AnonySense: Privacy-Aware People-Centric Sensing Cory Conelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin [Institute for Security Technology Studies.

Slides:



Advertisements
Similar presentations
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
AnonySense: Privacy- Aware People-Centric Sensing Authors: Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin (Inst. For Security Tech. Studies,
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
FIT3105 Smart card based authentication and identity management Lecture 4.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Opportunistic Sensing: Security Challenges for the New Paradigm Michael Betancourt UCF - EEL 6788 Dr. Turgut Apu Kapadia MIT Lincoln Laboratory David Kotz.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Overview of Security Research in Ad Hoc Networks Melanie Agnew John Folkerts Cory Virok.
Wireless and Security CSCI 5857: Encoding and Encryption.
Secure Electronic Transaction (SET)
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Distributed Systems: Concepts and Design Chapter 1 Pages
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 21 Distributed System Security Copyright © 2008.
Preserving Privacy in Participatory Sensing Systems Authors: Kuan Lun Huang, Salil S. Kanhere (School of CS & Engg., The University of New South Wales,
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Kerberos Guilin Wang School of Computer Science 03 Dec
Lecture 24 Wireless Network Security
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Sensor-enabled cellphones Wilshire, Stanley Ave, :00am Mar20th 2009.
Wireless and Mobile Security
D’Agents 1 Presented by Haiying Tan May, 2002 D’Agents: Security in a multiple-language, mobile-agent system Robert S. Gary, David Kotz, George Cybenko,
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Configuring and Troubleshooting Routing and Remote Access
AEGIS: Secure Processor for Certified Execution
Security in SDR & cognitive radio
Presentation transcript:

AnonySense: Privacy-Aware People-Centric Sensing Cory Conelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin [Institute for Security Technology Studies Dartmouth College, USA] Nikos Triandopoulos [Department of Computer Science University of Aarhus, Denmark] MobiSys’08 Presented By: Leyla Kazemi

Outline Motivation AnonySense Architecture  System Design  Task Language  Threat Model  Trust Model Protocol  Tasking Protocol  Reporting Protocol  Security Properties Evaluation

Motivation Personal Mobile Devices equipped with many sensors (e.g., cameras, microphones, accelerometers) Opportunity for cooperative sensing applications Users Contributing data to information services Challenge: Protecting the user privacy while their devices reliably contribute data

Motivation Opportunistic sensing: Leveraging users’ mobile devices to collectively measure environmental data (context) Introducing people-centric, dynamic, and highly mobile communication Applications: CarTel, Mobiscopes, Urbanet, Senseweb, Metrosense Examples: Finding Parking Spots, Locating lost Bluetooth-enabled objects, collecting traffic reports of a street Sensor-enabled cellphones

Challenges Dependent on a large-scale, and heterogeneous personal devices Should be implemented across autonomous wireless access points, and public internet Protecting users’ privacy

Privacy Issue Report includes time and location of the sensor  revealing user’s location at that time Integrity of system and reliability of report  User trusted?? Wilshire, Stanley Ave, :00am Mar20th 2009

AnonySense A privacy-aware architecture for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices Allowing applications to submit sensing tasks that will be distributed across anonymous devices Receiving verified, yet anonymized sensor data reports App System Task Anonymous Verified Report

System Components Mobile Nodes (MN):  Sensing  Computation  Memory  Wireless communication Carrier:  carries the mobile node

Components Registration Authority (RA):  Registering nodes Verifying the proper installation on the MNs Verifying the attributes of the MNs Installing a private group key on the node  Issuing certificates to task service and report service Apps and nodes can later verify the authenticity of the services

Components Task Service (TS):  Receiving Task descriptions from apps  Performing Consistency checking  Distributing current task to MNs  Returning a token to app for later retrieving the tasked data Report Service (RS):  Receiving reports from MNs  Aggregating them for more privacy  Responding to queries from apps

Components Mix Network (MIX):  Anonymizing channel between MNs and RS  De-linking reports submitted by MNs  Allowing users to anonymously send messages  How: waiting for enough incoming messages before sending messages to the next node Delaying and mixing of messages makes it difficult to correlate incoming and outgoing messages

Task Language AnonyTL : A language for applications to specify their tasks  Acceptance Conditions  Report Statements  Termination Conditions (Task 25043) ( Expires ) (Accept ‘ professor ’ ) ) ( Report ( location SSIDs ) ( Every 1 Minute ) ( In location ( Polygon ( Point 1 1) ( Point 2 2) ( Point 3 0 ) ) ) ) (Task 25044) ( Expires ) (Accept (< temperature 0 ) ) ( Report ( location time temperature ) ( Every 5 Minute ) ( and (< temperature 0) (< humidity 2 0 ) ) ) ( Report ( location time temperature humidity ) ( Every 10 Minute ) ( and (> temperature 20) (> humidity 8 0 ) ) )

Threat Model Carrier Anonymity  De-anonymizing a carrier by linking a report to the carrier  Eavesdropping on communication between MN and APs  Submitting tasks, and retrieve the reports  Registering as MN Data Integrity  Tampering with the sensor data  Submitting bogus reports to RS  Impersonating the RS to deliver bogus reports to the apps  Tampering with MN hardware or software Other threats (Not considered)  Tampering directly with MN sensors  Denial-of-service threats

Trust Model Carrier  Trusting the node software to properly implement AnonySense Protocol Mobile Nodes  Communicating with TS, and RS using WiFi APs  MN trusting the RA to certify the identities of TS and RS  RA certifying each MN as valid using a group signature  MN trusting RA to certify authenticity of each task Applications  Trusting RA to certify TS and RS  Trusting TS to deploy tasks as requested  Trusting MN to correctly execute tasks  Apps are not authenticated

Trust Model Registration Authority  Trust Nothing TS/RS  Trusting RA to certify valid MNs only  Not trusting apps Certifying MNs  Running proper version of AnonyTL  Verifying the MN’s attributes  Providing MN with a group signature  MN maintain anonymous

Protocol Tasking Protocol: Getting tasks from apps to mobile nodes  Task Generation  Task Verification  Response to App  Tasking Nodes Reporting Protocol: MNs reporting sensor data back to apps  Data fusion  Data retrieval  MAC address recycling Security Properties

Tasking Protocol Task Generation  App generates the task, sends it to TS using SSL  ensuring true TS receives it  Specifies an expiration date in the task  TS generates a unique ID for the task Task Verification  If syntax is valid, TS sends it to RA  RA computes k, if k >kg, RA prepares certificate  RA sends the certificate (hash of the task, and task ID) to TS Response to App  If task is incorrect, or k< kg, TS sends a message to App  Otherwise, TS replies to App with a task ID with a TS-signed certificate Tasking nodes  Polls the TS for tasks  MN uses anonymous authentication to prove its validity using its group signature  TS delivers all tasks to MN  Some nodes will repeatedly retrieve the same tasks

Reporting Protocol MN signs each report using a group-signature Encrypts it with the RS public key MIX network delivers reports to RS in a “mixed” fashion Data fusion  RS aggregates reports from a task  Reports combined using k-anonimity Data Retrieval  App polls the RS for available data using enc. Channel  App presents the TS-signed token to prove its authority MAC address recycling  MN might be tracked using static MAC address  MN changes its MAC everytime so that report and task actions may not be linked

AnonySense Architecture

Security Properties Adversary can learn little by eavesdropping on MN communication  all communications are encrypted Adversary cannot pose as TS/RS  MNs and Apps have certificate from RA for public key of TS/RS TS cannot link MN’s tasks  each arrives from one MAC address/ intervals are randomized Adversary can learn little to pose as App  any task must satisfy k> kg Adversary cannot link MN’s reports  each arrives from one MAC address/ intervals are randomized / uses MIX

Evaluation Implementation  Communication SSL-encrypted HTTP channel MN encrypts its report with MIX node keys, sending messages using SMTP  Servers Written in Ruby PL  Mobile Nodes Nokia N800 Software in C++ Downloading tasks using libcurl Verifying using RSA/ SHA-1 No MAC address rotation

Evaluation Applications  RogueFinder Detecting rogue APs in a given area Tasking AnonySense to report all APs visible to MNs Sensor: MN’s Wi-Fi interface  ObjectFinder Finding the bluetooth Mac address of a lost object After detecting the specified MAC address, MN reports the current location

Experimental Results Overall Result  MN detected 84 unique APs, of which RogueFinder found 12 as rogues  Average time for MN receiving task from RF, later reporting it : 15.5 sec  Average power cost: mW  Complete task-scan-report cycle cost : 0.11J  17 times smaller than MP3-quality audio streaming

Experimental Results Data Transfer

Experimental Results Overall Energy Consumption

Experimental Results Detailed Energy Consumption

Discussion Scalability  Reduce Increasing burden on MN TS could give MN only a subset of tasks MN rejecting some tasks when overloaded Carrier Policy  Configuring a policy on which tasks to accept Attribute-based tasking  Using other techniques to further enforce anonymity like “statistical k- anonymity” Task Dissemination  App may receive much more reports than needed  AnonySense allow removing a task Delay Tolerance  The more carriers, the less latency in message passing using MIX Data Quality  More accurate data  Less privacy for users  Allowing applications to request a certain granularity of either time or location

Summary AnonySense: A comprehensive system to preserve privacy of users in opportunistic- sensing environments Allowing applications to request sensor data using task language Data collected in opportunistic, delay- tolerant manner Data reported, while the users are anonymized but verified

Thanks