Chapter 9

Sensor security and location privacy

Abstract

This chapter highlights security and location privacy requirements and concerns that exist in mobile computing systems. It also mentions few techniques to address these requirements and concerns.

Keywords

Sensor security; encryption scheme; secret sharing scheme; sliding group watermark scheme; forward watermark chain; location privacy; k-anonymity; obfuscation; cloaking

Information in This Chapter

• Sensor Attacks

• Security of Sensor Data

• Preserving Location Privacy

• k-Anonymity

• Obfuscation

• Cloaking

Introduction to Mobile Computing Security and Privacy

A mobile computing device can be used in a variety of environments and for a variety of use cases. For example, it can be used as a cell phone ...

Get Mobile Sensors and Context-Aware Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.