Title: Preserving Location Privacy in Wireless LANs
1Preserving Location Privacy in Wireless LANs
- Presented by
- Alvin Yonggang Yun
- April 9, 2008
CSCI 388 - Wireless and Mobile Security
2Authors
- Tao Jiang University of Maryland
- Helen J. Wang Microsoft Research
- Yih-Chun Hu University of Illinois
- Presented MobiSys07,
- June 1113, 2007,
- San Juan, Puerto Rico, USA
3Do you care someone know where you are?
4Someone does care location privacy
5220,000 Cell Towers Can Find You
6Location-based Services
Location-based Networking (Always connected
Continuous services)
Location-based Fitness Assistant and Shopping
Assistant
7Location and Location Privacy
- Location Information can be obtained through
direct communication with the respective entity
or through indirect means such as observation and
inference. - The claim/right of individuals, groups and
institutions to determine for themselves, when,
how and to what extent location information about
them is communicated to others. - Location privacy is the ability to prevent other
parties from learning ones current or past
location
8Problem
- Broadcast nature of wireless networks and
widespread deployment of Wi-Fi hotspots makes it
easy to remotely locate a user by observing
wireless signals. - Location information can be used by malicious
individuals for blackmail, stalking, and other
privacy violations.
9Location Privacy
Location-based Services
Whats NEW? Adjustable Privacy Entropy More
detail below
Privacy
10Paper Overview
- So, how to improve location privacy?
- Obfuscate 3 types of privacy-compromising
information - Sender identity
- Time of transmission
- Signal strength
11Paper Overview
- Why? Because of 5 types of leakage of location
information in the course of wireless
communications - Sender node identity
- Time
- Location
- Receiver node identity -- resolved MIX-net or
Crowd - Content -- resolved encryption
12FOCUS
- Anonymize the user or node identity with
frequently changing pseudonyms MAC address in
this paper - Unlink different pseudonyms of the same user with
silent periods optimal model - Reduce the transmission range through transmit
power control
13Design Overview
- Driven by real-system implementation and field
experiments along with analysis and simulations - Privacy level available to choose, for both
privacy-sensitive users and non-
privacy-sensitive users. - Evaluate system based on real-life mobility data
and wireless LAN coverage
14Research Background
- Y.-C. Hu and H. J. Wang. Location privacy in
wireless networks. In Proceedings of the ACM
SIGCOMM Asia Workshop, Beijing, 2005. extension
and improvement - M. Gruteser and D. Grunwald. Enhancing location
privacy in wireless LAN through disposable
interface identifiers a quantitative analysis.
In WMASH 03 - L. Huang, K. Matsuura, H. Yamane, and K. Sezaki.
Enhancing wireless location privacy using silent
period. - C. Shannon. A mathematical theory of
communication. Bell Systems Technical Journal,
27379423, 623656 Entropy ( metric of privacy
level )
15Related Work
- Location technologies RF-based
- Application-Level Location Privacy
- Network-Level Location Privacy
- RF Fingerprinting
16Related WorkLocation technologies
- Only consider RF-based localization systems
- Location accuracy achievement
- Indoor --- lt 1 meter in 50 time
- Outdoor --- 15-30 meters as median
- Two phases
- Training phase war-driving to collect a
large amount of signal data - Positioning phase compare to the radio map
-
17Related WorkApplication-Level Location Privacy
- Anonymous usage of location-based services
through spatial and temporal - Design protocols and APIs that consider the
privacy issues in the transfer of location
information to external services - Target location information provided by
applications - This paper Privacy of location information that
can be inferred from the wireless transmissions
of network users
18Related WorkNetwork-Level Location Privacy
- Frequently changing user pseudonyms blind
signatures for anonymous communication - Silent periods
- Pseudo-randomly chosen channel assume AP
operator is trusted
19Related WorkNetwork-Level Location Privacy
- Frequently changing user pseudonyms blind
signatures for anonymous communication vs
Sender identity with MAC changing - Silent periods vs Opportunistic Silent
periods - Pseudo-randomly chosen channel vs Reduce
transmission power less APs in range -- even AP
cannot be trusted
20Anonymous Communication
- Bob and the Server want to prevent outsiders from
knowing the fact that they are communicating -
Unlinkablility - Bob wants to prevent the server from knowing its
identity - Sender (Source) anonymity
21Related WorkNetwork-Level Location Privacy
- Definition
- Silent period The time when privacy-sensitive
users intentionally do not transmit, in order to
reduce the effectiveness of correlation based on
mobility pattern of users - Opportunistic silent period Optimal silent
period calculation methodology
22Related WorkNetwork-Level Location Privacy
- Again
- Obfuscate 3 types of privacy-compromising
information - Sender identity
- Time of transmission
- Signal strength
23Related WorkRF Fingerprinting
- Requires high speed and high resolution
Analog-to-Digital Converter Expensive to deploy - Prevented by intentionally adding strong noise
- The paper cant resolve this, important future
work
24Attacker Model
- Silent attackers sniffer, do not emit any
signals, only listen and localize mobile users - Exposed attackers network providers,
trustworthy? How about accidentally leak - Active attackers adjust base station
transmission power - Passive attackers no change on base station
25Measure of Privacy
- How good we can preserve location privacy?
- We need to quantify
- Privacy Entropy
Given an attacker and the set of all mobile users
U, let be the bservation of the attacker about
the user at some location L. Given observation
, the attacker computes a probability
distribution P over users Entropy is the number
of bits of additional information the attacker
needs to definitively identify the
user. Probability () 1 ? enough information
to identify the user
26Ways to go
- Pseudonym for sender identity
- Opportunistic Silent Period for transmission time
- Transmit power control for signal strength
27Pseudonym
- Anonymity is a prerequisite for location privacy
- User must use frequently chahging pseudonyms for
communications - Pseudonyms MAC address, IP address
28How to choose pseudonym?
- Important! Avoid address collisions
- Let AP assign MAC addresses to users/clients
- Join Address(well known address) is used to avoid
MAC conflicts - MAC Address is got from the MAC address pool
- Nonce Cryptographic nonce, a 128-bit string
used only once for multiple simultaneous requests
29How to choose pseudonym?
- Why not choose IP address?
- MAC is enough, we do not need to extract and
obfuscate application layer user identities - Sources cannot easily communicate with AP during
IP changes ( trusted anonymous bulletin boards
with cryptographic mechanisms is used )
30When to change pseudonym?
- Opportunistic Silent Period
- ONLY allows address changes just before the start
of a new association ( between client and AP ) - H (N)
- Attacker can attempt to correlate different
pseudonyms with the same user. Silent period can
reduce such correlations.
31Opportunistic Silent Period
- During silent period, a user does not send any
wireless transmissions - The effectiveness of silent periods depends
heavily on user density. ( higher ? better ) - Forced silent periods can disrupt communications.
Opportunistic silent period minimizes disruption,
which takes place during idle time between
communications
32Opportunistic Silent Period
- Data shows opportunistic silent periods are quite
suitable for WLAN
CDF of session duration from Dartmouth
campus-wide WLAN trace
CDF of Duration between Sessions from Dartmouth
campus-wide WLAN trace
33Methodology for choosing a Silent Period
- Efficacy of silent period depends on user density
- Mobility pattern data consists lt time,
pseudonym, location gt - Probability that user i is linked to the new
pseudonym among the Candidate - Pi is the probability distribution used for
privacy entropy
34Maximize privacy entropy
- Previous work shows the silent periods must be
randomized ( no detail in this paper ) - Random silent period Td Tr
- Td deterministic silent periods ( previous
work ) - Tr between 0 and
-
- So, larger offers better possible
privacy? - Not necessary
35Case Study
- Mobility data of Seattle bus system
- 5-days training set and 8-hour test set
36Case Study
- Mobility data of Seattle bus system
- 5-days training set and 8-hour test set
37Maximize privacy entropy
- Choose
- close to but not greater than 12 minutes
38Location Privacy
Service Quality
Optimal silent period upper bound on the
necessary silent period
Privacy
39Control Signal Strength
- Reduce Location Precision number of APs within
the users communication range - Transmit power control(TPC) minimize the number
of APs in the range while ensuring at least one
AP for connectivity ( assume APs do not adjust
transmit power ) - TPC scheme hold transmit power to the lowest
possible productive level to minimize imposed
interference
40RSS-based Silent TPC
- Mobile station must perform TPC silently
- The only information available to mobile station
is the received signal strength(RSS) from APs
within range - Challenging due to reflection, scattering,
multipath fading and absorption of radio waves
41Asymmetry and Variations of Channels
- Goal determine the relationship between the two
directions of a channel and use the path loss in
one direction to infer the loss in the other
direction - Two scenarios
- corner of an office
- open outdoor space
42Asymmetry of 802.11 channels
- RSSI reading for both directions are strongly
correlated
43Path loss margin (PLM)
- Definition PLM is the magnitude of the maximum
difference between path losses in opposite
directions that result from environmental
influences and wireless channel asymmetry
44PLM calculation
45PLM calculation
46PLM calculation
- From the experimental results on path asymmetry
and variation above, we choose PLM - 11.3dB for indoor
- 10.5dB for outdoor
- So, PLM 10 dB
47Silent TPC Design
- Design Goal adjust transmit power of mobile
station(no AP), to reduce the numbers of Aps in
range by only using the path loss observed from
the opposite direction of the path, from the
in-range Aps to the mobile station - The minimum signal strength reaches AP must be
greater than RS
48TPC vs RSSI
Transmission power is controlled by configuration
parameters provided by Atheros drivers
49Silent TPC Scheme
- TPC scheme can work only when receive signal
strength of two APs differs by at least 20 dB
50Effectiveness of Silent TPC
- More than 73 of the sports(356) have RSS
difference more than 20dB, and can use TPC to
improve privacy
51APs in range between TPC
52Operational Model
Alert Message
User Interface Privacy Mode
53Operational Model
54Contributions
- Solution to preserve better location privacy
- Solution can be applied to cellular networks
- Frequently change pseudonyms (MAC)
- Pause opportunistically for silent period
- Perform silent TPC to reduce the location
precision
55Future work
- The system sacrifice service quality, not good
for real-time application - Silent TPC scheme reduces the signal-to-noise
ratio received at AP, and reduces the
transmission data rate - Wireless card rate control
56My thoughts
- MAC address selection model is vulnerable to
Man-in-the-middle attack and DoS attack - Tr(max) should be different from various
scenarios/conditions, hard to implement TPC in
reality - TPC scheme has 20dB limit, big concern for better
AP deployment - Not all wireless drivers support TPC
57(No Transcript)