wireless location privacy radiometric breaches and
play

Wireless Location Privacy: Radiometric Breaches and Defenses Marco - PowerPoint PPT Presentation

Wireless Location Privacy: Radiometric Breaches and Defenses Marco Gruteser WINLAB Trends Always-on, transmitting Low-cost software (controlled) radios background apps (e.g., GNU radio) Removing Identifiers at or above Bit-Level: Example


  1. Wireless Location Privacy: Radiometric Breaches and Defenses Marco Gruteser WINLAB

  2. Trends Always-on, transmitting Low-cost software (controlled) radios background apps (e.g., GNU radio)

  3. Removing Identifiers at or above Bit-Level: Example Anonymization Access Control GPS Satellite Location Cellular Traffic Estimation Proxy Data mining and Service logging Provider Vehicle ID | timestamp | Lon | Lat | Speed | Heading ------------------------------------------------------------------ 254,18-oct-2006 10:11:12,-85.3452,42.4928,42.18,135 372,18-oct-2006 10:11:12,-85.3427,42.4898,63.72,100 182,18-oct-2006 10:11:12,-85.4092,42.4726,50.15,75 Probe 254,18-oct-2006 10:12:12,-85.3462,42.4998,45.18,135 Vehicles 372,18-oct-2006 10:12:12,-85.3512,42.4944,60.01,185 182,18-oct-2006 10:12:12,-85.4102,42.4753,45.88,235 … 254,18-oct-2006 10:21:12,-85.3856,42.5129,45.67,135 Anonymous Trace log files

  4. Privacy Im plications at the Signal Level? Beyond Localization … • Possible Breaches – Identify transmitters? – Infer information other than location? • Protections – Prevent long-term tracking? – Thwart localization?

  5. Recent Controversy about Human Mobility Article Demonstrates Location Privacy Sensitivities • Analyzed human mobility patterns from cell phone hand off data – 100,000 users over 6 months • Coarse data – Cell tower location recorded for each call / message – Average towers covered 3 km^ 2 • Example of typical assumptions about location inference from signals

  6. Identifying Transmitters via Radiometric Signatures with Suman Banerjee (MobiCom’08)

  7. Waveform Impairments in Analog Frontend

  8. Transmitter Identification via Classification • Training phase: collect fingerprint (waveform error metrics) of each transmitter • Identification phase: measure error metrics for candidate transmitter and use classification algorithm to match with training set

  9. ORBIT

  10. Identification Results • Using ORBIT testbed radios and vector signal analyzer for data collection • K-Nearest Neighbor and Support Vector Machine classifiers

  11. Identifying Co-location (While Moving) without Location With Rich Martin, Yingying Chen (MASS 08)

  12. Motivating Applications • Co-location can reveal social relationships among device owners

  13. Properties of Co-Mobile Transmitters Small scale fading � Fast fading differs but slow fading similar

  14. Non- Co-Mobile Transmitters Both large and small scale fading differs

  15. Detection via Filtering and Time- Series Correlation � Pearson’s Product Moment Correlation Coefficient:- Determines the Linear Relationship between two Random Variables (Observed RSSI from 2 Devices) � Ranges between [-1, +1] – 0 : No Correlation – +1 : Strong Positive Correlation – -1 : Strong Negative Correlation

  16. Experimental Setup

  17. Impact of Speed on Co-Movement Detection Time Correlation-Coefficient Threshold >= 0.6 Conclusion: 50-100 Sec of Observation Required.

  18. Thwarting Tracking: Applying Path Cloaking with Hui Xiong (CCS 07)

  19. Inference/ Insider Attacks Compromise Location . Privacy . . . . . Still insider breaches and remote break-ins possible . . . . . . Re-identification . of traces . . through data . analysis Tracking algorithms recover individual trace [Hoh05] (Median trip time only 15min) Anonymous Home Trace log Identification files [Hoh06] Location may be precise enough to identify home

  20. Stronger De-identification for Location Traces: Filtering based on Tracking Model t=T 2 t=T 1 d 1 t=T 2 d 2 t=T 1 d 1 t=T 2 d 3 d 2 t=T 2 d 3 t=T 2 Low Entropy High Entropy t=T 2 Low Uncertainty High Uncertainty Uncertainty Normalization

  21. Thwarting Precise Localization Preliminary Work

  22. (X1,Y1) ‏ 3db Power Control?

  23. 3db Power Control Provides Little Benefit (X1,Y1) ‏ 3db 3db 3db

  24. Cooperation can yield Asymmetric 3db Signal Changes 1db 0db

  25. Proof-of-Concept Result 18 18 Victim Node 17 12dBm 17 16 Cooperator−1 16 15 Decoy Location −1 15 14 14 13 13 12 12 6dBm Grid − y Grid − y 11 11 10 10 6dBm 9 9 8 8 7 7 1dBm 6 6 Victim Node 5 1dBm 5 Cooperator−2 4 4 3 12dBm 3 Decoy Location−2 2 2 4 5 6 7 8 9 10 11 12 13 14 15 16 4 5 6 7 8 9 10 11 12 13 14 15 16 Grid − x Grid − x

  26. t=T 2 t=T 2 t=T 2 d 1 d 2 d 3 t=T 1 3db Summary 1db 0db

  27. Thank you

Recommend


More recommend