UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Costas Busch Louisiana State University CCW08. Becomes an issue when designing algorithms The output of the algorithms may affect the energy efficiency.
Supporting Cooperative Caching in Disruption Tolerant Networks
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
An Interactive-Voting Based Map Matching Algorithm
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science R3: Robust Replication Routing in Wireless Networks with Diverse Connectivity Characteristics.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
Tracking Fine-grain Vehicular Speed Variations by Warping Mobile Phone Signal Strengths Presented by Tam Vu Gayathri Chandrasekaran*, Tam Vu*, Alexander.
Self-Adaptive, Decentralised Data Publication over Wireless Networks Richard Cooksey Supervisor: Prof. A. Taleb-Bendiab.
Leting Wu Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte Reconstruction from Randomized Graph via Low Rank Approximation.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
Mobility Modeling Capturing Key Correlations of Measured Data Christoph Lindemann University of Leipzig Department of Computer Science Johannisgasse 26.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
Challenges: Device-free Passive Localization for Wireless Environments Moustafa Youssef, Matthew Mah, Ashok Agrawala University of Maryland College Park.
The Classroom Presenter Project Richard Anderson University of Washington December 5, 2006.
1 Spatial Localization Light-Seminar Spring 2005.
Supporting Classroom Interaction with Networked Tablet PCs Richard Anderson Professor of Computer Science and Engineering University of Washington.
Click to edit Present’s Name Trends in Location-based Services Muhammad Aamir Cheema.
Topic 6 – Wireless Technology and handheld devices 1)TechMed scenario covers The uses of wireless technologies and handheld devices In the scenario: “Some.
INFORMATION TECHNOLOGY IN BUSINESS AND SOCIETY SESSION 21 – LOCATION-BASED SERVICES SEAN J. TAYLOR.
Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013.
Xiaoyu Tong and Edith C.-H. Ngai Dept. of Information Technology, Uppsala University, Sweden A UBIQUITOUS PUBLISH/SUBSCRIBE PLATFORM FOR WIRELESS SENSOR.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Lessons Learned from the NetSense Smartphone Study Aaron Striegel 1, Shu Liu 1, Lei Meng 1, Christian Poellabauer.
Characterizing and Modeling the Impact of Wireless Signal Strength on Smartphone Battery Drain Ning Ding Xiaomeng Chen Abhinav Pathak Y. Charlie Hu 1 Daniel.
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
Performance analysis and prediction of physically mobile systems Point view: Computational devices including Mobile phones are expanding. Different infrastructure.
Monitoring for network security and management Cyber Solutions Inc.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Context-aware Adaptive Routing for Delay Tolerant Networking Mirco Musolesi Joint work with Cecilia Mascolo Department of Computer Science University College.
© 2009 Mobile VCE 6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei.
Event-driven, Role-based Mobility in Disaster Recovery Networks The Phoenix Project Robin Kravets Department of Computer Science University of Illinois.
Wireless Networks Breakout Session Summary September 21, 2012.
GPS Calibrated Ad-hoc Localization for Geosocial Networking Dexter H. Hu Cho-Li Wang Yinfeng Wang
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
Implementing a Sentient Computing System Presented by: Jing Lin, Vishal Kudchadkar, Apurva Shah.
Context-Aware Interactive Content Adaptation Iqbal Mohomed, Jim Cai, Sina Chavoshi, Eyal de Lara Department of Computer Science University of Toronto MobiSys2006.
Protecting Sensitive Labels in Social Network Data Anonymization.
Energy Efficient Location Sensing Brent Horine March 30, 2011.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Nicholas D. Lane, Hong Lu, Shane B. Eisenman, and Andrew T. Campbell Presenter: Pete Clements Cooperative Techniques Supporting Sensor- based People-centric.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Jungsik Yoon Networked Media Lab Department of Information and Communication Gwangju Institute of Science and Technology (GIST) 2009.
Secure In-Network Aggregation for Wireless Sensor Networks
Central China Normal University A Cluster-based and Range Free Multidimensional Scaling-MAP Localization Scheme in WSN 1 Ke Xu, Yuhua Liu ( ), Cui Xu School.
Positioning in Ad-Hoc Networks - A Problem Statement Jan Beutel Computer Engineering and Networks Lab Swiss Federal Institute of Technology (ETH) Zurich.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Adversary models in wireless security Suman Banerjee Department of Computer Sciences Wisconsin Wireless and NetworkinG Systems (WiNGS)
SWAN simulation A Simulation Study of Denial of Service Attacks on Wireless Ad-Hoc Networks Samuel C. Nelson, Class of 2006, Dept. of Computer Science,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
Instance Discovery and Schema Matching With Applications to Biological Deep Web Data Integration Tantan Liu, Fan Wang, Gagan Agrawal {liut, wangfa,
Group #3: Mobility Models and Mobile Testbeds. The Models Motion, Traffic, Network.
Mesh Networks and DTN Break Out Group  Common research challenges  A representative experiment  Issues for a one page writeup  what incentive for the.
TRACE ANALYSIS AND MINING FOR SMART CITIES By G. Pan Zhejiang Univ., Hangzhou, China G. Qi ; W. Zhang ; S. Li ; Z. Wu ; L. T. Yang.
學生 : 黃群凱 Towards Mobility-based Clustering 1. Outline INTRODUCTION PRELIMINARIES SPOT CROWDEDNESS FUNDAMENTAL SPOT CROWDEDNESS IN PRACTICE HOT SPOTS AND.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Applications in Mobile Technology for Travel Data Collection 2012 Border to Border Transportation Conference South Padre Island, Texas November, 13, 2012.
University of Maryland College Park
CIS 4930/6930, Spring 2018 Experiment 1: Encounter Tracing using Bluetooth Due Date: Feb 19, beginning of class Ph.D. student lead: Mimonah Al-Qathrady.
MobEyes: Smart Mobs for Urban Monitoring in Vehicular Sensor Networks
A Unified Framework for Location Privacy
BoF on A3 Appliance Aggregation Architecture
Presentation transcript:

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department of Computer Science and Engineering University of Notre Dame

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Introduction Mobility models for wireless networks simulation Synthetic models: Easy to set up Inadequate semantics to capture reality Traces: Observed in real life, expected to be accurate Expensive to collect, privacy concerns Challenge: trace publishing vs. location privacy

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preview Trade-off: data utility vs. user privacy Simulation scenarios DTN, Opportunistic N/W, etc. Focusing on realistic wireless interactions - utility Freeing from absolute locations - privacy

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Computational Efforts Anonymization Creating ambiguity, e.g. k-anonymity (Sweeney, 2002) User AUser B User C User A, B, and C Anonymization

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Computational Efforts Obfuscation Degrading data quality (Krumm, 2009) (a) Original GPS data (b) Adding Gaussian noise (c) Discretizing data to a grid

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Data Source - NetSense Study Provided 200 smart devices to incoming freshmen at Notre Dame (Aug 2011) 200x Nexus S 4G 200 anytime mins Unlimited data, text User level agent (1-3 min polling intervals) Environment (WiFi, Cell) User proximity (Bluetooth) Phone state (Screen, Battery) Phone usage (data / app tonnage) n, g

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Notations MN = {MN 1, MN 2, MN 3 } AP = {AP 1, AP 2, AP 3 } NL i t (WiFi Proximity Set), e.g., NL 1 t = {AP 1, AP 2, AP 3 } NS i t (B/T Proximity Set), e.g., NS i t = {MN 2, MN 3 } R L : WiFi radio range R S : B/T radio range The vision of MN 1 at time t

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Approach Problem Description Input: wireless relationships (WiFi and B/T proximity) constrained by R L and R S Output: trace solution for each mobile node preserving α of the given wireless relationships Algorithm Components Step 1: Access Point Deployment (2D) Step 2: Mobility Trace Generation

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING AP Deployment Connectivity Graph Connected if detected by the same mobile device Infer AP-to-AP relative distances (shortest path)

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING AP Deployment CMDS Classic Multidimensional Scaling (Torgerson, 1952) (Source:

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Trace Generation AP deployment as the input Location of a mobile device depends on locations of detected APs and MNs Multiple solutions provide ambiguity p1, p2, p3 – candidate solutions for mobile node x

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Evaluation Metrics Bluetooth proximity preservation w.r.t. R S o Precision: P NS o Recall: R NS o F_Score: F NS WiFi proximity preservation w.r.t. R L (similar)

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Results Bluetooth Proximity Preservation - Aggregate

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Results WiFi Proximity Preservation - Aggregate

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Results F_Score Distribution: Bluetooth vs. WiFi proximity preservation WiFi Proximity: ~80% nodes ≥ 0.78 B/T Proximity: ~95% nodes ≥ 0.90

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Results Inter-contact Time Distribution: Original samples vs. Generated traces

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Summary A novel approach to preserve location privacy using zero knowledge of actual locations Potential impact where traces are needed but not available Metrics to evaluate the preservation of wireless relationships

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Open Problems Introducing RSSI for better hint to relative distances 3D space deployment Security challenges (quantitatively measuring how much privacy gained)

UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Questions ? Contact Information Prof. Aaron Striegel : Xueheng Hu: NetSense Study: