Title :
Human Behavior and Challenges of Anonymizing WLAN Traces
Author :
Kumar, Udayan ; Helmy, Ahmed
Author_Institution :
Dept. of Comput. & Inf. Sci. & Eng., Univ. of Florida, Gainesville, FL, USA
Abstract :
With the wide spread deployment of wireless LANs (WLANs), it is becoming necessary to conduct analysis of libraries of measurements taken from such operational networks. The availability of these trace libraries can be quite useful to provide realistic models of network load and user mobility, among others. To maintain user privacy, techniques of trace anonymization may be used to hide information. In this paper, we propose to study the fundamental trade off between the utility of WLAN traces and its privacy. The study provides several realistic case studies in which privacy attacks may be conducted, and questions the efficacy of existing anonymization techniques. Our initial quantitative analysis to estimate mobile users´ k-anonymity in WLAN traces shows surprisingly unique usage patterns, which may compromise anonymity. The main contribution of this paper is to articulate the compelling challenges facing anonymization of wireless networks traces and to shed some light on the answer to a most intriguing question: Just how private are wireless network traces?
Keywords :
data privacy; mobile radio; telecommunication security; wireless LAN; WLAN traces; human behavior; mobile user k-anonymity; network load; privacy attack; trace anonymization; trace libraries; usage pattern; user mobility; user privacy; wireless LAN; Computer networks; Humans; Information analysis; Information science; Libraries; Load modeling; Pattern analysis; Privacy; Wireless LAN; Wireless networks;
Conference_Titel :
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE
Conference_Location :
Honolulu, HI
Print_ISBN :
978-1-4244-4148-8
DOI :
10.1109/GLOCOM.2009.5426081