A Survey of Wireless Security Concerns and Case Studies in Geolocation Data
Julie Brozovich1, Aby Tino Thomas 1, Martin Bonugli 1, Luke Thurmond 1
Vahid Emamian 2, Senior IEEE Member
1 Computer Science Department
2 Electrical Engineering Department
St. Mary’s University, San Antonio, TX
jbrozovich@mail.stmarytx.edu
Summary: In the past few decades, there was a revolution in the Information Technology and its real–world implementations, which improved the overall lifestyle of every user and businesses. One of the key innovations in information technology and telecommunication is wireless devices, its secure communication and its location specific functionalities. Earlier it was mainly used for commercial and military communications [2]. But as Internet became an inseparable part of human living, the popularity wireless devices with internet capabilities has grown exponentially. To support this growing use of wireless devices across the world, wireless hotspots and mesh networks have being deployed. This opened a lot of location privacy concerns for normal users. In modern world, the location data is collected from the wireless devices in every second and that causes a lot of security concerns. Anyone who has access to this data can interpret a lot of information about the user, that is a huge intervention to the privacy of an individual. In this paper, we discuss about the different aspects of location privacy concerns and the real-world capitalization of location data. We also discuss some methods to identify the location of a wireless device, how to map an IP to a location and some practical counter measures to secure wireless users.
Categories and Subject Descriptors: Wireless Security and protection
General Terms: Security, location privacy
Keywords: Location privacy, anonymity, wireless networks, ad hoc network routing, security
Video
Full Research Paper