Evading Cellular Data Monitoring With Human Movement Networks Adam J. Aviv, Micah Sherr*, Matt Blaze, and Jonathan M. Smith University of Pennsylvania, *Georgetown University Adam J. Aviv University of Pennsylvania HotSec '10 1
Motivation Adam J. Aviv University of Pennsylvania HotSec '10 2
Goal Out-of-Band communication Unmonitored and completely decentralized Adam J. Aviv University of Pennsylvania HotSec '10 3
HumaNet Human-to-Human Mobile Ad-Hoc Network Humans + Smartphones Adam J. Aviv University of Pennsylvania HotSec '10 4
HumaNet Adam J. Aviv University of Pennsylvania HotSec '10 5
Design Trade-ofs Complete Random Epidemic HumaNet Centralization Walk Reliability Network Load Latency Anonymity Adam J. Aviv University of Pennsylvania HotSec '10 6
Regularity of Movement Patterns Adam J. Aviv University of Pennsylvania HotSec '10 7
Return-to-Home Principle A person is likely to return to places frequented in the past Adam J. Aviv University of Pennsylvania HotSec '10 8
HumaNet Protocol Idea No further duplication of messages Address message to recipient's likely future locations Local routing decision based on movement history Adam J. Aviv University of Pennsylvania HotSec '10 9
Alice and Bob ... ? B A Adam J. Aviv University of Pennsylvania HotSec '10 10
A C Adam J. Aviv University of Pennsylvania HotSec '10 11
D ` D Adam J. Aviv University of Pennsylvania HotSec '10 12
B A D C Adam J. Aviv University of Pennsylvania HotSec '10 13
Routing Refnements Local Timeout Global Timeout Last Mile Flooding Adam J. Aviv University of Pennsylvania HotSec '10 14
Constructing a Profle One Day's GPS locations Adam J. Aviv University of Pennsylvania HotSec '10 15
Cluster Points Adam J. Aviv University of Pennsylvania HotSec '10 16
One Day's Homes Adam J. Aviv University of Pennsylvania HotSec '10 17
Combine With Other Days Adam J. Aviv University of Pennsylvania HotSec '10 18
Trace Driven Simulation Adam J. Aviv University of Pennsylvania HotSec '10 19
Data Source Cabspotting Dataset 20 days, 536 Cabs in San Francisco Adam J. Aviv University of Pennsylvania HotSec '10 20
Comparison Epidemic Flooding Probabilistic Flooding Random Walk Adam J. Aviv University of Pennsylvania HotSec '10 21
#Messages Required Adam J. Aviv University of Pennsylvania HotSec '10 22
Message Latency 76% w/in 1 day Adam J. Aviv University of Pennsylvania HotSec '10 23
Successful Delivery Adam J. Aviv University of Pennsylvania HotSec '10 24
Challenges Reliability Routing Attacks Location Privacy Anonymity Adam J. Aviv University of Pennsylvania HotSec '10 25
Reliability and Routing Attacks Best-Efort routing How reliable would we need? Peer-to-Peer System Vulnerable to same class of attacks, but how feasible are they here? Adam J. Aviv University of Pennsylvania HotSec '10 26
Location Privacy Periodic broadcasts of location information Peoples willingness to participate? Reveal surprising locations? Adam J. Aviv University of Pennsylvania HotSec '10 27
Anonymity Can this system provide Anonymity? Sender Anonymity message timeout leaks info Receiver Anonymity Message no longer being passed Broadcast in crowds (k-anonymity) Adam J. Aviv University of Pennsylvania HotSec '10 28
Brain Storming ... Attacking HumaNet, how would you do it? Necessary resources? Feasible? Would you participate? If not, what would you need to say yes? Adam J. Aviv University of Pennsylvania HotSec '10 29
Thanks Questions, Discussion? Adam J. Aviv University of Pennsylvania HotSec '10 30
Generate a Home Adam J. Aviv University of Pennsylvania HotSec '10 31
How Predictive? Average: 65% of GPS coordinates fell within homes 65% of the day (time) Worst Case: 39% of GPS coordinates fell within homes 45% of the day (time) Adam J. Aviv University of Pennsylvania HotSec '10 32
Other Routing Protocols Epidemic Pocket Switched Networks [CHCDGS'07] Pollen [GSM'01] Ad-Hoc DREAM [BCSW'98] GPSR [KK'00] Geographic Ad-Hoc'ish Adam J. Aviv University of Pennsylvania HotSec '10 33
Recommend
More recommend