{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T10:22:41Z","timestamp":1762338161206},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1007\/s11036-005-6425-1","type":"journal-article","created":{"date-parts":[[2005,4,6]],"date-time":"2005-04-06T14:43:01Z","timestamp":1112798581000},"page":"315-325","source":"Crossref","is-referenced-by-count":115,"title":["Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis"],"prefix":"10.1007","volume":"10","author":[{"given":"Marco","family":"Gruteser","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Grunwald","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6425_CR1","unstructured":"P.E. Agre, RRE notes and recommendations (1999) http:\/\/commons.somewhere.com\/rre\/1999\/RRE.notes.and.recommenda14.html ."},{"key":"6425_CR2","doi-asserted-by":"crossref","unstructured":"J. Al-Muhtadi, R. Campbell, A. Kapadia, M.D. Mickunas and S. Yi, Routing through the mist: Privacy preserving communication in ubiquitous computing environments, in International Conference of Distributed Computing Systems (2002).","DOI":"10.1109\/ICDCS.2002.1022244"},{"key":"6425_CR3","unstructured":"P. Bahl and V.N. Padmanabhan, RADAR: An in-building RF-based user location and tracking system, in: IEEE INFOCOM (2000) pp. 775\u2013784."},{"key":"6425_CR4","doi-asserted-by":"crossref","unstructured":"A. Balachandran, G. Voelker, P. Bahl and P. Rangan, Characterizing user behavior and network performance in a public wireless LAN, in: Proceedings of ACM SIGMETRICS (2002).","DOI":"10.1145\/511334.511359"},{"key":"6425_CR5","doi-asserted-by":"crossref","unstructured":"M. Balazinska and P. Castro, Characterizing mobility and network usage in a corporate wireless local-area network, in: The First International Conference on Mobile Systems, Applications, and Services (MobiSys) (2003).","DOI":"10.1145\/1066116.1066127"},{"key":"6425_CR6","unstructured":"M.K. Base, Article 164903 \u2013 How to troubleshoot duplicate media access control address conflicts, (2002) http:\/\/support.microsoft.com\/default.aspx?scid=KB;en-us;q164903 ."},{"key":"6425_CR7","doi-asserted-by":"crossref","unstructured":"V. Bharghavan, A dynamic addressing scheme for wireless media access, in: International Conference on Communications (1995).","DOI":"10.1109\/ICC.1995.524205"},{"key":"6425_CR8","unstructured":"Black Alchemy, FakeAP (2003) http:\/\/www.blackalchemy.to\/project\/fakeap\/ ."},{"key":"6425_CR9","doi-asserted-by":"crossref","unstructured":"N. Borisov, I. Goldberg and D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (2001) pp. 180\u2013189.","DOI":"10.1145\/381677.381695"},{"key":"6425_CR10","doi-asserted-by":"crossref","unstructured":"P. Castro, P. Chiu, T. Kremenek and R. Muntz, A probabilistic room location service for wireless networked environments, in: Ubicomp (2001).","DOI":"10.1007\/3-540-45427-6_3"},{"key":"6425_CR11","unstructured":"CNN, Police: GPS device used to stalk woman, (2002) http:\/\/www.cnn.com\/2002\/TECH\/ptech\/12\/31\/gps.stalk.ap\/index.html ."},{"key":"6425_CR12","unstructured":"EAP TLS, PPP EAP TLS authentication protocol Requests for Comments 2716 (1999)."},{"key":"6425_CR13","doi-asserted-by":"crossref","unstructured":"D. Eastlake, S. Crocker and J. Schiller, RFC 1750: Randomness recommendations for security, (1994) http:\/\/www.ietf.org\/rfc\/rfc1750.txt .","DOI":"10.17487\/rfc1750"},{"key":"6425_CR14","unstructured":"A. Ebner and H. Rohling, A self-organized radio network for automotive applications, in: Proceedings of the 8th World Congress on Intelligent Transportation Systems (2001)."},{"key":"6425_CR15","unstructured":"A. Fasbender, D. Kesdogan and O. Kubitz, Analysis of security and privacy in mobile ip, in: 4 th International Conference on Telecommunication Systems Modeling and Analysis (1996)."},{"issue":"2","key":"6425_CR16","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"D. Goldschlag, M. Reed and P. Syverson, Onion routing for anonymous and private Internet connections, Communications of the ACM (USA) 42(2) (1999) 39\u201341.","journal-title":"Communications of the ACM (USA)"},{"key":"6425_CR17","doi-asserted-by":"crossref","unstructured":"M. Gruteser and D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in: Proceedings of the First International Conference on Mobile Systems, Applications, and Services (2003a).","DOI":"10.1145\/1066116.1189037"},{"key":"6425_CR18","doi-asserted-by":"crossref","unstructured":"M. Gruteser and D. Grunwald, A methodological assessment of location privacy risks in wireless hotspot networks, in: Proceedings of the First International Conference on Security in Pervasive Computing (2003b) (to appear).","DOI":"10.1007\/978-3-540-39881-3_5"},{"key":"6425_CR19","unstructured":"IEEE, 1999, IEEE Standard 802.11b \u2013 Wireless LAN Medium Access Control (MAC) and Physical layer (PHY) specications: High Speed Physical Layer (PHY) in the 2.4 GHZz Band (1999)."},{"key":"6425_CR20","unstructured":"IEEE, OUI assignments (2003) http:\/\/standards.ieee.org\/regauth\/oui\/index.shtml ."},{"key":"6425_CR21","doi-asserted-by":"crossref","unstructured":"D. Kesdogan, H. Federrath, A. Jerichow and A. Pfitzmann, Location management strategies increasing privacy in mobile communication, in: 12th International Information Security Conference. Samos, Greece (1996) pp. 39\u201348.","DOI":"10.1007\/978-1-5041-2919-0_4"},{"key":"6425_CR22","doi-asserted-by":"crossref","unstructured":"D. Kotz and K. Essien, Analysis of a campus-wide wireless network, in: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (2002) pp. 107\u2013118.","DOI":"10.1145\/570645.570659"},{"key":"6425_CR23","doi-asserted-by":"crossref","unstructured":"A.M. Ladd, K.E. Bekris, A. Rudys, L.E. Kavraki, D.S. Wallach and G. Marceau, Robotics-based location sensing using wireless ethernet, in: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (2002) pp. 227\u2013238.","DOI":"10.1145\/570645.570674"},{"issue":"4","key":"6425_CR24","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1023\/A:1019103228471","volume":"5","author":"C.-H. Lee","year":"1999","unstructured":"C.-H. Lee, M.-S. Hwang and W.-P. Yang, Enhanced privacy and authentication for the global system for mobile communications, Wireless Networks 5(4) (1999) 231\u2013243.","journal-title":"Wireless Networks"},{"key":"6425_CR25","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1023\/A:1018777802208","volume":"6","author":"U. Leonhardt","year":"1998","unstructured":"U. Leonhardt and J. Magee, Security considerations for a distributed location service, Journal of Network and System Management 6 (1998) 51\u201370.","journal-title":"Journal of Network and System Management"},{"key":"6425_CR26","unstructured":"Location Privacy Protection Act, Location privacy protection act, (2001) http:\/\/www.techlawjournal.com\/cong107\/privacy\/location\/s1164is.asp ."},{"key":"6425_CR27","unstructured":"T. Narten and R. Draves, RFC3041 \u2013 Privacy Extensions for Stateless Address Autoconfiguration in IPv6, http:\/\/www.faqs.org\/ftp\/rfc\/rfc3041.txt ."},{"key":"6425_CR28","doi-asserted-by":"crossref","unstructured":"N. Negroponte, Being wireless, Wired 10(10) (2003).","DOI":"10.1016\/S1353-4858(03)01007-9"},{"key":"6425_CR29","unstructured":"M. Piszczalski, The next big thing: Wi-Fi, Automotive Design and Production (2002)."},{"issue":"3","key":"6425_CR30","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/35.667410","volume":"5","author":"J. Reed","year":"1998","unstructured":"J. Reed, K. Krizman, B. Woerner and T. Rappaport, An overview of the challenges and progress in meeting the e-911 requirement for location service, IEEE Personal Communications Magazine 5(3) (1998) 30\u201337.","journal-title":"IEEE Personal Communications Magazine"},{"issue":"1","key":"6425_CR31","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"M.K. Reiter and A.D. Rubin, Crowds: Anonymity for Web transactions, ACM Transactions on Information and System Security 1(1) (1998) 66\u201392.","journal-title":"ACM Transactions on Information and System Security"},{"key":"6425_CR32","doi-asserted-by":"crossref","unstructured":"C. Schurgers, G. Kulkarni and M.B. Srivastava, Distributed assignment of encoded MAC addresses in sensor networks, in: Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (2001) pp. 295\u2013298.","DOI":"10.1145\/501416.501463"},{"key":"6425_CR33","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MWC.2002.1043849","volume":"9","author":"A. Smailagic","year":"2002","unstructured":"A. Smailagic and D. Kogan, Location sensing and privacy in a context-aware computing environment, IEEE Wireless Communications 9 (2002) 10\u201317.","journal-title":"IEEE Wireless Communications"},{"key":"6425_CR34","doi-asserted-by":"crossref","unstructured":"M. Spreitzer and M. Theimer, Providing location information in a ubiquitous computing environment, in: Proceedings of the Fourteenth ACM Symposium on Operating System Principles (1993) pp. 270\u2013283.","DOI":"10.1145\/168619.168641"},{"key":"6425_CR35","unstructured":"W.R. Stevens, TCP\/IP Illustrated, (Addison-Wesley, 1994), Vol. 1."},{"key":"6425_CR36","unstructured":"A. Stubblefield, J. Ioannidis and A. Rubin, Using the Fluhrer, Mantin, and Shamir attack to break WEP, Technical Report TD4ZCPZZ, ATT Labs (2001)."},{"key":"6425_CR37","doi-asserted-by":"crossref","unstructured":"N.H. Vaidya, Weak duplicate address detection in mobile ad hoc networks, in: Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (2002) pp. 206\u2013216.","DOI":"10.1145\/513800.513826"},{"key":"6425_CR38","unstructured":"Wireless Geographic Logging Engine, Wireless geographic logging engine (2002) http:\/\/wigle.net\/gpsopen\/gps\/GPSDB\/ ."}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-005-6425-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-005-6425-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-005-6425-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T18:01:38Z","timestamp":1586196098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-005-6425-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,6]]}},"alternative-id":["6425"],"URL":"https:\/\/doi.org\/10.1007\/s11036-005-6425-1","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,6]]}}}