International audienceConfidence in location is increasingly important in many applications. This is particularly true in augmented reality applications such as games. Users have an interest in being able to lie about their location. Location reporting methods implemented in existing services are weakly protected: it is oftenpossible to lie in simple cases or to emit signals that deceive the more cautious systems. This paper proposes to observe the Wi-Fi routers near the user’s location to strengthen confidence in the reported positions so as to complicate the task of an attacker. More particularly we are interested in the observation of the timestamps issued in the beacons of the access points. We show that this method is simple to impleme...
This paper considers the problem of using wireless LAN location-sensing for security applications. R...
Mobile computing is growing at an incredible pace in the world around us. With the ubiquity of perso...
Detecting the user location is crucial in a wireless environment, not only for the choice of first-h...
International audienceConfidence in location is increasingly important in many applications. This is...
Channel State Information (CSI) based localization with 802.11 has been proven feasible in multiple ...
The Quality of Information (QoI) in Participatory Sensing (PS) systems largely depends on the locati...
Abstract—Efficient Wi-Fi probing has been demonstrated to leak sensitive user information. During th...
Wi-Fi devices are increasingly ubiquitous in today’s world, and can perform the same day-to-day task...
Mobile phones are becoming a primary platform for information access. A major aspect of ubi-quitous ...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
Accurately positioning nodes in wireless and sensor networks is important because the location of de...
AbstractWith the proliferation of mobile devices, location-based services (LBS) have penetrated into...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
Passive, device-free localization of a person exploiting the Channel State Information (CSI) from Wi...
Objective: The main objective of this method is to design a efficient mechanism to protect the cloud...
This paper considers the problem of using wireless LAN location-sensing for security applications. R...
Mobile computing is growing at an incredible pace in the world around us. With the ubiquity of perso...
Detecting the user location is crucial in a wireless environment, not only for the choice of first-h...
International audienceConfidence in location is increasingly important in many applications. This is...
Channel State Information (CSI) based localization with 802.11 has been proven feasible in multiple ...
The Quality of Information (QoI) in Participatory Sensing (PS) systems largely depends on the locati...
Abstract—Efficient Wi-Fi probing has been demonstrated to leak sensitive user information. During th...
Wi-Fi devices are increasingly ubiquitous in today’s world, and can perform the same day-to-day task...
Mobile phones are becoming a primary platform for information access. A major aspect of ubi-quitous ...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
Accurately positioning nodes in wireless and sensor networks is important because the location of de...
AbstractWith the proliferation of mobile devices, location-based services (LBS) have penetrated into...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
Passive, device-free localization of a person exploiting the Channel State Information (CSI) from Wi...
Objective: The main objective of this method is to design a efficient mechanism to protect the cloud...
This paper considers the problem of using wireless LAN location-sensing for security applications. R...
Mobile computing is growing at an incredible pace in the world around us. With the ubiquity of perso...
Detecting the user location is crucial in a wireless environment, not only for the choice of first-h...