Wireless Location Privacy: Radiometric Breaches and Defenses Marco - - PowerPoint PPT Presentation

wireless location privacy radiometric breaches and
SMART_READER_LITE
LIVE PREVIEW

Wireless Location Privacy: Radiometric Breaches and Defenses Marco - - PowerPoint PPT Presentation

Wireless Location Privacy: Radiometric Breaches and Defenses Marco Gruteser WINLAB Trends Always-on, transmitting Low-cost software (controlled) radios background apps (e.g., GNU radio) Removing Identifiers at or above Bit-Level: Example


slide-1
SLIDE 1

Wireless Location Privacy: Radiometric Breaches and Defenses

Marco Gruteser WINLAB

slide-2
SLIDE 2

Trends

Always-on, transmitting background apps Low-cost software (controlled) radios (e.g., GNU radio)

slide-3
SLIDE 3

Removing Identifiers at or above Bit-Level: Example

Probe Vehicles GPS Satellite Traffic Estimation Data mining and logging Cellular Service Provider Vehicle ID | timestamp | Lon | Lat | Speed | Heading

  • 254,18-oct-2006 10:11:12,-85.3452,42.4928,42.18,135

372,18-oct-2006 10:11:12,-85.3427,42.4898,63.72,100 182,18-oct-2006 10:11:12,-85.4092,42.4726,50.15,75 254,18-oct-2006 10:12:12,-85.3462,42.4998,45.18,135 372,18-oct-2006 10:12:12,-85.3512,42.4944,60.01,185 182,18-oct-2006 10:12:12,-85.4102,42.4753,45.88,235 … 254,18-oct-2006 10:21:12,-85.3856,42.5129,45.67,135 Location Proxy

Access Control Anonymization

Anonymous Trace log files

slide-4
SLIDE 4

Privacy Im plications at the Signal Level?

  • Possible Breaches

– Identify transmitters? – Infer information

  • ther than location?
  • Protections

– Prevent long-term tracking? – Thwart localization? Beyond Localization …

slide-5
SLIDE 5

Recent Controversy about Human Mobility Article Demonstrates Location Privacy Sensitivities

  • Analyzed human mobility

patterns from cell phone hand

  • ff data

– 100,000 users over 6 months

  • Coarse data

– Cell tower location recorded for each call / message – Average towers covered 3 km^ 2

  • Example of typical

assumptions about location inference from signals

slide-6
SLIDE 6

Identifying Transmitters via Radiometric Signatures

with Suman Banerjee (MobiCom’08)

slide-7
SLIDE 7

Waveform Impairments in Analog Frontend

slide-8
SLIDE 8

Transmitter Identification via Classification

  • Training phase: collect fingerprint (waveform error metrics)
  • f each transmitter
  • Identification phase: measure error metrics for candidate

transmitter and use classification algorithm to match with training set

slide-9
SLIDE 9

ORBIT

slide-10
SLIDE 10

Identification Results

  • Using ORBIT testbed radios and vector signal analyzer for

data collection

  • K-Nearest Neighbor and Support Vector Machine classifiers
slide-11
SLIDE 11

Identifying Co-location (While Moving) without Location

With Rich Martin, Yingying Chen (MASS 08)

slide-12
SLIDE 12

Motivating Applications

  • Co-location can reveal

social relationships among device owners

slide-13
SLIDE 13

Properties of Co-Mobile Transmitters

Fast fading differs but slow fading similar

Small scale fading

slide-14
SLIDE 14

Non- Co-Mobile Transmitters

Both large and small scale fading differs

slide-15
SLIDE 15

Detection via Filtering and Time- Series Correlation

Pearson’s Product Moment Correlation Coefficient:- Determines the Linear Relationship between two Random Variables (Observed RSSI from 2 Devices) Ranges between [-1, +1]

– : No Correlation – +1 : Strong Positive Correlation –

  • 1 : Strong Negative Correlation
slide-16
SLIDE 16

Experimental Setup

slide-17
SLIDE 17

Impact of Speed on Co-Movement Detection Time

Correlation-Coefficient Threshold >= 0.6 Conclusion: 50-100 Sec of Observation Required.

slide-18
SLIDE 18

Thwarting Tracking: Applying Path Cloaking

with Hui Xiong (CCS 07)

slide-19
SLIDE 19

Inference/ Insider Attacks Compromise Location Privacy

Still insider breaches and remote break-ins possible Re-identification

  • f traces

through data analysis

Home Identification [Hoh06] Tracking algorithms recover individual trace [Hoh05] (Median trip time only 15min)

. . . . . . . . . . . . . . . .

Anonymous Trace log files Location may be precise enough to identify home

slide-20
SLIDE 20

Stronger De-identification for Location Traces: Filtering based on Tracking Model

t=T1 t=T2

Low Entropy Low Uncertainty

t=T2 t=T2

High Entropy High Uncertainty

d1 d2 d3

t=T1 t=T2 t=T2 t=T2

Normalization

d1 d2 d3

Uncertainty

slide-21
SLIDE 21

Thwarting Precise Localization

Preliminary Work

slide-22
SLIDE 22

Power Control?

(X1,Y1)‏ 3db

slide-23
SLIDE 23

Power Control Provides Little Benefit

(X1,Y1)‏ 3db 3db 3db 3db

slide-24
SLIDE 24

Cooperation can yield Asymmetric Signal Changes

0db 3db 1db

slide-25
SLIDE 25

Proof-of-Concept Result

4 5 6 7 8 9 10 11 12 13 14 15 16 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Grid − x Grid − y Victim Node Cooperator−1 Decoy Location −1 6dBm 1dBm 12dBm 4 5 6 7 8 9 10 11 12 13 14 15 16 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Grid − x Grid − y Victim Node Cooperator−2 Decoy Location−2 6dBm 1dBm 12dBm

slide-26
SLIDE 26

Summary

0db 3db 1db

d1 d2 d3

t=T1 t=T2 t=T2 t=T2

slide-27
SLIDE 27

Thank you