• Mon espace de travail
  • Aide IRIS
  • Par Publication Par Personne Par Unité
    • English
    • Français
  • Se connecter
Logo du site

IRIS | Système d’Information de la Recherche Institutionnelle

  • Accueil
  • Personnes
  • Publications
  • Unités
  • Périodiques
UNIL
  • English
  • Français
Se connecter
IRIS
  • Accueil
  • Personnes
  • Publications
  • Unités
  • Périodiques
  • Mon espace de travail
  • Aide IRIS

Parcourir IRIS

  • Par Publication
  • Par Personne
  • Par Unité
  1. Accueil
  2. IRIS
  3. Publication
  4. A Location-Privacy Threat Stemming from the Use of Shared Public IP
 
  • Détails
Titre

A Location-Privacy Threat Stemming from the Use of Shared Public IP

Type
article
Institution
Externe
Périodique
IEEE Transactions on Mobile Computing  
Auteur(s)
Vratonjic, N.
Auteure/Auteur
Huguenin, K.
Auteure/Auteur
Bindschaedler, V.
Auteure/Auteur
Hubaux, J.-P.
Auteure/Auteur
Liens vers les personnes
Huguenin, Kévin  
ISSN
1536-1233
Statut éditorial
Publié
Date de publication
2014-11
Volume
13
Numéro
11
Première page
2445
Dernière page/numéro d’article
2457
Peer-reviewed
Oui
Langue
anglais
Résumé
This paper presents a concrete and widespread example of situation where a user's location privacy is unintentionally compromised by others, specifically the location-privacy threat that exists at access points (public hotspots, FON, home routers, etc.) that have a single public IP and make use of network address translation (NAT). As users connected to the same hotspot share a unique public IP address, a single user's making a location-based request is enough to enable a service provider to map the IP address of the hotspot to its geographic coordinates, thus compromising the location privacy of all the other connected users. When successful, the service provider can locate users within a few hundreds of meters, thus improving over existing IP-location databases. Even in the case where IPs change periodically (e.g., by using DHCP), the service provider is still able to update a previous (IP, Location) mapping by inferring IP changes from authenticated communications (e.g., cookies). The contribution of this paper is three-fold: (i) We identify a novel location-privacy threat caused by shared public IPs in combination with NAT. (ii) We formalize and analyze the threat theoretically. In particular we derive and provide expressions of the probability that the service provider will learn the mapping and of the expected proportion of victims. (iii) We experimentally assess the state in practice by using real traces (collected from deployed hotspots over a period of 23 days) of users who accessed Google services. We also discuss how existing countermeasures can thwart the threat.
Sujets

Location privacy

Network address trans...

IP-geolocation

PID Serval
serval:BIB_933C5DE362B5
DOI
10.1109/TMC.2014.2309953
WOS
000343317500002
Permalien
https://iris.unil.ch/handle/iris/139122
URL éditeur
https://www.computer.org/web/tmc
Date de création
2016-11-03T12:25:08.032Z
Date de création dans IRIS
2025-05-20T21:33:47Z
Fichier(s)
En cours de chargement...
Vignette d'image
Nom

BIB_933C5DE362B5.P001.pdf

Version du manuscrit

preprint

Taille

767.83 KB

Format

Adobe PDF

PID Serval

serval:BIB_933C5DE362B5.P001

Somme de contrôle

(MD5):8d1c0f431b89324b4b02758705fe9a17

  • Copyright © 2024 UNIL
  • Informations légales