Srinivasan Seshan (and many collaborators) Carnegie Mellon University 1.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Improving Wireless Privacy with an Identifier-Free Link Layer Protocol Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, and.
WiFi-Reports: Improving Wireless Network Selection with Collaboration Presented By Tim McDowell.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 1 CMU 2 Intel Research Seattle.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
1 (Un)Trustworthy Wireless: What your wireless traffic says about you… Jeff Pang with Ben Greenstein, Ramki Gummadi, Tadayoshi Kohno, David Wetherall (UW/Intel.
1 Tryst: Making Local Service Discovery Confidential Jeffrey Pang Ben Greenstein Srinivasan Seshan David Wetherall.
Wifi-Reports Improving Wireless Network Selection with Collaboration Jeffrey Pang (CMU) Ben Greenstein (Intel Research Seattle) Michael Kaminsky (Intel.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 1 CMU 2 Intel Research Seattle.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
1/40 Quantifying and Preventing Privacy Threats in Wireless Link Layer Protocols Thesis Proposal Jeffrey Pang.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Link Setup Time (ms) Details : How do sender and receiver synchronize i ? Discovery/binding messages: infrequent and narrow interface  short term linkability.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
1 Making Local Service Discovery Confidential with Tryst Jeffrey Pang CMU Ben Greenstein Intel Research Srinivasan Seshan CMU David Wetherall University.
User Fingerprinting Jeff Pang, Ben Greenstein, Ramki Gummadi, Srini Seshan, and David Wetherall Most slides borrowed from Ben.
WiFi-Reports: Improving Wireless Network Selection Jeffrey Pang (CMU) with Ben Greenstein (IRS) Michael Kaminsky (IRP) Damon McCoy (U. Colorado) Srinivasan.
Improving Wireless Privacy with an Identifier-Free Link Layer Protocol Ben Greenstein et.al. MobiSys’08 Presented by Seo Bon Keun.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Wifi-Reports: Improving Wireless Network Selection with Collaboration Jeffrey Pang (CMU) Ben Greenstein (Intel Research Seattle) Michael Kaminsky (Intel.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
CSCI 6962: Server-side Design and Programming
Improving the Privacy of Wireless Protocols Jeffrey Pang Carnegie Mellon University.
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
1 Chapter Overview Wireless Technologies Wireless Security.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless and Security CSCI 5857: Encoding and Encryption.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Chapter 4 Computer Networks – Part 1
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WiFi-Reports: Improving Wireless Network Selection Jeffrey Pang (CMU) with Ben Greenstein (IRS) Michael Kaminsky (IRP) Damon McCoy (U. Colorado) Srinivasan.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security David Lazăr.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 Presenter: Nan Jiang Most Slides:
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Improving Wireless Privacy with an Identifier-Free Link Layer Protocol Ben Greenstein, Damon McCoy, Yoshi Kohno, Jeffrey Pang, Srini Seshan, and David.
Doc.: IEEE /1022r0 Submission September 2008 Greenstein (Intel) et al. Slide 1 SlyFi: Enhancing Privacy by Concealing Link Layer Identifiers.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
K. Salah1 Security Protocols in the Internet IPSec.
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Skype.
Chapter 9: Transport Layer
Introduction Wireless devices offering IP connectivity
Instructor Materials Chapter 9: Transport Layer
Jeffrey Pang Carnegie Mellon University
Presentation transcript:

Srinivasan Seshan (and many collaborators) Carnegie Mellon University 1

2

3 Protocol Header Protocol Control Info

What can Protocol Control Info Reveal? To speed association, done via SSIDs  Sample data below from SIGCOMM Home Cross-index with location databases (Wigle) for geographic information. Set of SSIDs helps to identify user in terms of networks and places they’ve been

What can Protocol Control Info Reveal? 5 Location traces can be deanonymized [Beresford 03, Hoh 05-07, Krum 07] Kim’s House

Who Might be Tracking You? 6

Outline Quantifying the tracking threat Building identifier-free protocols Private crowd-sourcing 7

Name: Bob’s Device Secret: Alice<3Bob Name: Alice’s Device Secret: Alice<3Bob Bootstrap Out-of-band (e.g., password, PIN) Confidentiality Authenticity Integrity Best Security Practices Today 8  K session Use to encrypt & authenticate

Identifiers A well known technical problem  Devices have unique and consistent addresses  e.g., devices have MAC addresses  fingerprinting them is trivial! 9 MAC address now: 00:0E:35:CE:1F:59 MAC address later: 00:0E:35:CE:1F:59 Adversary tcpdump time

Identifiers The widely proposed technical solution  Pseudonyms: Change addresses over time  : Gruteser ’05, Hu ’06, Jiang ’07  Bluetooth: Stajano ’05  RFID: Juels ‘04  GSM: already employed 10 MAC address now: 00:0E:35:CE:1F:59 MAC address later: 00:AA:BB:CC:DD:EE tcpdump ? time

Identifiers Our work shows: Pseudonyms + WPA are not enough  Implicit identifiers: identifying characteristics of traffic  E.g., most users identified with 90% accuracy in hotspots 11 00:0E:35:CE:1F:5900:AA:BB:CC:DD:EE tcpdump Search: “Bob’s Home Net” Packets  Intel Server … Search: “Bob’s Home Net” Packets  Intel Server … time

Implicit Identifiers by Example Consider one user at SIGCOMM 2004  Seen in an “anonymized” wireless trace (device addresses hashed, effectively a temporary address)  Transferred 512MB via BitTorrent on a congested network (Poor network etiquette?) Can we still identify the culprit? 12

Tracking Example Fingerprint: network names in probes ? User of “roofnet” community network at MIT Wardriving Database 13

Bootstrap Problem: Long-term Linkability 14 Name: Alice’s Laptop Secret: Alice<3Bob Name: Bob’s Network Secret: Alice<3Bob Is Bob’s Network here? Bob’s Network is here Identifiers needed for rendezvous! Proof that I’m Alice Proof that I’m Bob Identifiers needed for authentication!

Implicit Identifiers by Example Implicit identifier: SSIDs in probes  Set of SSIDs in probe requests  Many drivers search for preferred networks  Usually networks you have associated with before 15 00:0E:35:CE:1F:59 SSID Probe: “roofnet” tcpdump Bittorrent transfer 00:AA:BB:CC:DD:EE ? tcpdump time

Tracking Example Fingerprint: IP broadcast packet sizes  Set of broadcast packet sizes in network traffic  e.g., advertisements by Apple Bonjour, iTunes, NetBIOS ? time 16

From: 12:34:56:78:90:ab To: 11:22:33:44:55:66 From: 12:34:56:78:90:ab To: 11:22:33:44:55:66 From: 12:34:56:78:90:ab To: 11:22:33:44:55:66 From: 12:34:56:78:90:ab To: 11:22:33:44:55:66 From: 00:00:99:99:11:11 To: 11:22:33:44:55:66 From: 00:00:99:99:11:11 To: 11:22:33:44:55:66 From: 00:00:99:99:11:11 To: 11:22:33:44:55: bytes 500 bytes 250 bytes 200 bytes Data packets in the same session remain linked; in aggregate, these can be fingerprints Data packets in the same session remain linked; in aggregate, these can be fingerprints Problem: Short-term Linkability 17 From: 00:00:99:99:11:11 To: 22:33:AA:BB:CC:DD From: 00:00:99:99:11:11 To: 22:33:AA:BB:CC:DD From: 00:00:99:99:11:11 To: 22:33:AA:BB:CC:DD 11:22:33:44:55:66 22:33:AA:BB:CC:DD

Bootstrap Problem: Short-term Linkability 18 Name: Alice’s Laptop Secret: Alice<3Bob Name: Bob’s Network Secret: Alice<3Bob Is Bob’s Network here? Bob’s Network is here Proof that I’m Alice Proof that I’m Bob Identifiers needed for packet filtering! 250 bytes 500 bytes

Fingerprint Accuracy Developed an automated identification algorithm  Based on Naïve Bayes classifier  Fingerprints:  network names  broadcast packet sizes  supported capabilities Simulated user tracking with traffic from 500+ users  Assume encryption and device address changes each hour 19 Question: Given some traffic samples from a device, can we identify when it is present in the future? Question: Given some traffic samples from a device, can we identify when it is present in the future? Was Alice here? Known to be from Alice

Fingerprint Accuracy Results:  53% of devices can be identified with 90% accuracy when at a small hotspot for the day (5 devices/hour)  27% with 99% accuracy  17% even if in a very busy hotspot (100 users/hour)  More fingerprints exist  this is only a lower bound! 20 Question: Given some traffic samples from a device, can we identify when it is present in the future? Question: Given some traffic samples from a device, can we identify when it is present in the future? Was Alice here? Known to be from Alice

Bootstrap Is There a Common Defense? 21 Name: Alice’s Laptop Secret: Alice<3Bob Name: Bob’s Network Secret: Alice<3Bob Is Bob’s Network here? Bob’s Network is here Proof that I’m Alice Proof that I’m Bob Problem: Long-term Linkability Problem: Short-term Linkability

Goal: Make All Bits Appear Random Bootstrap 22 Name: Alice’s Laptop Secret: Alice<3Bob Name: Bob’s Network Secret: Alice<3Bob No bits linkable over the long-term Many streams overlap in real traffic  much nosier side-channels

Goal: Make All Bits Appear Random Bootstrap 23 Identifiers needed for rendezvous! Identifiers needed for authentication! Identifiers needed for packet filtering! Name: Alice’s Laptop Secret: Alice<3Bob Name: Bob’s Network Secret: Alice<3Bob

Outline Quantifying the tracking threat Building identifier-free protocols Private crowd-sourcing 24

Design Requirements When A generates Message to B, she sends: F(A, B, Message) → PrivateMessage where F has these properties: – Confidentiality: Only A and B can determine Message. – Authenticity: B can verify A created PrivateMessage. – Integrity: B can verify Message not modified. – Unlinkability: Only A and B can link PrivateMessages to same sender or receiver. – Efficiency:B can process PrivateMessages as fast as he can receive them. A→B Header…Unencrypted payload 25

Solution Summary Unlinkability Integrity Authenticity Efficiency Confidentiality Today’s protocols (e.g., WPA) Public Key Symmetric Key SlyFi: Discovery/Binding SlyFi: Data packets Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Finger- prints remain 26 Temporary addresses (e.g., [Gruteser 05, Jiang 07])

Straw man: Encrypt Everything Idea: Use bootstrapped keys to encrypt everything 27 Name: Bob’s Network Secret: Alice<3Bob Name: Alice’s Laptop Secret: Alice<3Bob Bootstrap K AB K BA derive keys - Key for Alice→Bob - Key for Bob→Alice

Straw man: Symmetric Key Protocol Probe “Bob” ClientService Symmetric encryption (e.g., AES w/ random IV) Check MAC: MAC:K AB K Shared1 K Shared2 K Shared3 … O(M) 28 Probe “Lucy” K SharedM Try to decrypt with each key (accounts + associations)

Straw man: Symmetric Key Protocol Probe “Bob” ClientService Symmetric encryption (e.g., AES w/ random IV) Check MAC: MAC:K AB K Shared1 K Shared2 K Shared3 … 1.5 ms/packet (M=100) 29 K SharedM One key per sender (accounts + associations) (Need < 200 μs/packet for g)

Straw man: Public Key Protocol Probe “Bob” Key-private encryption (e.g., ElGamal) K Bob Check signature: Try to decrypt K -1 Bob K Alice Based on [Abadi ’04] K -1 Alice Sign: ClientService 30 O(1)~100 ms/packet

Solution Summary Unlinkability Integrity Authenticity Efficiency Confidentiality Public Key Protocol Symmetric Key Protocol SlyFi: Discovery/Binding SlyFi: Data packets Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Finger- prints remain Temporary addresses Today’s protocols 31

Symmetric key almost works, but tension between:  Unlinkability: can’t expose the identity of the key  Efficiency: need to identify the key to avoid trying all keys Idea: Identify the key in an unlinkable way Approach:  Sender A and receiver B agree on tokens: T 1, T 2, T 3, …  A attaches T i to encrypted packet for B SlyFi AB 32

150 μs/packet (software) SlyFi Probe “Bob” ClientService Symmetric encryption (e.g., AES w/ random IV) Check MAC: MAC:K AB Lookup T i in hash table to get K AB AB Required properties: – Third parties can not link T i and T j if i ≠ j – A doesn’t reuse T i – A and B can compute T i independently Required properties: – Third parties can not link T i and T j if i ≠ j – A doesn’t reuse T i – A and B can compute T i independently AB Main challenge: Sender and receiver must synchronize i Main challenge: Sender and receiver must synchronize i 33

Data messages:  Only sent over established connections  Expect messages to be delivered  i = transmission number On receipt of T i, B computes next expected: T i+1 Handling message loss? – On receipt of T i save T i+1, …, T i+k in table – Tolerates k consecutive losses (k=50 is enough [Reis ‘06]) – No loss  compute one new token per reception AB SlyFi: Data Transport 34 i = hashtable T 3 T 3+k AB … On receipt of T i, B computes next expected: T i+1 AB T 3 AB  T 2 AB T 1 AB T 4 AB On receipt of T i, B computes next expected: T i+1 Handling message loss?

SlyFi: Discovery/Binding Discovery & binding messages:  Often sent when other party is not present  Can’t rely on transmission reception to synchronize i i = ?... Not here. 35

SlyFi: Discovery/Binding 36 i = Discovery & binding messages: – Infrequent: only sent when trying to associate – Narrow interface: single application, few side-channels  Only require long-term unlinkability to prevent tracking  i =  current time/1 min  Handling clock skew: – Receiver B saves T i-c, …, T i+c in table – Tolerates clock skew of c minutes – Steady state: compute one new token per minute AB T i-c T i+c AB … hashtable  T i AB

from, to, seqno, … Credentials, key exchange from, to, capabilities, other protocol fields Bob’s Network is here from, to, capabilities, other protocol fields Is Bob’s Network here? from, to, capabilities, other protocol fields Enc(K AB, t 0, …) MAC(K AB, …) session1 session2 AB Enc(K AB,nonce, …) MAC(K AB, …) encrypt auth Discover Authenticate and Bind Authenticate and Bind Send Data Name: Bob’s Network Secret: Alice<3Bob Name: Alice’s Laptop Secret: Alice<3Bob Bootstrap SlyFi: Putting it Together 37 t0t0 t0t0 BA AB T i = AES(K AB, i) token AB t i = AES(K BA, i) session1 K AB token K AB encrypt K AB auth K BA token K BA encrypt K BA auth derive keys nonce TiTi BA nonce TiTi AB TiTi nonce TiTi BA nonce AB  K session1,2

Solution Summary Unlinkability Integrity Authenticity Efficiency Confidentiality Public Key Symmetric Key SlyFi: Discovery/Binding SlyFi: Data packets Long Term Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Finger- prints remain Temporary addresses Today’s protocols 38

Outline Quantifying the tracking threat Building identifier-free protocols Private crowd-sourcing 39

Problem: Commercial AP Selection tmobile attwifi (ap 1) attwifi (ap 2) seattlewifi linksys Free Public Wifi $3.99 $9.99 Free! Which networks will run my applications? Which ones have good performance? Quality = ??? We often have many choices of wireless access points (APs), but little information about each Jiwire.com Hotspot database Jiwire.com Hotspot database 40

Goal: Provide More Information tmobile attwifi (ap 1) attwifi (ap 2) seattlewifi linksys Free Public Wifi I need to use VoIP so this is the best network for me Bandwidth: 300 kbps Blocked ports: None Doesn’t work! Provide information about AP performance and application support Doesn’t work! Bandwidth: 100 kbps Blocked ports: None Bandwidth: 300 kbps Blocked ports: None Improved Hotspot database Improved Hotspot database Bandwidth: 30 kbps Blocked ports: Bandwidth: 5 Mbps Blocked ports: None Doesn’t work! 41

Goal: Wifi-Reports 42 Users automatically report on APs that they use

Bob’s Report on AP2 Doesn’t work! Bob’s Report on AP2 Doesn’t work! Bob’s Report on AP1 Doesn’t work! Bob’s Report on AP1 Doesn’t work! Bob’s Report on AP3 Doesn’t work! Bob’s Report on AP3 Doesn’t work! Bob’s Report on AP4 Doesn’t work! Bob’s Report on AP4 Doesn’t work! Bob’s Report on AP5 Bandwidth: 300 kbps Bob’s Report on AP5 Bandwidth: 300 kbps Location Privacy: Authority/databases cannot link a user’s reports Limited Influence: Only count 1 report per AP, per user Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 100 Mbps Mallory’s Report on AP4 Bandwidth: 100 Mbps Design Challenges 43 Location Context: Account for wireless channel conditions

Location Privacy: Authority/databases cannot link a user’s reports Limited Influence: Only count 1 report per AP, per user Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 10 Mbps Mallory’s Report on AP4 Bandwidth: 100 Mbps Mallory’s Report on AP4 Bandwidth: 100 Mbps Design Requirements 44 Location Context: Account for wireless channel conditions

If Alice has already submitted a report on cafe1 then abort, else save the report Straw men Protocols R  report on cafe1 mix network submit: R authenticate Alice measure cafe1 Anonymous Report on cafe1 Bandwidth: 5 Mb Anonymous Report on cafe1 Bandwidth: 5 Mb Anonymous Report on cafe1 Bandwidth: 100 Mb Anonymous Report on cafe1 Bandwidth: 100 Mb Anonymous Report on cafe1 Bandwidth: 100 Mb Anonymous Report on cafe1 Bandwidth: 100 Mb Anonymous Report on cafe1 Bandwidth: 100 Mb Anonymous Report on cafe1 Bandwidth: 100 Mb Anonymous Report on cafe1 Bandwidth: 100 Mb Anonymous Report on cafe1 Bandwidth: 100 Mb Anonymous Report on cafe1 Bandwidth: 100 Mb Anonymous Report on cafe1 Bandwidth: 100 Mb Limited Influence submit: R Anonymous Report on cafe1 Bandwidth: 5 Mb Anonymous Report on cafe1 Bandwidth: 5 Mb 45

Report Protocol request: cafe1, T blind reply: S blind {k cafe1, k -1 cafe1 }  new key pair If Alice requested cafe1 before then abort else sign the token  S blind authenticate and download list of APs Unblind the signature  S cafe1 R  report on cafe1 mix network submit: cafe1, S cafe1, k cafe1, R, S R Verify the signatures Delete old reports signed with k cafe1 measure cafe1 cafe1 cafesolstice tmobile #4 AT&T #54  Report on cafe1 Bandwidth: 5 Mbps Report on cafe1 Bandwidth: 5 Mbps Report on cafe1 Bandwidth: 5 Mbps Report on cafe1 Bandwidth: 5 Mbps Blind the token k cafe1  T blind Sign the report  S R List of all APs 46 cafe1 starbucks2 cafe2 … {k cafe2, k -1 cafe2 }  new key pair …

request: cafe1, T blind reply: S blind authenticate and download list of APs measure cafe1 Report on cafe1 Bandwidth: 5 Mbps Report on cafe1 Bandwidth: 5 Mbps Problem: Asking for a token reveals the target AP Solution: Ask for the tokens for all APs in a city Report on cafe1 Bandwidth: 5 Mbps Report on cafe1 Bandwidth: 5 Mbps Report on cafe1 Bandwidth: 100 Mb Report on cafe1 Bandwidth: 100 Mb Problem: Some users may submit bad reports Solution: Robust summary functions (e.g., median) mix network submit: cafe1, S cafe1, k cafe1, R, S R … cafe1 starbucks2 UW tullys shinkatea cafe2 APs in Seattle Report Protocol 47

Summary Slyfi  How to build a WiFi replacement that reveals no transmitted bits to eavesdroppers  Key challenge: ensuring efficient processing by both clients and Aps Wifi-Reports  How to build a crowdsourcing application that preserves privacy  Key challenge: preventing malicious reports Other relevant designs  Geo-fencing – limiting wireless network coverage to well-defined regions 48

49

Geo-fencing Build on the “virtual walls” model of wireless for privacy [Kapadia’07]: goal is to approximately confine connectivity with “virtual walls”  E.g., to an apartment, conference room, office Prevents information reception outside intended service area for improved privacy and security May be able to improve coverage within service area and reduce interference across service areas 50

Geo-fencing Use steerable directional antennas to focus signals on a specified region Stripe data across antennas to provide coverage only in the region Code the packets transmitted by the antennas to prevent partial information retrieval 51

Geo-fencing Results Indoor multipath reflections significantly distort antenna radiation pattern Need periodic tuning of the antenna directions to track changes in environment 52 Coverage confined to single location

Challenge: Filtering without Identifiers 53 Which packets are for me?

Wireless Data Privacy Third party can see the contents of your messages, e.g., , credit card numbers  Addressed by encryption for confidentiality 54 Traditional threat, assumed solved (soon) (Mary) (Mary) xxxxx xxxxx

Wireless Information Privacy Third party can identity specific users or kinds of devices near a given location  Due to unique signatures, e.g., addresses 55 Less well known, point of our work (Mary) (Mary) xxxxx xxxxx Hey, Mary’s next door! She’s reading

Discover From: 19:1A:1B:1C:1D:1E To: BROADCAST From: 19:1A:1B:1C:1D:1E To: BROADCAST Search probe From: 22:1E:3E:4F:A1:45 To: BROADCAST From: 22:1E:3E:4F:A1:45 To: BROADCAST Announcement From: 19:1A:1B:1C:1D:1E To: 22:1E:3E:4F:A1:45 From: 19:1A:1B:1C:1D:1E To: 22:1E:3E:4F:A1:45 Credentials, key exchange From: 22:1E:3E:4F:A1:45 To: 19:1A:1B:1C:1D:1E From: 22:1E:3E:4F:A1:45 To: 19:1A:1B:1C:1D:1E Credentials, key exchange Authenticate and Bind Authenticate and Bind From: 19:1A:1B:1C:1D:1E To: 22:1E:3E:4F:A1:45 From: 19:1A:1B:1C:1D:1E To: 22:1E:3E:4F:A1:45 From: 22:1E:3E:4F:A1:45 To: 19:1A:1B:1C:1D:1E From: 22:1E:3E:4F:A1:45 To: 19:1A:1B:1C:1D:1E Send Data Confidentiality Authenticity Integrity Best Security Practices Today 56 Temporary Addresses: [Gruteser 05, Hu 06, Jiang 07, Stajano 05]  K session

Implicit Identifiers by Example Implicit identifier: network destinations  IP pairs in network traffic  At SIGCOMM, each visited by 1.15 users on average  Some nearly-unique destinations repeatedly visited (e.g., server) 57 SSH/IMAP server: tcpdump ? time SSH/IMAP server: ?

Implicit Identifiers by Example Implicit identifier: broadcast packet sizes  Set of broadcast packet sizes in network traffic  E.g., Windows machines NetBIOS naming advertisements; FileMaker and Microsoft Office advertise themselves 58 tcpdump ? time Broadcast pkt sizes: 239, 245, 257 Broadcast pkt sizes: 239, 245, 257

Implicit Identifiers by Example Implicit identifier: MAC protocol fields  Header bits (e.g., power management., order)  Supported rates  Offered authentication algorithms 59 tcpdump ? time Protocol Fields: 11,4,2,1Mbps, WEP Protocol Fields: 11,4,2,1Mbps, WEP

How Bad Is The Situation? Start with anonymized trace from SIGCOMM Hundreds of users over multiple days Split into training data and validation data and traffic samples (1 hour) Convert user identities to pseudonyms Now train on other features and try to identify users in validation data Use user identities in trace for ground truth to see how well we did 60 “A busy environment”

Features Combine to Find More Users With all features, roughly half the users can be identified at least half the time (99% accuracy) Some users emit highly specific features  Easily found in a crowd 61 bcast + ssids + fields + netdests bcast + ssids + fields bcast + ssids