簡易檢索 / 詳目顯示

研究生: 李孟鴻
MENG-HUNG LI
論文名稱: 運用移動行為偵測加強保護無線區網的位置隱私
Enhancing WLAN Location Privacy Using Mobile Behavior
指導教授: 洪西進
Shi-Jinn Horng
口試委員: 鍾國亮
Kuo-Liang Chung
高宗萬
Tzong-Wann Kao
蘇民揚
Ming-Yang su
吳金雄
Chin-Hsiung Wu
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2008
畢業學年度: 96
語文別: 中文
論文頁數: 40
中文關鍵詞: 位置隱私無線區域網路網路卡實體位置相對定位技術
外文關鍵詞: Location privacy, WLAN, MAC address, relative localization technology
相關次數: 點閱:305下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 最近這幾年無線網路大量的被使用在日常生活上,而使用者的位置隱私也受到了很大的威脅。在現有的無線區域網路的環境中,攻擊者會透過使用者不會改變的網路卡實體位置來追蹤使用者。到目前為止有許多相關的研究是為了解決這個問題而提出來的,但由於這些相關的研究並沒有將附近的移動裝置之移動行為列入考慮,所以這些研究的解決方法會錯失許多可以改善使用者隱私的時機,也就是說現有的方法在交換網路卡實體位址的時機並不一定是最好的;而且可能會造成許多不必要的交換網路卡實體位址,導致網路的效能降低。因此,在本篇論文中,我們以相對定位的方法為基礎來提高使用者的位置隱私;並分析使用者附近移動裝置的移動行為來決定哪些移動裝置需要交換其網路卡實體位置。而經由實驗結果得知,我們的方法與現有的方法比較雖然會稍微減低網路流量,但確實能減低其網路卡實體位置的交換次數,也提高了使用者的位置隱私。


    Recently wireless network massive is used in the daily life, but user's location privacy can be threatened. In wireless local area network (WLAN), an adversary can track a user through his/her unchanged MAC address. Many correlation researches have been proposed to combat this issue, but they have not included mobile behavior of neighboring nodes in the consideration, therefore these research solutions may miss the opportune moment to update MAC address to improve the user’s location privacy. In other words, the existing scheme in the opportune moment to update MAC address may not be the best one. Furthermore, they will have many unnecessary MAC address to update, causes the network throughput be reduced. In this thesis, we will be able to enhance user's location privacy with the relative-positioning scheme. We will analyzing the mobile behavior of neighboring nodes to decide which mobile will need to update their MAC address. The experiment results show that our scheme can decrease the time of MAC address to change, and also to enhance user's location privacy. Although the network throughput will be a little lower.

    目錄 頁次 中文摘要 i Abstract ii 致謝 iii 頁次 iv 圖目錄 vi 第一章 1 1.1 背景 1 1.2 貢獻 2 第二章 4 2.1無線區域網路的風險 4 2.2先前的研究方法 5 第三章 14 研究方法 14 3.1設計的想法 14 3.2系統設備及函式 17 3.3系統架構 19 3.3.1連線以及溝通 20 3.3.2相對定位 22 3.3.3移動行為偵測 25 第四章 29 模擬環境及實驗結果 29 4.1模擬環境 29 4.2實驗結果 30 第五章 37 結論與未來展望 37 參考文獻 38

    [1]Bahl, P. and V. Padmanabhan, “RADAR: An in-building RF-based user location and tracking system” in Proceedings of IEEE INFOCOM, 2000: pp.775-754.
    [2]Beresford, A. R. and F. Stajano, ” Location privacy in pervasive computing” Digital Object Identifier 10.1109/MPRV.2003: pp.46-55.
    [3]Beresford, A. R. “Location Privacy in Ubiquitous Computing” PhD thesis, University of Cambridge, 2004.
    [4]Bluetooth 1.2 Draft 4, Bluetooth SIG Standard, 2003.
    [5]Capkun, S., M. Hamdi, and J. Hubaux, “GPS-free positioning in mobile ad-hoc networks” in HICSS ’01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34)-Volume 9. Washington, DC, USA: IEEE Computer Society, 2001: pp.157-167.
    [6]Castro, P., P. Chiu, T. Kremenek and R. Muntz, ”A Probabilistic Room Location Service for Wireless Networked Environments” Ubicomp 2001: Ubiquitous Computing: pp.18-34.
    [7]Chaum, D.,“Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms, ” Comm. ACM, vol. 24, no. 2, 1981:pp. 84-88.
    [8]Defrawy, K. E., C. Soriente, “PEUC-WiN: Privacy Enhancement by User Cooperation in Wireless Networks” in Secure Network Protocols 2nd IEEE Workshop, November 2006: pp.38-43.
    [9]Erceg, V., L.J. Greenstein, S.Y. Tjandra, S.R. Parkoff, A. Gupta, B. Kulic, A.A. Julius, R. Bianchi, ” An empirically based path loss model for wireless channels in suburban environments” Digital Object Identifier: 10.1109/GLOCOM.1998.776865, Volume 17, Issue 7, July 1999: pp.1205-1211
    [10]Gorlach, A., A. Heinemann and W. W. Terpstra, “Survey on Location Privacy in Pervasive Computing.” Privacy, Security, and Trust Within the Context of Pervasive Computing 2004: pp. 24-34.
    [11]Gruteser, M. and D. Grunwald, “Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis” in Proceedings of 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots (WMASH 2003), 2003 and Mobile Networks and Applications, 2005: pp.315-325.
    [12]Gruteser, M. and D. Grunwald, “A methodological assessment of location privacy risks in wireless hotspot networks” in Proceedings of 1st Intl. Conf. on Security in Pervasive Computing (SPC 2003), ser. LNCS, vol. 2802, Boppard, Germany: Springer, 2003: pp.10-24.
    [13]Huang, L., K. Matsuura, H. Yamane, and K. Sezaki, “Enhancing wireless location privacy using silent period” in Proceedings IEEE Wireless Commun. Netw. Conf. ,2005: pp.1178-1192.
    [14]IEEE 802.11 Wireless Local Area Network, http://grouper.ieee.org/groups/802/11/.
    [15]Juels, A., R. L. Rivest and M. Szydlo, “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy” In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), October 2003: pp.103-111.
    [16]Kido, H., Y. Yanagisawa and T. Satoh, “Protection of Location Privacy using Dummies for Location-based Services” in Proceedings of the 21st International Conference on Data Engineering (ICDE’05), 2005: pp.1248-1253.
    [17]Kushki, A., K. N. Plataniotis and A. N. Venetsanopoulos, “Location Tracking in Wireless Local Area Networks with Adaptive Radio Maps” IEEE ICASSP, 2006: pp. 741-744.
    [18]Ladd, A. M., K. E. Bekris, A. Rudys, L. E. Kavraki and D. S. Wallach, “Robotics-Based Location Sensing Using Wireless Ethernet” Wireless Networks, Volume 11, Numbers 1-2 ,2005: pp.189-204.
    [19]Li, M., K. Sampigethaya, L. Huang and R. Poovendran, “Anonymity: Swing & swap: user-centric approaches towards maximizing location privacy” in Proceedings of the 5th ACM workshop on Privacy in electronic society WPES '06, October 2006: pp.19-28.
    [20]Ming, L., H. Xiaoyan, S. V. Vrbsky, “Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks” Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE 26-30 Nov. 2007: pp.49-53.
    [21]Phaiboon, S., ” An empirically based path loss model for indoor wireless channels in laboratory building” in Proceedings of TENCON’02 Oct. 2002: pp.1020-1023.
    [22]Schilit, B., J. Hong, M. Gruteser, ”Wireless location privacy protection” Digital Object Identifier 10.1109/MC.2003:pp.135-137.

    QR CODE