On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.

Slides:



Advertisements
Similar presentations
1 Inducements–Call Blocking. Aware of the Service?
Advertisements

Online Max-Margin Weight Learning with Markov Logic Networks Tuyen N. Huynh and Raymond J. Mooney Machine Learning Group Department of Computer Science.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
and 6.855J Cycle Canceling Algorithm. 2 A minimum cost flow problem , $4 20, $1 20, $2 25, $2 25, $5 20, $6 30, $
and 6.855J Spanning Tree Algorithms. 2 The Greedy Algorithm in Action
Scalable Routing In Delay Tolerant Networks
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Version 1.0 digitaloffice.intel.com Intel ® vPro Technology Intel ® Active Management Technology Setup and Configuration HP Laptop – Compaq 6910p Small.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Taming User-Generated Content in Mobile Networks via Drop Zones Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
Outline Minimum Spanning Tree Maximal Flow Algorithm LP formulation 1.
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
2 |SharePoint Saturday New York City
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
VOORBLAD.
Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
Copyright © 2013, 2009, 2006 Pearson Education, Inc.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Radar Palette Home Click Conventional Warm Sector 1 Ahead of WCB within the Warm Sector Click for the Conceptual Model and Explanation.
Januar MDMDFSSMDMDFSSS
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Essential Cell Biology
Mani Srivastava UCLA - EE Department Room: 6731-H Boelter Hall Tel: WWW: Copyright 2003.
Immunobiology: The Immune System in Health & Disease Sixth Edition
1 Functions and Applications
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
New Opportunities for Load Balancing in Network-Wide Intrusion Detection Systems Victor Heorhiadi, Michael K. Reiter, Vyas Sekar UNC Chapel Hill UNC Chapel.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis
Presentation transcript:

On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009

Phones – Always on (Bluetooth, WiFi) – Background apps New hardware going wireless – Cars, passports, keys, … Wireless Trends 2

Peer-to-Peer Wireless Networks Message Identifier 2 2

Examples 4 Urban Sensing networks Delay tolerant networks Peer-to-peer file exchange VANETs Social networks

Location Privacy Problem 5 a b c Monitor identifiers used in peer-to-peer communications

bluetoothtracking.org 6

Previous Work Pseudonymous location traces – Home/work location pairs are unique [1] – Re-identification of traces through data analysis [2,3,5] Location traces without any pseudonyms – Re-identification of individual trace and home [4] Attack: Spatio-Temporal correlation of traces 7 Message Identifier [1] P. Golle and K. Partridge. On the Anonymity of Home/Work Location Pairs. Pervasive Computing, 2009 [2] A. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 2003 [3] B. Hoh et al. Enhancing Security & Privacy in Traffic Monitoring Systems. Pervasive Computing, 2006 [4] B. Hoh and M. Gruteser. Protecting location privacy through path confusion. SECURECOMM, 2005 [5] J. Krumm. Inference Attacks on Location Tracks. Pervasive Computing, 2007 Pseudonym Message

Location Privacy with Mix Zones Prevent long term tracking 8 Mix zone a a b b ? Change identifier in mix zones [6,7] Key used to sign messages is changed MAC address is changed [6] A. Beresford and F. Stajano. Mix Zones: User Privacy in Location-aware Services. Pervasive Computing and Communications Workshop, 2004 [7] M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mobile Networks and Applications, 2005

Mix Zones Mix network Mix networks vs Mix zones 9 Mix node Mix node Mix node Mix node Mix node Mix node Alice Bob Alice home Alice work

Where to place mix zones? 10

Outline 1.Mix Zone Effectiveness 2.Placement of Mix Zones 3.Application Example 11 Shibuyu Crossing, Tokyo

Mobility Model Nodes move according to flows [8] – A flow defines a trajectory in network – Nodes belong to a single flow – Several nodes share same flow 12 [8] M.C. Gonzalez, C.A. Hidalgo, and A.-L. Barabasi. Understanding individual Human Mobility Patterns. Nature, 2008

Mix Zones Model Mix zones have – Set of entry/exit points – Traversed by mobile nodes Mobility profile of a mix zone [6] – Trajectory – Sojourn time 13

Trajectory 14 3/41/40 1/3 2/301/3 1/21/4

Sojourn Time 15 ΔtΔt Pr( Δ t)

Mix Zone Effectiveness Event-Based Metric [6] 16 P v is probability of assignment I = total number of assignments T t t Entering events Exiting events 1 2 ab

Event-Based Discussion Precise Measures attacker success Requires installing eavesdropping stations at every mix zones What if nodes are across various windows T High complexity (compute all assignments) – –

Mix Zone Effectiveness Flow-based Metric Desired properties – Prior to network operation – Rely on general statistics of mobility – Efficient Key idea – Consider average behavior in mix zones – Measure probability of error of adversary 18

Decision Theory Model Assume 2 flows f 1, f 2 converge to same exit 19 Mix zone 1 1 x x 2 2 Choice under uncertainty Any event

Bayes Decision Rule Choose hypothesis with largest a posteriori probability Minimizes probability of error 20 is the a priori probability that an event belongs to f j is the conditional probability of observing x knowing that x belongs to f j

pepe Probability of Error 21

Jensen-Shannon Divergence Measure distance between probability distributions 22 Provides both lower and upper bounds for the probability of error

Outline 23 Illustration of Metric

Outline 1.Mix Zone Effectiveness 2.Placement of Mix Zones 3.Application Example 24

Description Central authority decides offline where to deploy mix zones – Knows mobility model – Knows effectiveness of possible mix zones locations 25

Distance to Confusion [9] Between mix zones, adversary can track nodes Mix zone = confusion point Bound distance between mix zones 26 Mix zone 1 Mix zone 2 Distance-to-confusion [9] B. Hoh et al.. Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring. MobiSys, 2008

Cost of mix zones Use pseudonyms Must remain silent for a period of time Bound cost for each node 27

Placement Optimization Use a subset of all possible mix zones 28 Cost Distance to confusion Mix zone effectiveness where w i is cost of a mix zone W max is maximum cost C max is maximum distance-to-confusion

Illustration of Algorithm

Outline 1.Mix Zone Effectiveness 2.Placement of Mix Zones 3.Application Example 30

Simulation Setup Urban mobility simulator (SUMO) – Real (cropped) map – Flows Attack Implementation (MOBIVACY) – Compute mobility profiles for each mix zone – Predict most probable assignment of entering/exiting nodes for each mix zone 31

Map of New York City 32

Metric & Configuration Matching success of mix zone i Tracking success System parameters – dtc <= 2km – cost <= 3 mix zones 33

Mix Zone Performance 34

Mix Zone Placement 35 (avg=0.48) (avg=1.56) (avg=1.55) (avg=3.56)

Tracking Success for different deployments 36

Performance of Deployment 37

Tracking Success with different traffic conditions 38

Conclusion Construct a network of mix zones Measure of mix zones effectiveness based on – Mobility profiles – Jensen-Shannon divergence Optimization model Results – Optimal algorithm prevents bad placement – 30% increase of location privacy compared to random 39

BACKUP SLIDES 40

Future Work Real mobility traces – More realistic intersection model Weight location in optimization – Some regions are more sensitive Larger map Other attacks 41

How to obtain mix zones? Silent mix zones – Turn off transceiver Passive mix zones – Where adversary is absent – Before connecting to Wireless Access Points Encrypt communications – With help of infrastructure – Distributed 42

Event-based Metric Assume adversary knows mobility profiles Consider nodes entering/exiting mix zone i over T time steps P v is probability of assignment I = total number of assignments Average entropy: 43

Generalization Consider average behavior 44 Mix zone 1 1 x x

Mix Zone Placement 45 Average number of traversed mix zone = average cost Optimal performs close to full at much lower cost

Tracking Success for different adversary strength 46

Tracking Success for different mix zone radius 47

Average Tracking Success 48