{"id":"https://openalex.org/W2946229657","doi":"https://doi.org/10.1145/3317549.3326307","title":"Enclave-based privacy-preserving localization","display_name":"Enclave-based privacy-preserving localization","publication_year":2019,"publication_date":"2019-05-15","ids":{"openalex":"https://openalex.org/W2946229657","doi":"https://doi.org/10.1145/3317549.3326307","mag":"2946229657"},"language":"en","primary_location":{"id":"doi:10.1145/3317549.3326307","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3326307","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004838887","display_name":"Joseph I. Choi","orcid":"https://orcid.org/0000-0003-4048-8306"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Joseph I. Choi","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015662045","display_name":"Dave Tian","orcid":"https://orcid.org/0000-0002-7506-9593"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dave (Jing) Tian","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023825610","display_name":"Tyler Ward","orcid":"https://orcid.org/0000-0003-0669-1407"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tyler Ward","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039485542","display_name":"Kevin Butler","orcid":"https://orcid.org/0000-0002-7498-4239"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin R. B. Butler","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048941759","display_name":"Patrick Traynor","orcid":"https://orcid.org/0000-0002-7143-5189"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick Traynor","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090298379","display_name":"John M. Shea","orcid":"https://orcid.org/0000-0003-3323-3575"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John M. Shea","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030883519","display_name":"Tan F. Wong","orcid":"https://orcid.org/0000-0002-4457-5805"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tan F. Wong","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5004838887"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04202471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"312","last_page":"313"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7499406933784485},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.5954895615577698},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5875847339630127},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4767759144306183},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4765354096889496},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4450565278530121},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43602439761161804},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3925287425518036},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35867220163345337},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3207506537437439}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7499406933784485},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.5954895615577698},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5875847339630127},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4767759144306183},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4765354096889496},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4450565278530121},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43602439761161804},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3925287425518036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35867220163345337},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3207506537437439},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3317549.3326307","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3326307","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1989770234","https://openalex.org/W2577421826","https://openalex.org/W2773123853"],"related_works":["https://openalex.org/W4254637722","https://openalex.org/W2980401999","https://openalex.org/W3016483420","https://openalex.org/W2331628363","https://openalex.org/W2393030234","https://openalex.org/W3198851420","https://openalex.org/W2379730136","https://openalex.org/W2088149615","https://openalex.org/W4300305156","https://openalex.org/W2944981245"],"abstract_inverted_index":{"In":[0,72],"cooperative":[1],"spectrum":[2,21,83],"sensing,":[3],"multiple":[4,166],"sensors":[5,80],"work":[6,70,173],"together":[7],"to":[8,24,69,153],"perform":[9],"tasks":[10],"such":[11,67],"as":[12,97],"localizing":[13],"a":[14,98,182],"target":[15],"transmitter.":[16],"However,":[17],"the":[18,27,37,47,77,95,120,129,154],"exchange":[19],"of":[20,26,30,40,49,79,122,151,168],"measurements":[22,87],"leads":[23],"exposure":[25],"physical":[28],"location":[29,78],"participating":[31],"sensors.":[32],"Furthermore,":[33],"in":[34,82,133,181],"some":[35],"cases,":[36],"sensitive":[38],"characteristics":[39],"all":[41],"participants":[42],"can":[43,177],"be":[44,60,178],"revealed":[45],"through":[46],"compromise":[48],"any":[50],"one":[51],"sensor.":[52],"Accordingly,":[53],"without":[54],"guarantees":[55],"about":[56],"how":[57,119],"data":[58,189],"will":[59],"handled,":[61],"there":[62],"is":[63],"little":[64],"reason":[65],"for":[66,101],"devices":[68],"together.":[71],"this":[73,109],"work,":[74],"we":[75],"protect":[76],"cooperating":[81],"sensing":[84],"by":[85],"processing":[86,152,156],"within":[88],"attestable":[89],"containers,":[90],"or":[91],"enclaves.":[92],"We":[93,107,138],"use":[94],"enclave":[96,110],"building":[99],"block":[100],"new":[102],"privacy-preserving":[103],"particle":[104,142],"filter":[105,143],"protocols.":[106],"instantiate":[108],"using":[111],"Intel":[112],"Software":[113],"Guard":[114],"Extensions":[115],"(SGX)":[116],"and":[117,135],"investigate":[118],"inclusion":[121],"enclaves":[123,176],"impacts":[124],"sensor":[125],"privacy,":[126],"carefully":[127],"enumerating":[128],"different":[130],"threats":[131],"present":[132],"centralized":[134],"decentralized":[136,183],"architectures.":[137],"show":[139],"that":[140,175],"enclave-based":[141],"protocols":[144],"incur":[145],"minimal":[146],"overhead":[147],"(adding":[148],"16":[149],"milliseconds":[150],"measurement":[155],"function":[157],"versus":[158],"unprotected":[159],"computation),":[160],"whereas":[161],"cryptographically-based":[162],"approaches":[163],"suffer":[164],"from":[165],"orders":[167],"magnitude":[169],"greater":[170],"costs.":[171],"Our":[172],"demonstrates":[174],"effectively":[179],"deployed":[180],"architecture":[184],"while":[185],"dramatically":[186],"improving":[187],"current":[188],"handling":[190],"techniques.":[191]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
