Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era Authors: Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang, Mike Y. Chen,

Slides:



Advertisements
Similar presentations
Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing :
Advertisements

SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 1 CMU 2 Intel Research Seattle.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
1 Tryst: Making Local Service Discovery Confidential Jeffrey Pang Ben Greenstein Srinivasan Seshan David Wetherall.
Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Security Awareness: Applying Practical Security in Your World
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Link Setup Time (ms) Details : How do sender and receiver synchronize i ? Discovery/binding messages: infrequent and narrow interface  short term linkability.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
1 Making Local Service Discovery Confidential with Tryst Jeffrey Pang CMU Ben Greenstein Intel Research Srinivasan Seshan CMU David Wetherall University.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
User Fingerprinting Jeff Pang, Ben Greenstein, Ramki Gummadi, Srini Seshan, and David Wetherall Most slides borrowed from Ben.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Privecsg Tracking of Link Layer Identifiers Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing T. Scott Saponas Jonathan Lester Carl Hartung Sameer Agarwal Tadayoshi Kohno.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Ethernet Basics - 5 IGMP. The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 Presenter: Nan Jiang Most Slides:
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Requirements For Handover Information Services MIPSHOP – IETF #65 Srinivas Sreemanthula (Ed.)
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Privecsg Tracking of Link Layer Identifiers Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Improving Wireless Privacy with an Identifier-Free Link Layer Protocol Ben Greenstein, Damon McCoy, Yoshi Kohno, Jeffrey Pang, Srini Seshan, and David.
Wireless security Wi–Fi (802.11) Security
Doc.: IEEE /0357r0 Submission March 2008 Michelle Gong, Intel, et alSlide 1 Enhancement to Mesh Discovery Date: Authors:
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Sy Le CS 147.  Process of transferring information between computers virtually anywhere in the world.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
K. Salah1 Security Protocols in the Internet IPSec.
Security of the Internet of Things: perspectives and challenges
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
By : Praveen Tiwari.  It is a malicious technique of tricking a web user into clicking on something different to what the user perceives they are clicking.
Virtual Private Networks
“An Eye View On the Future Generation Of Phones”
Content Protection Support in
Wireless Technologies
Authentication and Upper-Layer Messaging
Security Issues.
CSE 4905 Network Security Overview
Can Ferris Bueller Still Have His Day Off
Content Protection Support in
basics Richard Dunn CSE July 2, 2003.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Wireless Spoofing Attacks on Mobile Devices
LM 5. Wireless Network Security
Presentation transcript:

Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era Authors: Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang, Mike Y. Chen, Tadayoshi Kohno,Srinivasan Seshan, David Wetherall Presenter: Yinzhi Cao

Introduction The advent of mobile devices and ubiquitous computing devices has really pushed security and privacy in this environment to the forefront and is fast developing as an important area of research. A device can be indentified and tracked over time through its persistent link-layer address, list of known networks(SSIDs), and other protocol and physical layer characteristics.

Case Study (1)

Case Study (1) CONT’D

Result People may know that Ferris went to Park on Tuesday while he says he is sick and should be at home.

Case Study(2)

Case Study(3)

Sequence Number Field (the rate of package transmissions) Traffic Indication Map in beacon frames for clients using power-save functionality(count of power-save user number)

Research Challenge Naming Discovering resources and binding Limiting information leakage

Naming Unique MAC address Leakage Solution: – Periodically Changing MAC addresses (Pseudonym) – Hiding Persistent ID Problem – Pseudonyms can be linked together – Link with bluetooth – Prevent Normal Users

Discovering resources and binding Designing Goal – Only clients who are authorized to use a private service should be capable of learning of its presence. – At most the client and the service involved should know when a binding is established or broken between them; optionally, the identity of the client may be hidden from the service as well.

Limiting information leakage We can’t encrypt all the frames. – some link header fields are designed to be broadcast to all users. For example, the duration field. – if a client were to encrypt the remaining fields so that only the AP could decrypt them, then the AP would suffer additional computation load, and would thus be more susceptible to denial-of- service attacks

Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing Authors: T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno Presenter: Yinzhi Cao

The Sling Media Slingbox Pro Usage – allows users to remotely view (sling) the contents of their TV over the Internet Vulnerability – Based on throughput, we can deduce which TV program users are watching

The Sling Media Slingbox Pro

The Sling Media Slingbox Pro Cont’d Method

The Sling Media Slingbox Pro Cont’d Result

The Nike+iPod Sport Kit: Devices that Reveal Your Presence Usage – The Nike+iPod Sport Kit allows runners and walkers to hear real time workout progress reports on their iPod Nanos.

The Nike+iPod Sport Kit: Devices that Reveal Your Presence Cont’d Vulnerability

Zunes: Challenges with Managing Ad Hoc Mobile Social Interactions Usage – portable media devices to include wireless capability for the purpose of sharing media – Block Mechanism

Zunes: Challenges with Managing Ad Hoc Mobile Social Interactions Circumventing the Zune Blocking Mechanism – Disappearing attack Zune – Fake MAC addresses – Post-blocking privacy

Thank you