Infrastructure Engineering - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 4 of 4
  • Item
    Thumbnail Image
    "Simplest" paths: automated route selection for navigation
    DUCKHAM, MATT ; KULIK, LARS (Springer, 2003)
    Numerous cognitive studies have indicated that the form andcomplexity of route instructions may be as important to human navigatorsas the overall length of route. Most automated navigation systemsrely on computing the solution to the shortest path problem, and not theproblem of finding the “simplest” path. This paper addresses the issueof finding the “simplest” paths through a network, in terms of the instructioncomplexity. We propose a “simplest” paths algorithm that hasquadratic computation time for a planar graph. An empirical study ofthe algorithm’s performance, based on an established cognitive model ofnavigation instruction complexity, revealed that the length of a simplestpath was on average only 16% longer than the length of the correspondingshortest path. In return for marginally longer routes, the simplest pathalgorithm seems to offer considerable advantages over shortest paths interms of their ease of description and execution. The conclusions indicateseveral areas for future research: in particular cognitive studies areneeded to verify these initial computational results. Potentially, the simplestpaths algorithm could be used to replace shortest paths algorithmsin any automated system for generating human navigation instructions,including in-car navigation systems, Internet driving direction servers,and other location-based services.
  • Item
    Thumbnail Image
    A formal model of obfuscation and negotiation for location privacy
    DUCKHAM, MATT ; KULIK, LARS (Springer, 2005)
    Obfuscation concerns the practice of deliberately degradingthe quality of information in some way, so as to protect the privacy ofthe individual to whom that information refers. In this paper, we arguethat obfuscation is an important technique for protecting an individual’slocation privacy within a pervasive computing environment. The papersets out a formal framework within which obfuscated location-based servicesare defined. This framework provides a computationally efficientmechanism for balancing an individual’s need for high-quality informationservices against that individual’s need for location privacy. Negotiationis used to ensure that a location-based service provider receivesonly the information it needs to know in order to provide a service ofsatisfactory quality. The results of this work have implications for numerousapplications of mobile and location-aware systems, as they providea new theoretical foundation for addressing the privacy concerns thatare acknowledged to be retarding the widespread acceptance and use oflocation-based services.
  • Item
    Thumbnail Image
    Simulation of obfuscation and negotiation for location privacy
    DUCKHAM, MATT ; KULIK, LARS (Springer, 2005)
    Current mobile computing systems can automatically sense and communicatedetailed data about a person’s location. Location privacy is an urgent researchissue because concerns about privacy are seen to be inhibiting the growthof mobile computing. This paper investigates a new technique for safeguardinglocation privacy, called obfuscation, which protects a person’s location privacy bydegrading the quality of information about that person’s location. Obfuscation isbased on spatial imperfection and offers an orthogonal approach to conventionaltechniques for safeguarding information about a person’s location. Imprecisionand inaccuracy are two types of imperfection that may be used to achieve obfuscation.A set of simulations are used to empirically evaluate different obfuscationstrategies based on imprecision and inaccuracy. The results show that obfuscationcan enable high quality of service in concert with high levels of privacy.
  • Item
    Thumbnail Image
    A spatiotemporal model of obfuscation strategies and counter strategies for location privacy
    DUCKHAM, MATT ; KULIK, LARS ; Birtley, Athol ( 2006)
    Safeguarding location privacy is becoming a critical issue in location based services and location-aware computing generally. Two drawbacks of many previous models of location privacy are: 1) the models only consider a person’slocation privacy protection, but not the invasion of location privacy by external agents; and 2) the models are static and do not consider the spatiotemporal aspectsof movement. We argue that, to be complete, any model of location privacy needs to enable the analysis and identification of techniques both to protect and toinvade an individual’s location privacy over time. One way to protect an individual’s location privacy is to minimize the information revealed about a person’s location, termed obfuscation. This paper presents an explicitly spatiotemporalmodel of location privacy that models a third party’s limited knowledge of a mobileindividual’s location. We identify two core strategies that a third party canuse to refine its knowledge, so potentially invading that mobile individual’s locationprivacy. A global refinement strategy uses the entire history of knowledgeabout an agent’s location in a single step. A local refinement strategy iterativelyconstructs refined knowledge over time.We present a formal model of global andlocal refinement operators, and show how this formal model can be translatedinto a computational model in a simulation environment.