2018
DOI: 10.1007/978-3-030-02641-7_16
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network

Abstract: This paper presents the design and implementation of a lowpower privacy-preserving device tracking system based on Internet of Things (IoT) technology. The system consists of low-power nodes and a set of dedicated beacons. Each tracking node broadcasts pseudonyms and encrypted versions of observed beacon identifiers over a Low-Power Wide-Area Network (LPWAN). Unlike most commercial systems, our solution ensures that the device owners are the only ones who can locate their devices. We present a detailed design … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…In the second step, it is necessary to decide which data are required to solve the task, for how long they should be stored, and which sampling frequency is required. In [ 45 ], for example, the position of the tracked object is only stored in the database for 24 h, while older location data are deleted. Ref.…”
Section: Privacy Strategiesmentioning
confidence: 99%
See 1 more Smart Citation
“…In the second step, it is necessary to decide which data are required to solve the task, for how long they should be stored, and which sampling frequency is required. In [ 45 ], for example, the position of the tracked object is only stored in the database for 24 h, while older location data are deleted. Ref.…”
Section: Privacy Strategiesmentioning
confidence: 99%
“…Refs. [ 10 , 12 , 37 , 41 , 45 , 47 , 48 , 49 ] provide detailed information about their security analysis and thread models. Using these systems, it is clear which privacy issues have been taken into account, so these systems can be better adapted to individual conditions.…”
Section: Privacy Strategiesmentioning
confidence: 99%
“…Accordingly, it may refer to identifying, collecting, and processing information derived from services or reference models, which may constitute an industrial secret. Characteristics of the ongoing concern for protecting IoT devices from profiling threats are efforts to enhance privacy in RFID devices [87,88], sensor systems [89], wireless networking [90,91], and identity management [88,92] technologies, to enhance privacy or encryption technology [93,94]. 5.…”
mentioning
confidence: 99%