WiFi-Reports: Improving Wireless Network Selection Jeffrey Pang (CMU) with Ben Greenstein (IRS) Michael Kaminsky (IRP) Damon McCoy (U. Colorado) Srinivasan.

Slides:



Advertisements
Similar presentations
Dating Portal showcase Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007.
Advertisements

BreadCrumbs: Forecasting Mobile Connectivity Presented by Dhruv Kshatriya Paper by Anthony J. Nicholson Brian D. Noble.
Digital Certificate Installation & User Guide For Class-2 Certificates.
WiFi-Reports: Improving Wireless Network Selection with Collaboration Presented By Tim McDowell.
OPS-21: Managing Multiple Sites Part Time: Replication & OpenEdge ® Management Case Study Brian Bowman Sr Solution Engineer.
OPS-10: Managing multiple sites part time: Replication & OpenEdge Management Case Study Brian Bowman Sr. Solution Engineer.
Privacy analysis of user association log in an enterprise wireless network Keren Tan.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 1 CMU 2 Intel Research Seattle.
Module 1.3 Internet connection choices Theme: Let’s communicate.
1 Tryst: Making Local Service Discovery Confidential Jeffrey Pang Ben Greenstein Srinivasan Seshan David Wetherall.
Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,
Wifi-Reports Improving Wireless Network Selection with Collaboration Jeffrey Pang (CMU) Ben Greenstein (Intel Research Seattle) Michael Kaminsky (Intel.
Srinivasan Seshan (and many collaborators) Carnegie Mellon University 1.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Mid Term Review. Mid Term Wed, April 8 –Open book –Open papers –Open slides In class exam –Duration 1 hour Exam level –Not hard.
Toward a Framework for Preventing Side-Channel Attacks in Wireless Networks Jeff Pang.
Link Setup Time (ms) Details : How do sender and receiver synchronize i ? Discovery/binding messages: infrequent and narrow interface  short term linkability.
A Network Measurement Architecture for Adaptive Networked Applications Mark Stemm* Randy H. Katz Computer Science Division University of California at.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Privacy and Security in the Location-enhanced World Wide Web UC Berkeley Intel / UW UW Intel UC Berkeley Jason Hong Gaetano Boriello James Landay David.
1 Making Local Service Discovery Confidential with Tryst Jeffrey Pang CMU Ben Greenstein Intel Research Srinivasan Seshan CMU David Wetherall University.
User Fingerprinting Jeff Pang, Ben Greenstein, Ramki Gummadi, Srini Seshan, and David Wetherall Most slides borrowed from Ben.
1 Drafting Behind Akamai (Travelocity-Based Detouring) AoJan Su, David R. Choffnes, Aleksandar Kuzmanovic, and Fabian E. Bustamante Department of Electrical.
WiFi-Reports: Improving Wireless Network Selection Jeffrey Pang (CMU) with Ben Greenstein (IRS) Michael Kaminsky (IRP) Damon McCoy (U. Colorado) Srinivasan.
Lecture 6 Networked Application Security IT 202—Internet Applications Based on notes developed by Morgan Benton.
Signing and Encrypting With the Thawte Web of Trust CSU Professional Development Institute January 8, 2009 Steve Lovaas.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
The StarNet Analyzer. Contact SNA Department x172
Protecting Privacy in Sensor- Enriched Internet Services Presenter: Yan Ke, CMU In collaboration with: Phillip B. Gibbons, Brad Karp, Rahul Sukthankar,
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
File sharing. Connect the two win 7 systems with LAN card Open the network.
Wifi-Reports: Improving Wireless Network Selection with Collaboration Jeffrey Pang (CMU) Ben Greenstein (Intel Research Seattle) Michael Kaminsky (Intel.
By: Christopher Henderson.  What is VoIP?  How is it being used?  VoIP’s main Security Threats.  Availability of Service  Integrity of Service 
Presented by Tao HUANG Lingzhi XU. Context Mobile devices need exploit variety of connectivity options as they travel. Operating systems manage wireless.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
MIS Week 11 Site:
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
BreadCrumbs: Forecasting Mobile Connectivity Presented by Hao He Slides adapted from Dhruv Kshatriya Anthony J. Nicholson and Brian D. Noble.
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
ICT Exam Techniques This is a guide on how to achieve the maximum marks on the ICT Unit 1 Examination Paper.
Eduroam Louis Twomey HEAnet Library Services Day 20 th November 2014.
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
MIS Week 6 Site:
Is the Internet ready for multimedia? (in production networks) Ed Perry, HP Labs MMNS 2002.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Improved Access Point Selection MobiSys2006. Outline INTRODUCTION FIELD STUDY VIRGIL EVALUATION CONCLUSION.
First in Service -Best in Banking Pavan Anna Shirish Nadella Maneeshpal Bandlamudi.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
WISER: Remote access to databases and datasets This session will help you to set up access to Oxford online resources from your home computer. The session.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 Presenter: Nan Jiang Most Slides:
Encouraging Cooperation in Multi-Hop Wireless Networks Ratul Mahajan, Maya Rodrig, David Wetherall and John Zahorjan University of Washington, June 2004.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Overview: 1.Past project review 2.How to communicate with clients 1.Clients taste in design 2.How to avoid misunderstandings w/client or project manager.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
NETWORKING & SYSTEM UPDATES
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Mid Term Review. Mid Term Wed, April 6 –Open book –Open papers –Open slides In class exam –Duration 1 hour Exam level –Not hard.
A HotSpot is a location with an access point which provides wireless broadband network services. It is expected today to have Hotspots in heavily populated.
A HotSpot is a location with an access point which provides wireless broadband network services. It is expected today to have Hotspots in heavily populated.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Team: Aaron Sproul Patrick Hamilton
When small data is better data
TrueSight Operations Management 11.0 Architecture
CS590B/690B Detecting Network Interference (FALL 2016)
2017 TCS SMT Training - Dallas
Networked Systems Practicum
Energy-Delay Tradeoffs in Smartphone Applications
Presentation transcript:

WiFi-Reports: Improving Wireless Network Selection Jeffrey Pang (CMU) with Ben Greenstein (IRS) Michael Kaminsky (IRP) Damon McCoy (U. Colorado) Srinivasan Seshan (CMU)

Motivation tmobile attwifi (ap 1) attwifi (ap 2) seattlewifi linksys Free Public Wifi $3.99 $9.99 Free! Which networks will run my applications? Which ones have good end-to-end performance? Quality = ??? Network selection today We often have many choices of wireless networks but little information about each Jiwire.com Hotspot database Jiwire.com Hotspot database

Project Goal WiFi-Reports Hotspot database WiFi-Reports Hotspot database tmobile attwifi (ap 1) attwifi (ap 2) seattlewifi linksys Free Public Wifi I need to use Skype VoIP so this is the best network for me. Network selection today Bandwidth: 300 kbps Blocked ports: None Bandwidth: 100 kbps Blocked ports: None Doesn’t work! Bandwidth: 100 kbps Blocked ports: , Skype WiFi-Reports is a service that provides more detailed information about network performance and functionality

WiFi-Reports Overview WiFi-Reports Account Service WiFi-Reports Account Service Independent Report Databases Report on tmobile: Bandwidth: 1200 kbps Blocked ports: None Report on tmobile: Bandwidth: 1200 kbps Blocked ports: None Report on UBookstore Cafe: Bandwidth: 4000 kbps Blocked ports: , Skype,… Report on UBookstore Cafe: Bandwidth: 4000 kbps Blocked ports: , Skype,… Users collect measurement reports when they use networks Reports are sent to databases for others to download

Questions and Challenges How useful would this system be in practice? – Do users have many choices of usable wireless networks? – Is there diversity in network performance/functionality? – Is performance stable enough to be predictive? – Are networks better for some applications but worse for others? – Do enough users use real networks to gather measurements? How do we limit “report fraud” and provide anonymity? – Not even the account service should be able to link a user’s reports to each other (otherwise location privacy is violated) – But each user should only be able to report once per network

Part I: Measurement Study We built a measurement tool to simulate reports that users would collect – Bandwidth, latency, jitter, blocked ports, number of other users, etc. We measured all networks visible from: – 13 hotspots near The Ave – ~7 days at different times of day Measurement procedure: – Sit near center of hotspot – Perform active spot measurements (2-3 minutes per network) shinka tea tullys starbucks tullys trabant oasis lounjin yunnie bubble tea sureshot bookstore cafe cafe on the ave starbucks cafe solstice Our study is the first to examine pay networks and encrypted networks, in addition to open networks Our study is the first to examine pay networks and encrypted networks, in addition to open networks

Results: Are there many APs? Better

Results: Are there many APs? Better

Results: Is there diversity? Better

Results: Is there diversity? Better

Results: Are measurements predictive? Better

Results: Are there application trade-offs? Better Better latency Better bandwidth

Results: Are there enough users?

Part II: Private and Accountable Reporting How do we limit “vote fraud” and provide anonymity? Requirements: – No one, even the account service, should be able to link a user’s reports to each other (otherwise previous work says location privacy is violated) – Each user should only be able to report once per network

Anonymizing Mix Network Design Sketch WiFi-Reports Account Service WiFi-Reports Account Service Report on tmobile: Bandwidth: 1200 kbps Blocked ports: None Report on tmobile: Bandwidth: 1200 kbps Blocked ports: None Independent Report Databases tmobile seattlewifi CAFEONTHEAVE … 1.Client creates one token per AP 2.Client blinds each token 3.Account Service signs blinded tokens 4.Client unblinds tokens … 1.Client uses and measures an AP 2.Client uses token to sign report 3.Report is published via mix network Report on tmobile: Bandwidth: 1200 kbps Blocked ports: None Report on tmobile: Bandwidth: 1200 kbps Blocked ports: None Report on tmobile: Bandwidth: 1200 kbps Blocked ports: None Report on tmobile: Bandwidth: 1200 kbps Blocked ports: None Report on tmobile: Bandwidth: 1200 kbps Blocked ports: None Report on tmobile: Bandwidth: 1200 kbps Blocked ports: None

Design Sketch Details = random public key pair {K tmobile, K tmobile -1 } – Account Service signs the public key K tmobile – Private key K tmobile -1 is used to sign reports  can update reports Assumptions: – The account service only gives one identity to each user – Most users are honest Open issues: – Client must get all tokens signed before using them  expensive If only get signed token after AP is used, use of the AP is revealed Can obtain a subset of all tokens instead (e.g., all tokens for a city)  trade off between token signing overhead for more location privacy – Location impacts wireless performance. How to include it in reports? Current idea: use wifi beacons as a “fingerprint” for a location (ala PlaceLab)

Ongoing work Implementing Wifi-Reports service – Some parts of Windows client implemented – Can turn measurement tool into a Linux client Use measurement study to “simulate” effectiveness of WiFi-Reports over 1 week Goal: submit paper to MobiSys ‘09 (Dec. 3) Graduate.

Questions? (Other summer projects)

Results: Is there diversity? Better Blocked port = no measurement

Results: Is there diversity? Better Blocked port = no measurement

Results: Are measurements predictive? Better Blocked port = no measurement