Randomized MAC Addresses for Privacy Enhancement

Slides:



Advertisements
Similar presentations
Submission doc.: IEEE 11-14/0430r2 March 2014 Dan Harkins, Aruba NetworksSlide 1 Randomized MAC Addresses for Privacy Enhancement Date: Authors:
Advertisements

Doc.: IEEE /1448 r00 Submission Paul A. Lambert, Marvell SemiconductorSlide Privacy Date: Authors: November 2013.
Doc.: IEEE /941r0 Submission July 2012 Slide 1 Access Control Mechanism for 11ah Date: Authors: NameAffiliationsAddressPhone Fang.
Submission doc.: IEEE 11-12/0589r2 July 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
Doc.: IEEE /1061r1 Submission September 2015 Kare Agardh, SonySlide 1 Further Use Cases for Next Generation Positioning Date: 2015/09/13 Authors:
Doc.: IEEE /0888 r00 Submission Paul A. Lambert, Marvell SemiconductorSlide 1 Security and Privacy Enhancements for Date: Authors:
Doc.: IEEE ai Submission NameAffiliationsAddressPhone George Calcev Huawei Technologies Co., Ltd. huawei.com TGai.
Submission doc.: IEEE 11-14/0062r0 January 2014 Dan Harkins, Aruba NetworksSlide 1 PMK Caching for FILS Date: Authors:
Doc.: IEEE /0834r0 Submission July 2015 Thomas Handte, SonySlide 1 Further Use Cases for Next Generation Positioning Date: 2015/07/13 Authors:
Submission doc.: IEEE /1128r1 September 2015 Dan Harkins, Aruba Networks (an HP company)Slide 1 Opportunistic Wireless Encryption Date:
Doc.: IEEE /109r1 Submission July 2002 J. Edney, H. Haverinen, J-P Honkanen, P. Orava, Nokia Slide 1 Temporary MAC Addresses for Anonymity Jon.
Submission doc.: IEEE 11-10/1367r00 Nov 2012 Hiroshi Mano (ATRD)Slide 1 TGai- Motion/Straw Poll-Nov-2012-San-Antonio Date: Authors:
Doc.: IEEE /0899r2 Submission July2010 Dan Harkins, Aruba NetworksSlide 1 Secure PSK Authentication Date: Authors:
FILS Reduced Neighbor Report
Access Control Mechanism for FILS
Month Year doc.: IEEE yy/xxxxr0 May 2012
Spatial Discovery in 60 GHz
TGai-Motion/Straw Poll-March-2013-Orlando
TGai-Motion/Straw Poll-Jan-2013-Vancouver
July 2010 doc.: IEEE /0903r0 A resolution proposal comments related to for next generation security in built on changes in ac 14.
Network Based Use Case Date: Authors: February 2016
Experience with MAC Address Randomization in Windows 10
P802.11aq Waiver request regarding IEEE RAC comments
P802.11aq Waiver request regarding IEEE RAC comments
Triggering the Broadcast Probe Response
Service discovery architecture for TGaq
AP Discovery Information Broadcasting
Wi-Fi Time Sensitive Networking
Wi-Fi Time Sensitive Networking
Opportunistic Wireless Encryption
P802.11aq Pre-Association Service Discovery Summary
P802.11aq Pre-Association Service Discovery Summary
P802.11aq Waiver Request Additional Information
Multi-band Discovery Assistance
Multiple Frequency Channel Scanning
Multi-band Discovery Assistance
Discovery Assistance for ay
Scanning from Specific Channel
Access Control Mechanism for FILS
Reducing Overhead in Active Scanning
Providing Faster GAS Response
Listen to Probe Request from other STAs
Reducing Overhead in Active Scanning
Local Administrator Advertisements
Access Control Mechanism for FILS
AP Power Down Notification
AP Power Down Notification
Discovery of ESS services
FD TIG Summary for EHT Date: Authors: November 2018 Name
Access distribution in ai
IMT-2020/5G SC Proposal Date: Authors: July 2016
TGai FILS: GAS/ANQP Signaling Reduction
Frame Request-Report Enhancements
Infrastructure Service Discovery
P802.11aq Waiver Request Introduction
P802.11aq Waiver request regarding IEEE RAC comments
P802.11aq Waiver request regarding IEEE RAC comments
Proposed Resolution to CID2114
FD TIG Summary for EHT Date: Authors: November 2018 Name
Month Year doc.: IEEE yy/xxxxr0 May 2012
FD TIG Summary for EHT Date: Authors: November 2018 Name
Spatial Discovery in 60 GHz
BSS Transition with Bearing
Reducing Overhead in Active Scanning
Reducing Overhead in Active Scanning
Network Based Use Case Date: Authors: February 2016
Do Not Fear Random MAC Addresses!
Providing Faster GAS Response
LC MAC submission – follow up
Simultaneous Tx/Rx Capability indication for multi-link operation
Presentation transcript:

Randomized MAC Addresses for Privacy Enhancement March 2014 doc.: IEEE 802.11-14/0430r0 March 2014 Randomized MAC Addresses for Privacy Enhancement Date: 2014-03-18 Authors: Dan Harkins, Aruba Networks Dan Harkins, Aruba Networks

March 2014 doc.: IEEE 802.11-14/0430r0 March 2014 Abstract This slide deck presents the idea of using randomized MAC addresses as a tool to enhance privacy in 802.11 Dan Harkins, Aruba Networks Dan Harkins, Aruba Networks

What’s the Privacy Issue? March 2014 What’s the Privacy Issue? Passive observation of 802.11 bands reveals MAC addresses STAs active probing when not connected to a network Communication to connected network Location plus time plus frequency plus MAC address allows sensitive information to be gleaned This MAC address pops up around the AIDs clinic twice a week This MAC address is near the liquor store at 8am every day This MAC address leaves a certain apartment building in the early morning almost every weekend Social networks of such meta data can be built with good accuracy in positive identification Dan Harkins, Aruba Networks

What’s the Privacy Issue? March 2014 What’s the Privacy Issue? Sample headlines from 11-13/1448r1: Seattle Police Deactivate Wi-Fi Spy Grid After Privacy Outcry (Nov 2013) A DHS and Seattle police network collecting location information CreepyDOL Wi-Fi Surveillance project debuts at BlackHat/DEFCON (Aug 2013) DIY surveillance with low-cost Wi-Fi based sensors that capture MAC addresses Wi-Fi Trashcans Now Silently Tracking Your Smartphone Data (Aug 2013) ... the company boasted that the cans, which included LCD advertising screens, "provide an unparalleled insight into the past behavior of unique devices"—and hence of the people who carry them around Guardian article last week: Phone call metadata does betray sensitive details about your life (Mar 2014) Stanford researchers were able accurately identify volunteers in a study that gave up their meta data, determining that one person probably had MS, another probably had an abortion, and another probably grew marijuana Dan Harkins, Aruba Networks

Proposal When not attached to a network… When attaching to a network… March 2014 doc.: IEEE 802.11-14/0430r0 March 2014 Proposal When not attached to a network… Assign a random MAC address to the wireless interface of portable and mobile STAs (not fixed STAs and APs) Periodically change to a new random MAC address Don’t actively probe for known networks When attaching to a network… Choose a new random MAC address and connect While attached to a network… Keep the same MAC address for the life of the connection Cache PMKSAs (and the MAC address therein) in an RSN When reattaching to a network… Assign the MAC address from the cached PMKSA, then connect Dan Harkins, Aruba Networks Dan Harkins, Aruba Networks

What’s a Random MAC address? March 2014 What’s a Random MAC address? Take a 48-bit datum Assign the datum a random 48-bit string Set the bit indicating “locally administered MAC” Clear the “unicast/multicast” bit indicating unicast Assign that 48-bit datum to the MAC address Dan Harkins, Aruba Networks

Obvious Question #1 Whaddya mean random? March 2014 Obvious Question #1 Whaddya mean random? Make a random selection from the pool of available MAC addresses Each possible MAC address from the pool of available MAC addresses has equal probability of being chosen I mean the same thing as is meant by the use of the word in section 8.2.4.3.4 in IEEE Std 802.11-2012 But where does it say how to do that? Well, appendix M.5 of IEEE Std 802.11-2012 has some fine recommendations for implementers to follow Note: I’m not blazing a new trail by using the word random! Dan Harkins, Aruba Networks

Obvious Question #2 What are you gonna do about collisions? Nothing! March 2014 doc.: IEEE 802.11-14/0430r0 March 2014 Obvious Question #2 What are you gonna do about collisions? Nothing! There are 246 possible random MAC addresses The chosen MAC addresses have to be unique in bridged network, they don’t have to be globally unique So for n people the probability of 2 choosing the same MAC address from a pool of size 246 is: 1 – ((246 – 1)/246)(n*(n-1))/2 Let’s say roughly 1000 STAs in the wireless network that means 499500 different pairings, probability becomes: 1 – ((246 – 1)/246)499500 It’s too small to worry about! Dan Harkins, Aruba Networks Dan Harkins, Aruba Networks

Obvious Question #3 Won’t this screw up a whole bunch of 802.11? March 2014 Obvious Question #3 Won’t this screw up a whole bunch of 802.11? Don’t think so, unless pervasive monitoring is viewed as a positive Won’t this screw up services provided to users of 802.11? Depends on the service, but probably there are some. It’s optional; UIs (not done here) can make this an opt-in If you want to take advantage of a service that requires you to be tracked then don’t use this optional feature Patient: “Doctor it hurts when I do this” Doctor: “Don’t do that” Dan Harkins, Aruba Networks

References 11-13/1448r1 – 802.11 privacy March 2014 doc.: IEEE 802.11-14/0430r0 March 2014 References 11-13/1448r1 – 802.11 privacy Dan Harkins, Aruba Networks Dan Harkins, Aruba Networks

March 2014 Straw Poll Do you support the idea of adding a description of doing randomized MAC addresses in the 802.11 standard? Yes: No: Don’t care: Dan Harkins, Aruba Networks

March 2014 Motion Instruct the editor to incorporate the changes specified in 11-14/0367r2 into the TGm draft Moved by: Seconded by: Yes votes: No votes: Abstain votes: Dan Harkins, Aruba Networks