Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017 (2017), Article ID 4525380, 16 pages
https://doi.org/10.1155/2017/4525380
Research Article

LEA: An Algorithm to Estimate the Level of Location Exposure in Infrastructure-Based Wireless Networks

1Department of Telecommunications Engineering, National Autonomous University of Mexico, 04510 Mexico City, Mexico
2Department of Electrical Engineering, Metropolitan Autonomous University, Iztapalapa, 09340 Mexico City, Mexico

Correspondence should be addressed to Francisco Garcia; xm.manu.samii.2ccmxu@jaicragl

Received 14 August 2016; Revised 20 December 2016; Accepted 4 January 2017; Published 26 February 2017

Academic Editor: Carlos T. Calafate

Copyright © 2017 Francisco Garcia et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. Shu, Y. Chen, J. Yang, and A. Williams, “Multi-lateral privacy-preserving localization in pervasive environments,” in Proceedings of the 33rd IEEE Conference on Computer Communications (IEEE INFOCOM '14), pp. 2319–2327, Ontario, Canada, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. A. Mohaisen, D. Hong, and D. Nyang, “Privacy in location based services: primitives toward the solution,” in Proceedings of the 4th International Conference on Networked Computing and Advanced Information Management (NCM '08), pp. 572–579, IEEE, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Martinez-Balleste, P. Perez-Martinez, and A. Solanas, “The pursuit of citizens' privacy: a privacy-aware smart city is possible,” IEEE Communications Magazine, vol. 51, no. 6, pp. 136–141, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. G. Han, H. Xu, T. Q. Duong, J. Jiang, and T. Hara, “Localization algorithms of wireless sensor networks: a survey,” Telecommunication Systems, vol. 52, no. 4, pp. 2419–2436, 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. F. Garcia, J. Gomez, M. A. Gonzalez, M. Lopez-Guerrero, and V. Rangel, “Ghost: Voronoi-based tracking in sparse wireless networks using virtual nodes,” Telecommunication Systems, vol. 61, no. 2, pp. 387–401, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. P.-H. Tseng, K.-T. Feng, Y.-C. Lin, and C.-L. Chen, “Wireless location tracking algorithms for environments with insufficient signal sources,” IEEE Transactions on Mobile Computing, vol. 8, no. 12, pp. 1676–1689, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. L. Ma, J. Liu, L. Sun, and O. B. Karimi, “The trajectory exposure problem in location-aware mobile networking,” in Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS '11), pp. 7–12, Valencia, Spain, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, “Enhancing security and privacy in traffic-monitoring systems,” IEEE Pervasive Computing, vol. 5, no. 4, pp. 38–46, 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. E. Elnahrawy, X. Li, and R. P. Martin, “The limits of localization using signal strength: a comparative study,” in Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pp. 406–414, Santa Clara, Calif, USA, October 2004.
  10. D. P. Mehta, M. A. Lopez, and L. Lin, “Optimal coverage paths in ad-hoc sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '03), vol. 1, pp. 507–511, May 2003. View at Publisher · View at Google Scholar
  11. P. K. Sahoo and W.-C. Liao, “HORA: a distributed coverage hole repair algorithm for wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 14, no. 7, pp. 1397–1410, 2015. View at Publisher · View at Google Scholar · View at Scopus
  12. Z. Yang and Y. Liu, “Quality of trilateration: confidence-based iterative localization,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 5, pp. 631–640, 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. M. L. Damiani and C. Cuijpers, “Privacy challenges in third-party location services,” in Proceedings of the 14th International Conference on Mobile Data Management (MDM '13), vol. 2, pp. 63–66, Milan, Italy, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. K. Vu and R. Zheng, “Robust coverage under uncertainty in wireless sensor networks,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '11), pp. 2015–2023, April 2011. View at Publisher · View at Google Scholar
  15. M. P. Johnson, D. Sariöz, A. Bar-Noy, T. Brown, D. Verma, and C. W. Wu, “More is more: the benefits of denser sensor deployment,” in Proceedings of the 28th Conference on Computer Communications (IEEE INFOCOM '09), pp. 379–387, Rio de Janeiro, Brazil, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. K.-P. Shih, C.-C. Li, and Y.-D. Chen, “An intruder avoidance vulnerable path adjustment protocol for wireless mobile sensor networks,” in Proceedings of the Joint Conferences on Pervasive Computing (JCPC '09), pp. 125–130, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  17. V. Phipatanasuphorn and P. Ramanathan, “Vulnerability of sensor networks to unauthorized traversal and monitoring,” IEEE Transactions on Computers, vol. 53, no. 3, pp. 364–369, 2004. View at Google Scholar
  18. S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak, “Exposure in wireless ad-hoc sensor networks,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 139–150, Rome, Italy, July 2001. View at Scopus
  19. W. Zhang and M. Li, “Anti-detection: how does a target traverse a sensing field,” in Proceedings of the 2nd International Conference on Embedded Software and Systems, Xian, China, December 2005. View at Publisher · View at Google Scholar
  20. M. Pascoe-Chalke, J. Gomez-Castellanos, V. Bonilla-Gonzalez, M. Lopez-Guerrero, V. Rangel-Licea, and E. Rodriguez-Colina, “Direction of Encounter (DoE): a mobility-based location method for wireless networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 11, pp. 2524–2536, 2014. View at Publisher · View at Google Scholar
  21. M. Sharif, S. Khan, S. J. Khan, and M. Raza, “An algorithm to find convex hull based on binary tree,” in Proceedings of the IEEE 13th International Multitopic Conference (INMIC '09), pp. 1–6, Islamabad, Pakistan, 2009. View at Publisher · View at Google Scholar
  22. J. J. Caffery Jr., “New approach to the geometry of TOA location,” in Proceedings of the 52nd Vehicular Technology Conference (VTC '00), pp. 1943–1949, Boston, Mass, USA, September 2000. View at Scopus
  23. X. Li and D. K. Hunter, “Probabilistic model of triangulation,” in Proceedings of the ACM Symposium on Solid and Physical Modeling 2008 (SPM '08), pp. 301–306, New York, NY, USA, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  24. T. M. Chan, “Point location in o(log n) time, Voronoi diagrams in o(n log n) time, and other transdichotomous results in computational geometry,” in Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS '06), pp. 333–342, Berkeley, Calif, USA, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  25. N. K. Sharma, “A weighted center of mass based trilateration approach for locating wireless devices in indoor environment,” in Proceedings of the ACM International Workshop on Mobility Management and Wireless Access (MobiWAC '06), pp. 112–115, Terromolinos, Spain, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  26. A. Z. B. H. Talib, M. Chen, and P. Townsend, “Three major extensions to Kirkpatrick's point location algorithm,” in Proceedings of the 14th International Conference of the Computer Graphics Society (CGI '96), pp. 112–121, June 1996. View at Scopus
  27. P.-C. Chen, “A non-line-of-sight error mitigation algorithm in location estimation,” in Proceedings of the Wireless Communications and Networking Conference (WCNC '99), vol. 1, pp. 316–320, IEEE, New Orleans, La, USA, September 1999. View at Publisher · View at Google Scholar
  28. B. Roberts and K. Pahlavan, “Site-specific RSS signature modeling for WiFi localization,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '09), Honolulu, Hawaii, USA, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  29. J. M. Castro-Arvizu, P. Closas, and J. A. Fernandez-Rubio, “Cramer-Rao lower bound for breakpoint distance estimation in a path-loss model,” in Proceedings of the IEEE International Conference on Communications Workshops (ICC '14), pp. 176–180, June 2014.