Presented By Siddartha Ailuri Graduate Student, EECS 04/07/17

Slides:



Advertisements
Similar presentations
Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
Advertisements

IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Automated Evaluation of Runtime Object States Against Model-Level States for State-Based Test Execution Frank(Weifeng) Xu, Gannon University Dianxiang.
Doc.: Handoff_WNG_Presentation r3 Submission July David Johnston, IntelSlide Handoff Presentation to WNG David Johnston.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Group #1: Protocols for Wireless Mobile Environments.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Self-Management in Chaotic Wireless Deployments A. Akella, G. Judd, S. Seshan, P. Steenkiste Presentation by: Zhichun Li.
BluEyes Bluetooth Localization and Tracking Ei Darli Aung Jonathan Yang Dae-Ki Cho Mario Gerla Ei Darli Aung Jonathan Yang Dae-Ki Cho Mario Gerla.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
GeoPKDD Geographic Privacy-aware Knowledge Discovery and Delivery Kick-off meeting Pisa, March 14, 2005.
Personalization in Local Search Personalization of Content Ranking in the Context of Local Search Philip O’Brien, Xiao Luo, Tony Abou-Assaleh, Weizheng.
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices Igor Bilogrevic, Member, IEEE, Murtuza Jadliwala, Member, IEEE, Vishal Joneja,
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
Adaptive Information-Sharing for Privacy-Aware Mobile Social Network Igor Bilogrevic 1, Kévin Huguenin 1, Berker Agir 1, Murtuza Jadliwala 2 and Jean-Pierre.
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
Architectures and Algorithms for Future Wireless Local Area Networks  1 Chapter Architectures and Algorithms for Future Wireless Local Area.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Performance Evaluation of Mobile Hotspots in Densely Deployed WLAN Environments Presented by Li Wen Fang Personal Indoor and Mobile Radio Communications.
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
Sharp Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks
TempLab : A Testbed to Study the Impact of Temperature on Wireless Sensor Networks C.A. Boanoy, M.A. Zúñiga, J. Brownz, U. Roedigz, C. Keppitiyagama§,
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
O N THE O PTIMAL P LACEMENT OF M IX Z ONES : A G AME -T HEORETIC A PPROACH Mathias Humbert LCA1/EPFL January 19, 2009 Supervisors: Mohammad Hossein Manshaei.
Optimizing the Location Obfuscation in Location-Based Mobile Systems Iris Safaka Professor: Jean-Pierre Hubaux Tutor: Berker Agir Semester Project Security.
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. Authors: Laurent Bindschaedler, Murtuza Jadliwala,
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Presented by Edith Ngai MPhil Term 3 Presentation
Information Security, Theory and Practice.
Introduction Wireless devices offering IP connectivity
Architecture and Algorithms for an IEEE 802
Quantifying Location Privacy
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
The Devil and Packet Trace Anonymization
Introduction to Wireless Sensor Networks
A secure and traceable E-DRM system based on mobile device
Peer-to-peer networking
Wireless Sensor Network Architectures
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
De-anonymizing the Internet Using Unreliable IDs
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
De-anonymizing the Internet Using Unreliable IDs By Yinglian Xie, Fang Yu, and Martín Abadi Presented by Peng Cheng 03/22/2017.
DDoS Attack Detection under SDN Context
Mobile Agents.
Presented by Jason L.Y. Lin
Amar B. Patel , Shushan Zhao
An Improved Novel Key Management Protocol for RFID Systems
A Unified Framework for Location Privacy
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Enabling Prediction of Performance
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Edinburgh Napier University
IETF102 – Montreal Pierre Peloso, Laurent Ciavaglia
Presentation transcript:

Presented By Siddartha Ailuri Graduate Student, EECS 04/07/17 Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, and Jean-Pierre Hubaux Presented By Siddartha Ailuri Graduate Student, EECS 04/07/17

Agenda Introduction Mobile Network Model Adversary Model Pseudonym Change Algorithm (PCA) Data Collection & attack Tracking Framework & Strategies Empirical Evaluations Conclusion

Introduction Mix-Zones were proposed by Beresford et. al. in which the identifiers are changed with pseudonyms. Context based identifier change algorithms. In this paper the authors are conducting an experiment involving 80 volunteers for 4 months. Mixed zones are dynamically created when a certain conditions are met like a certain number of devices in the neighborhood. When a mixed zone is created all devices in the zone will disconnect from the network and join the network with new pseudo MAC Address after the silent period. This will create confusion among the attacker by de-correlating the identities with traces.

Mobile Network Model Mobile network testbed in EPFL campus

Cont. The participants are expected to use Nokia N900 devices which was NIC enabled. All devices are honest and the adversary has no direct access to devices. Non-interactive and Interactive communications. Adaptive Beaconing mechanism for neighbor discovery Devices run Pseudonym change algorithm(PCA) which changes the pseudonym assigned to MAC address of the device.

Adversary Model 37 Access Points acting as sniffers across six interconnected buildings which run a “tcpdump” process to capture messages. The adversary is interested in the location and identity in the message not the contents. The adversary cannot replay the messages.

Pseudonym Change Algorithm (PCA) Since the IP address is dynamical we concentrate our efforts in changing the MAC address. PCA Evaluation is done in 3 sets of parameters Cost-effective, Intermediate and Privacy sensitive.

Cont.

Data Collection & attack The attacker has collected the messages now he needs to reconstruct the path or location trace. The dump contains multiple copies of data and the attacker needs to derive the position by using RSSI and position of sniffers. The adversary will aggregate the paths and tries to construct the path close to the groundtruth.

Cont. Time-stamp Synchronization. Event identification Synchronizing the time across all APs. Event identification Messages are recorded as events Timestamp Aggregation Creating an accurate timestamp for messages Coordinate Mapping Position estimation

Cont.

Tracking Framework & Strategies Common Sniffing Stations Speed Matching Tracking Strategies Locally Optimal Walk Globally Optimal Walk

Empirical Evaluation Privacy Metrics Traceability Metric τ Uncertainty Metric u Traceability Uncertainty Metric µ Clustering Metric c

Cont.

Cont.

Cont.

Cont.

Cont.

Conclusion Outcomes By changing the identifiers aggressively and randomly improves the privacy of user. The silent period should be random rather than fixed. New adversary model is needed.