A survey on indoor positioning security and privacy

Y Sartayeva, HCB Chan - Computers & Security, 2023 - Elsevier
With rising demand for indoor location-based services (LBS) such as location-based
marketing, mobile navigation, etc., there has been considerable interest in indoor …

Preserving privacy in WiFi localization with plausible dummy locations

P Zhao, W Liu, G Zhang, Z Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Benefiting from the development of wireless communication, WiFi localization plays a vital
role in various mobile applications. However, users' locations are breached by untrusted …

PrOLoc: Resilient localization with private observers using partial homomorphic encryption

A Alanwar, Y Shoukry, S Chakraborty, P Martin… - Proceedings of the 16th …, 2017 - dl.acm.org
Aided by advances in sensors and algorithms, systems for localizing and tracking target
objects or events have become ubiquitous in recent years. Most of these systems operate on …

PrSLoc: Sybil attack detection for localization with private observers using differential privacy

Y Yuan, Y Huang, Y Yuan - Computers & Security, 2023 - Elsevier
During the localization process in wireless networks, risks such as Sybil attacks and nodes'
location privacy leakage can exist due to the open and shared nature of wireless networks …

Privacy-preserving indoor localization based on inner product encryption in a cloud environment

Z Wang, Y Xu, Y Yan, Y Zhang, Z Rao… - Knowledge-Based …, 2022 - Elsevier
How to utilize the resource-rich cloud to provide scalable indoor localization service to solve
the problem of limited user equipment resources while preventing privacy leakage has …

To hide private position information in localization using time difference of arrival

X Shi, J Wu - IEEE Transactions on Signal Processing, 2018 - ieeexplore.ieee.org
In most existing localization schemes, location information leakage is inevitable, since both
the locations of the target and the anchors will be revealed to the entity that conducts …

Analyzing and evaluating efficient privacy-preserving localization for pervasive computing

G Wang, J He, X Shi, J Pan… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Privacy-preserving localization in crowdsourcing has drawn much attention recently. Under
the classical nonadjacent subtraction-based localization (NSL) model, existing solutions …

Resilient privacy-preserving distributed localization against dishonest nodes in Internet of Things

X Shi, F Tong, WA Zhang, L Yu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Existing distributed localization methods rarely consider the location privacy preservation
problem, which however is nonnegligible. Regarding location privacy, typical solutions rely …

Privacy-Preserving WiFi Localization Based On Inner Product Encryption in a Cloud Environment

Z Wang, Y Xu, Y Yan, X Ouyang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Cloud-based indoor positioning services have advantages over noncloud methods but also
confront serious privacy concerns. Existing privacy-preserving schemes are designed for …

ARM2GC: Succinct garbled processor for secure computation

EM Songhori, MS Riazi, SU Hussain… - Proceedings of the 56th …, 2019 - dl.acm.org
We present ARM2GC, a novel secure computation framework based on Yao's Garbled
Circuit (GC) protocol and the ARM processor. It allows users to develop privacy-preserving …