Team 3 Research: A Survey of Wireless Security Concerns and Case Studies in Geolocation Data 

A Survey of Wireless Security Concerns and Case Studies in Geolocation Data 

 Julie Brozovich1, Aby Tino Thomas 1, Martin Bonugli 1, Luke Thurmond 1 

Vahid Emamian 2, Senior IEEE Member  

1 Computer Science Department 

2 Electrical Engineering Department 

St. Mary’s University, San Antonio, TX 

jbrozovich@mail.stmarytx.edu 

Summary: In the past few decades, there was a revolution in the Information Technology and its realworld implementations, which improved the overall lifestyle of every user and businesses. One of the key innovations in information technology and telecommunication is wireless devices, its secure communication and its location specific functionalities. Earlier it was mainly used for commercial and military communications [2]. But as Internet became an inseparable part of human living, the popularity wireless devices with internet capabilities has grown exponentially. To support this growing use of wireless devices across the world, wireless hotspots and mesh networks have being deployed. This opened a lot of location privacy concerns for normal users. In modern world, the location data is collected from the wireless devices in every second and that causes a lot of security concerns. Anyone who has access to this data can interpret a lot of information about the user, that is a huge intervention to the privacy of an individual. In this paper, we discuss about the different aspects of location privacy concerns and the real-world capitalization of location data. We also discuss some methods to identify the location of a wireless device, how to map an IP to a location and some practical counter measures to secure wireless users. 

Categories and Subject Descriptors: Wireless Security and protection 

General Terms: Security, location privacy 

Keywords: Location privacy, anonymity, wireless networks, ad hoc network routing, security 

Video

Full Research Paper

Loader Loading...
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

 

Leave a Reply

Your email address will not be published. Required fields are marked *