquitous computing research is refine devices to the where their use is transparent. For many applications with mobile devices, transparent operation requires that the device be location-aware. Unfortunately, the location of an individual can be used to infer highly private information. Hence, these devices must be carefully designed, lest they become a ubiquitous surveillance system. This paper overviews existing location-sensing mobile devices, vectors for a privacy invasion, and proposed solutions. Particular attention is paid to required infrastructure and the accuracy of the location information which can be stolen. Solutions are examined from the perspective of attacks which can be reasonably expected against these systems.

Cite

CITATION STYLE

APA

Görlach, A., Heinemann, A., & Terpstra, W. W. (2006). Survey on Location Privacy in Pervasive Computing. In Privacy, Security and Trust within the Context of Pervasive Computing (pp. 23–34). Kluwer Academic Publishers. https://doi.org/10.1007/0-387-23462-4_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free