Presentation is loading. Please wait.

Presentation is loading. Please wait.

Improving the Privacy of Wireless Protocols Jeffrey Pang Carnegie Mellon University.

Similar presentations


Presentation on theme: "Improving the Privacy of Wireless Protocols Jeffrey Pang Carnegie Mellon University."— Presentation transcript:

1 Improving the Privacy of Wireless Protocols Jeffrey Pang Carnegie Mellon University

2 2

3 3 Protocol Header Protocol Control Info

4 What can Protocol Control Info Reveal? 4 www.bluetoothtracking.org Location traces can be deanonymized [Beresford 03, Hoh 05-07, Krum 07] Kim’s House

5 Who Might be Tracking You? 5

6 Talk Overview Motivation Quantifying the tracking threat Building identifier-free protocols Other research 6

7 Building identifier-free protocols Quantifying the tracking threat –My work: How to build efficient protocols that reveals no transmitted bits to eavesdroppers [MobiSys 08 Best Paper, HotNets 07] –Previous work: Temporary device addresses [Gruteser 05, Hu 06, Jiang 07, Stajano 05] –My work: Temporary addresses are not enough; Other protocol info can be used to track devices [MobiCom 07, HotOS 07] Talk Overview 7

8 Name: Bob’s Device Secret: Alice<3Bob Name: Alice’s Device Secret: Alice<3Bob Bootstrap Out-of-band (e.g., password, PIN) Confidentiality Authenticity Integrity Best Security Practices Today 8  K session Use to encrypt & authenticate

9 Discover From: 19:1A:1B:1C:1D:1E To: BROADCAST From: 19:1A:1B:1C:1D:1E To: BROADCAST Search probe From: 22:1E:3E:4F:A1:45 To: BROADCAST From: 22:1E:3E:4F:A1:45 To: BROADCAST Announcement From: 19:1A:1B:1C:1D:1E To: 22:1E:3E:4F:A1:45 From: 19:1A:1B:1C:1D:1E To: 22:1E:3E:4F:A1:45 Credentials, key exchange From: 22:1E:3E:4F:A1:45 To: 19:1A:1B:1C:1D:1E From: 22:1E:3E:4F:A1:45 To: 19:1A:1B:1C:1D:1E Credentials, key exchange Authenticate and Bind Authenticate and Bind From: 19:1A:1B:1C:1D:1E To: 22:1E:3E:4F:A1:45 From: 19:1A:1B:1C:1D:1E To: 22:1E:3E:4F:A1:45 From: 22:1E:3E:4F:A1:45 To: 19:1A:1B:1C:1D:1E From: 22:1E:3E:4F:A1:45 To: 19:1A:1B:1C:1D:1E Send Data Confidentiality Authenticity Integrity Best Security Practices Today 9 Temporary Addresses: [Gruteser 05, Hu 06, Jiang 07, Stajano 05]  K session

10 Tracking Example Consider one user at SIGCOMM 2004 – Seen in an “anonymized” wireless trace (device addresses hashed, effectively a temporary address) – Transferred 512MB via BitTorrent on a congested 802.11 network (Poor network etiquette?) Can we still identify the culprit? 10

11 Tracking Example Fingerprint: network names in probes ? User of “roofnet” community network at MIT Wardriving Database 11

12 Bootstrap Problem: Long-term Linkability 12 Name: Alice’s Laptop Secret: Alice<3Bob Name: Bob’s Network Secret: Alice<3Bob Is Bob’s Network here? Bob’s Network is here Identifiers needed for rendezvous! Proof that I’m Alice Proof that I’m Bob Identifiers needed for authentication!

13 Tracking Example time 13

14 Tracking Example Fingerprint: IP broadcast packet sizes – Set of broadcast packet sizes in network traffic – e.g., advertisements by Apple Bonjour, iTunes, NetBIOS ? time 14

15 From: 12:34:56:78:90:ab To: 11:22:33:44:55:66 From: 12:34:56:78:90:ab To: 11:22:33:44:55:66 From: 12:34:56:78:90:ab To: 11:22:33:44:55:66 From: 12:34:56:78:90:ab To: 11:22:33:44:55:66 From: 00:00:99:99:11:11 To: 11:22:33:44:55:66 From: 00:00:99:99:11:11 To: 11:22:33:44:55:66 From: 00:00:99:99:11:11 To: 11:22:33:44:55:66 250 bytes 500 bytes 250 bytes 200 bytes Data packets in the same session remain linked; in aggregate, these can be fingerprints Data packets in the same session remain linked; in aggregate, these can be fingerprints Problem: Short-term Linkability 15 From: 00:00:99:99:11:11 To: 22:33:AA:BB:CC:DD From: 00:00:99:99:11:11 To: 22:33:AA:BB:CC:DD From: 00:00:99:99:11:11 To: 22:33:AA:BB:CC:DD 11:22:33:44:55:66 22:33:AA:BB:CC:DD

16 Bootstrap Problem: Short-term Linkability 16 Name: Alice’s Laptop Secret: Alice<3Bob Name: Bob’s Network Secret: Alice<3Bob Is Bob’s Network here? Bob’s Network is here Proof that I’m Alice Proof that I’m Bob Identifiers needed for packet filtering! 250 bytes 500 bytes

17 Fingerprint Accuracy Developed an automated identification algorithm – Based on Naïve Bayes classifier – Fingerprints: network names broadcast packet sizes supported capabilities Simulated user tracking with traffic from 500+ users – Assume encryption and device address changes each hour 17 Question: Given some traffic samples from a device, can we identify when it is present in the future? Question: Given some traffic samples from a device, can we identify when it is present in the future? Was Alice here? Known to be from Alice

18 Fingerprint Accuracy Results: – 53% of devices can be identified with 90% accuracy when at a small hotspot for the day (5 devices/hour) – 27% with 99% accuracy – 17% even if in a very busy hotspot (100 users/hour) – More fingerprints exist  this is only a lower bound! 18 Question: Given some traffic samples from a device, can we identify when it is present in the future? Question: Given some traffic samples from a device, can we identify when it is present in the future? Was Alice here? Known to be from Alice

19 Other Attacks Enabled User profiling, inventorying, relationship profiling – [Greenstein 07, Jiang 07, Pang 07] Side-channel analysis on packet sizes and timing – Exposes keystrokes, webpages, movies, VoIP calls, … [Liberatore 06, Saponas 07, Song 01, Wright 08, Wright 07] ≈ DFT Movie signature attack Keystroke timing attack Home 802.11 header Is “djw” here? “djw” is here User profiling attack 19

20 Bootstrap Is There a Common Defense? 20 Name: Alice’s Laptop Secret: Alice<3Bob Name: Bob’s Network Secret: Alice<3Bob Is Bob’s Network here? Bob’s Network is here Proof that I’m Alice Proof that I’m Bob Problem: Long-term Linkability Problem: Short-term Linkability

21 Goal: Make All Bits Appear Random Bootstrap 21 Name: Alice’s Laptop Secret: Alice<3Bob Name: Bob’s Network Secret: Alice<3Bob No bits linkable over the long-term Many streams overlap in real traffic  much nosier side-channels

22 Goal: Make All Bits Appear Random Bootstrap 22 Identifiers needed for rendezvous! Identifiers needed for authentication! Identifiers needed for packet filtering! Name: Alice’s Laptop Secret: Alice<3Bob Name: Bob’s Network Secret: Alice<3Bob

23 Talk Overview Motivation Quantifying the tracking threat Building identifier-free protocols Other research 23

24 Design Requirements When A generates Message to B, she sends: F(A, B, Message) → PrivateMessage where F has these properties: – Confidentiality: Only A and B can determine Message. – Authenticity: B can verify A created PrivateMessage. – Integrity: B can verify Message not modified. – Unlinkability: Only A and B can link PrivateMessages to same sender or receiver. – Efficiency:B can process PrivateMessages as fast as he can receive them. A→B Header…Unencrypted payload 24

25 Solution Summary Unlinkability Integrity Authenticity Efficiency Confidentiality Today’s protocols (e.g., 802.11 WPA) Public Key Symmetric Key SlyFi: Discovery/Binding SlyFi: Data packets Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Finger- prints remain 25 Temporary addresses (e.g., [Gruteser 05, Jiang 07])

26 Straw man: Encrypt Everything Idea: Use bootstrapped keys to encrypt everything 26 Name: Bob’s Network Secret: Alice<3Bob Name: Alice’s Laptop Secret: Alice<3Bob Bootstrap K AB K BA derive keys - Key for Alice→Bob - Key for Bob→Alice

27 Straw man: Symmetric Key Protocol Probe “Bob” ClientService Symmetric encryption (e.g., AES w/ random IV) Check MAC: MAC:K AB K Shared1 K Shared2 K Shared3 … O(M) 27 Probe “Lucy” K SharedM Try to decrypt with each key (accounts + associations)

28 Straw man: Symmetric Key Protocol Probe “Bob” ClientService Symmetric encryption (e.g., AES w/ random IV) Check MAC: MAC:K AB K Shared1 K Shared2 K Shared3 … 1.5 ms/packet (M=100) 28 K SharedM One key per sender (accounts + associations) (Need < 200 μs/packet for 802.11g)

29 Straw man: Public Key Protocol Probe “Bob” Key-private encryption (e.g., ElGamal) K Bob Check signature: Try to decrypt K -1 Bob K Alice Based on [Abadi ’04] K -1 Alice Sign: ClientService 29 O(1)~100 ms/packet

30 Solution Summary Unlinkability Integrity Authenticity Efficiency Confidentiality Public Key Protocol Symmetric Key Protocol SlyFi: Discovery/Binding SlyFi: Data packets Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Finger- prints remain Temporary addresses Today’s protocols 30

31 Symmetric key almost works, but tension between: – Unlinkability: can’t expose the identity of the key – Efficiency: need to identify the key to avoid trying all keys Idea: Identify the key in an unlinkable way Approach: – Sender A and receiver B agree on tokens: T 1, T 2, T 3, … – A attaches T i to encrypted packet for B SlyFi AB 31

32 150 μs/packet (software) SlyFi Probe “Bob” ClientService Symmetric encryption (e.g., AES w/ random IV) Check MAC: MAC:K AB Lookup T i in hash table to get K AB AB Required properties: – Third parties can not link T i and T j if i ≠ j – A doesn’t reuse T i – A and B can compute T i independently Required properties: – Third parties can not link T i and T j if i ≠ j – A doesn’t reuse T i – A and B can compute T i independently AB Main challenge: Sender and receiver must synchronize i Main challenge: Sender and receiver must synchronize i 32

33 Data messages: – Only sent over established connections  Expect messages to be delivered  i = transmission number On receipt of T i, B computes next expected: T i+1 Handling message loss? – On receipt of T i save T i+1, …, T i+k in table – Tolerates k consecutive losses (k=50 is enough [Reis ‘06]) – No loss  compute one new token per reception AB SlyFi: Data Transport 33 i =1234 1234 hashtable T 3 T 3+k AB … On receipt of T i, B computes next expected: T i+1 AB T 3 AB  T 2 AB T 1 AB T 4 AB On receipt of T i, B computes next expected: T i+1 Handling message loss?

34 SlyFi: Discovery/Binding Discovery & binding messages: – Often sent when other party is not present  Can’t rely on transmission reception to synchronize i i = ?... Not here. 34

35 SlyFi: Discovery/Binding 35 i = Discovery & binding messages: – Infrequent: only sent when trying to associate – Narrow interface: single application, few side-channels  Only require long-term unlinkability to prevent tracking  i =  current time/1 min  Handling clock skew: – Receiver B saves T i-c, …, T i+c in table – Tolerates clock skew of c minutes – Steady state: compute one new token per minute AB T i-c T i+c AB … hashtable  T i AB

36 from, to, seqno, … Credentials, key exchange from, to, capabilities, other protocol fields Bob’s Network is here from, to, capabilities, other protocol fields Is Bob’s Network here? from, to, capabilities, other protocol fields Enc(K AB, t 0, …) MAC(K AB, …) session1 session2 AB Enc(K AB,nonce, …) MAC(K AB, …) encrypt auth Discover Authenticate and Bind Authenticate and Bind Send Data Name: Bob’s Network Secret: Alice<3Bob Name: Alice’s Laptop Secret: Alice<3Bob Bootstrap SlyFi: Putting it Together 36 t0t0 t0t0 BA AB T i = AES(K AB, i) token AB t i = AES(K BA, i) session1 K AB token K AB encrypt K AB auth K BA token K BA encrypt K BA auth derive keys nonce TiTi BA nonce TiTi AB TiTi nonce TiTi BA nonce AB  K session1,2

37 SlyFi: Other Protocol Details Broadcast Higher-layer binding Time synchronization Roaming Coexistence with 802.11 Link-layer ACKs Multi-party discovery Preventing replay attacks See Mobisys 08 paper for details 37

38 Performance Evaluation 38 Time to setup a linkData throughput Open-source Linux kernel module: http://tw.seattle.intel-research.net Evaluated on embedded devices SlyFi is about as efficient as 802.11 (wifi-open) (Previous proposal similar to symmetric key)

39 Solution Summary Unlinkability Integrity Authenticity Efficiency Confidentiality Public Key Symmetric Key SlyFi: Discovery/Binding SlyFi: Data packets Long Term Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Only Data Payload Finger- prints remain Temporary addresses Today’s protocols 39

40 Talk Overview Motivation Quantifying the tracking threat Building identifier-free protocols Other research 40

41 Hotspot Recommender System 41 Research Challenges Preserving location privacy – Reports shouldn’t be linked, otherwise they can be used to track users – But also need to limit fraud; e.g., 1 report per hotspot per user – Solution: ecash-like reporting protocol & robust summary functions Preserving location context – Performance dependent on location with respect to access point – Wireless channel effects loss rate – Solution: estimate different loss regimes w/ distributed measurements

42 Peer-to-Peer Games [SIGCOMM 08, NSDI 06, IPTPS 07] Scalable gameplay update distribution Attention-based update prioritization Player simulation with “guidable” A.I. Distributed File Systems [ICDCS 07] Locality-preserving data placement Decentralized load-balancing Internet Measurement [IMC 04 x2, SIGCOMM 04] DNS infrastructure properties BGP routing and multi-homing Home Networking Out-sourcing network management Social networks for access-control Private application-layer discovery Cloud Computing for Games Automatic scaling & migration for massively multiplayer online games Community Sensing Location-aware measurement platform for mobile devices Wireless Protocol Privacy [MobiSys 08, Mobicom 07, HotOS 07] Quantifying privacy threats Identifier-free link layer protocols Wireless Service Discovery [MobiSys 09, HotNets 07] Hotspot recommender system Private device discovery without per-device bootstrapping Other Research and Future Plans Ubiquitous Computing SystemsWide-Area Internet Systems

43 === TOPICS === 43

44 Peer-to-Peer Games Scaling challenges How to quickly discover and replicate players in your area How to prioritize updates based on attention when bandwidth is limited How to disseminate updates between peers with very little upload capacity, on average 44 High-speed Large-scale ++ P2P Me Who I’m playing attention to Who I’m playing attention to Our Goal

45 Distributed File Systems Challenges How to maintain file locality without knowledge of future tasks How to balance load without substantial overhead 45 Traditional DHT File System Our DHT File System Files used by two tasks: Preserving file locality: Improves task success rate; depend on fewer machines Improves task performance; need fewer lookups random placement defragmented placement nodes accessed during an NFS trace

46 Our Goal DNS Measurement 46... Authoritative DNS Servers gTLD Servers Root Servers Local DNS Servers Understand server characteristics: Availability Load balance Deployment characteristics Challenges Collecting DNS server addresses Active monitoring of 300,000+ servers in other domains Inferring load from visible metrics Handling network irregularities, such as dynamic DNS Key Findings Vast majority are highly availability Load is positively correlated with availability and is highly skewed Three distinct deployment styles in different DNS domains

47 === MOTIVATION === 47

48 Who Should Care About Tracking? End-users – CRA Grand Challenge: “Give computer end-users privacy they can control” Service providers – They can’t protect customers from eavesdroppers even if they don’t track users themselves Device manufacturers – Privacy concerns about tracking can hurt sales (e.g., Intel CPUID debacle, Benetton RFID boycott) 48

49 Fingerprints Related Work Other fingerprints – Device driver fingerprints [Franklin 06] – TCP clock-skew fingerprints [Kohno 05] – AP beacon click skew [Jana 08] – Physical layer fingerprints (using specialized hardware) [Brik 08, Patwari 07, Hall 04] Our contributions in comparison: – First link-layer fingerprints for individual devices – Enabling tracking when link-layer encryption is employed – Enabling better coverage than some previous work – Showing how to combine implicit identifiers 49

50 Unlinkable Tokens Related Work Unlinkable tokens in discovery – Public key protocol (slow in practice) [Abadi 04] – Application layer protocol to find friends (uses hash-chain) [Cox 07] Unlinkable tokens in data transport – General proposal, analysis for TCP (masking piecemeal) [Nikander 05] – 802.11 proposal (inefficient) [Armknecht 07] – Bluetooth proposal (uses hash-chain) [Singelee 06] SlyFi contributions in comparison – First to ensure no bits exposed (not masking identifiers piecemeal) – First to handle all major wireless protocol functions – First to leverage existing hardware (AES counter instead of hash-chain) – First link layer protocol implementation & evaluation on real devices 50

51 Location Privacy Related Work Privacy in location-based services, e.g., [Beresford ‘03, Gruteser ‘03, Schilit ‘03] – Don’t protect against third party eavesdroppers Privacy in RFID, e.g., [Fishkin ‘04, Juels ‘05] – General protocols do more than identification Privacy using temporary device addresses [Gruteser ’05, Hu ’06, Jiang ’07, Stajano ‘05] 51

52 Why not GSM Pseudonyms? GSM pseudonym properties – Provider must assign new pseudonym to client to change it – Only a single application used on GSM network GSM pseudonyms not sufficient when – Both parties in discovery want to be private – May require using pseudonym when the provider is not present (e.g., during discovery) – Many applications with many side-channels – Must accommodate device heterogeneity, evolution 52

53 802.11w: Protected Management Frames Unlinkability Integrity Authenticity Efficiency Confidentiality 802.11i (WPA) MAC Pseudonyms Public Key Symmetric Key SlyFi: Discovery/Binding SlyFi: Data packets Data Payload Long Term Long Term Data Payload Data Payload Unicast Frames 802.11i + 802.11w 53

54 Research Goals and Future Plans Motivation Ubiquitous computing Federated Internet systems Research Problems How to build systems from partially trusted and heterogeneous components to operate in unpredictable and hostile environments Approach Real-world measurements Empirically driven design Building and evaluating research prototypes Example Topic Area Secure outsourcing of computer and network management Help, my network is broken! We will fix it! Other Applications Secure and private cloud computing Enterprise network management Cooperative wireless fault diagnosis 54

55 === MOBISYS === 55

56 PHY Layer Signatures Charlie -> AP Alice -> AP Charlie -> AP ??? -> AP Physical layer fingerprints [Brik 08, Patwari 07, Hall 04] –Require uncommon and/or expensive hardware –Not as accurate in all circumstances These may be obscured by adding analog noise in hardware SlyFi raises the bar and is a necessary first step 56

57 Linking with Signal Strength Side-channel attack accuracy degrades significantly even if attacker tries to use signal strength to link packets Side-channel attack accuracy degrades significantly even if attacker tries to use signal strength to link packets Attack: website finger-printing [Liberatore ‘06] Attacker has 5 nodes to record packets’ RSSIs Attacker uses k-means clustering to determine which packets belong to each client. Set of RSSIs is the feature vector. Varying RSSI by +/- 5db reduces accuracy even further to 30% [Bauer ‘08] 57

58 Why not Time for Data Transport? Data messages: – Frequent: sent often to deliver data (1000+ pkts/sec) – Wide interface: many applications, many side-channels  Linkability at short timescales is NOT usually OK  Can NOT use loosely synchronized time to synchronize i TiTi AB TiTi TiTi TiTi = = = 58

59 Other Protocol Details Broadcast – All broadcast packets routed through the AP – Use same shared key for all the clients of the AP Higher-layer binding – Clients report “pseudonym MAC address”-to-IP address bindings to AP – AP answers all ARP queries Time synchronization and roaming – Use protected broadcast to transmit timestamps, same BSSID info Coexistence with 802.11 – Encapsulate SlyFi in “anonymous” 802.11 frame with unused FC code – Clients first search for SlyFi AP, then fall back to non-private AP search Link-layer ACKs – If fast enough, just acknowledge last SlyFi token sent – Our software implementation uses windowed ACKs 59

60 Multi-Party Discovery 60 Search Probe Enc(K payload1, 0, …) MAC(K payload2, …)AB T i T i = AES(K AB, i) token K payload, offset TiTiTiTi AB T i T i = AES(K AB, i)AC token K payload, offset TiTiTiTi AC... Enc(K AB,0, …) MAC(K AB, …) encrypt auth Enc(K AB,0, …) MAC(K AB, …) encrypt auth random key On receipt, check each 16-byte block that could be a token – 1500 byte packets  at most 31 lookups per packet – Can be done in parallel in hardware What if there are more than 31 receivers? – Option 1: Duplicate packet with different tokens in each – Option 2: Approximate token matching; open problem and future work

61 Packet Format Tryst: Discovery/Binding Shroud: Data Transport TokenUnencrypted Message 61

62 Protocol Timing Diagram Discover Authenticate and Bind Authenticate and Bind Send Data 62

63 Comparison protocols – wifi-open:802.11 with no security – wifi-wpa: 802.11 with WPA PSK/CCMP – public-key:straw man – symmetric-key:straw man – armknecht: previous header encryption proposal Performance Evaluation Similar 63

64 Link Setup Failures “Encrypt everything” fails to setup many links 64

65 Token Computation Time Token computation time is negligible (Once every token interval) Using software AES, 256 Mhz Geode processor 65

66 Data Throughput vs. Packet Size SlyFi data transport overhead is similar to WPA 66

67 Data Throughput SlyFi data filtering is about as efficient as 802.11 With simulated AES hardware Performs like symmetric key Higher = Better 67

68 Empirical Stream Interleaving Many streams interleaved even at short timescales 68

69 Empirical Background Probe Rate Background probes are frequent in practice 69

70 Empirical # Probes per Client Some clients probe for many network names 70

71 === MOBICOM === 71

72 Tracking 802.11 Users Tracking scenario: – Every users changes pseudonyms every hour – Adversary monitors some locations  One hourly traffic sample from each user in each location ? ? ? tcpdump Build a profile from training samples: First collect some traffic known to be from user X and from random others tcpdump..... ? ? ? Then classify observation samples Traffic at 2-3PM Traffic at 3-4PM Traffic at 4-5PM Traffic at 2-3PM Traffic at 3-4PM Traffic at 4-5PM Traffic at 2-3PM Traffic at 3-4PM Traffic at 4-5PM 72

73 Sample Classification Algorithm Core question: – Did traffic sample s come from user X? A simple approach: naïve Bayes classifier – Derive probabilistic model from training samples – Given s with features F, answer “yes” if: Pr[ s from user X | s has features F ] > T for a selected threshold T. – F = feature set derived from implicit identifiers 73

74 Deriving features F from implicit identifiers Set similarity (Jaccard Index), weighted by frequency: IR_Guest SAMPLE FROM OBSERVATION Sample Classification Algorithm linksys djw SIGCOMM_1 PROFILE FROM TRAINING Rare Common w(e) = low w(e) = high 74

75 Evaluating Classification Effectiveness Simulate tracking scenario with wireless traces: – Split each trace into training and observation phases – Simulate pseudonym changes for each user X DurationProfiled UsersTotal Users SIGCOMM conf. (2004) 4 days377465 UCSD office building (2006) 1 day153615 Apartment building (2006) 14 days39196 75

76 Question: Is observation sample s from user X? Evaluation metrics: – True positive rate (TPR) Fraction of user X’s samples classified correctly – False positive rate (FPR) Fraction of other samples classified incorrectly Evaluating Classification Effectiveness Pr[ s from user X | s has features F ] > T = 0.01 = ??? Fix T for FPR Measure TPR (See paper) 76

77 Results: Individual Feature Accuracy TPR  60% TPR  30% Individual implicit identifiers give evidence of identity 1.0 77

78 Results: Multiple Feature Accuracy Users with TPR >50%: Public: 63% Home: 31% Enterprise: 27% We can identify many users in all environments PublicHomeEnterprise netdests ssids bcast fields 78

79 Results: Multiple Feature Accuracy Some users much more distinguishable than others Public networks: ~20% users identified >90% of the time PublicHomeEnterprise netdests ssids bcast fields 79

80 One Application Question: Was user X here today? More difficult to answer: – Suppose N users present each hour – Over an 8 hour day, 8N opportunities to misclassify  Decide user X is here only if multiple samples are classified as his Revised: Was user X here today for a few hours? 80

81 Results: Tracking with 90% Accuracy Many users can be identified 81

82 === WIFI-REPORTS === 82

83 Will Reports Improve Selection? Commercial APs at Seattle hotspot locations red = “official” AP grey = other visible AP 83

84 === OLD SLIDES === 84

85 Other Research Wireless Service Discovery [MobiSys 09, HotNets 07] Wi-Fi hotspot reputation system Private device discovery without per-device bootstrapping Peer-to-Peer Games [SIGCOMM 08, NSDI 06, IPTPS 07] Distributed File Systems [ICDCS 07] Internet Measurement [IMC 04 x2, SIGCOMM 04] DNS infrastructure properties DNS cache compliance BGP routing and multi-homing 85

86 What can Protocol Control Info Reveal? 86 Wardriving Database Me

87 What can Protocol Control Info Reveal? 87 Wardriving Database David Wetherall

88 Previous work: Periodically change device addresses [Gruteser 05, Hu 06, Jiang 07, Stajano 05] Central Challenge From: 19:1A:1B:1C:1D:1E Prevent third parties from tracking wireless devices tcpdump 88

89 Central Challenge My thesis work: – Temporary device addresses are not enough; Other protocol info can be used to track devices [MobiCom 07, HotOS 07] – How to build efficient wireless protocols that reveals no transmitted bits to eavesdroppers [MobiSys 08 Best Paper, HotNets 07] Prevent third parties from tracking wireless devices 89

90 Implicit Identifiers Example Implicit identifier: other protocol fields – Header bits (e.g., power management) – Supported transmit rates – Supported authentication algorithms tcpdump ? time Protocol Fields: 11,4,2,1Mbps, WEP Protocol Fields: 11,4,2,1Mbps, WEP 90

91 Wireless Protocol Primer Same basic protocol for 802.11 ad-hoc 802.11 infrastructure Bluetooth Other wireless protocols 91

92 Wireless Protocol Primer Name: Bob’s PSP Password: Alice<3Bob 92

93 Wireless Protocol Primer 93

94 PrivateVideo1.avi Blood pressure: high Alice 94 To: 00:12:10:1B:41:4A From: 11:11:22:33:44:55 To: 00:10:5A:04:4F:AF To: 00:0B:DB:73:92:67 Alice’s friend? Alice? From: 00:0B:DB:73:92:67 To: 11:11:22:33:44:55 From: 10:01:D1:73:92:61

95 Discovery/Binding Time SlyFi link setup has overhead comparable to WPA Lower = Better 95

96 Data Throughput SlyFi data filtering is about as efficient as 802.11 Performs like symmetric key Higher = Better 96

97 Research Goals Motivation Ubiquitous computing Federated Internet systems Research Problems How to build systems from partially trusted and heterogeneous components to operate in unpredictable and hostile environments Approach Real-world measurement Empirically driven design Building and evaluating research prototypes 97

98 Challenge: Filtering without Identifiers 98 Which packets are for me?

99 Straw man: Symmetric Key Protocol Probe “Bob” ClientService Symmetric encryption (e.g., AES w/ random IV) Check MAC: MAC:K AB Try to decrypt with each shared key K Shared1 K Shared2 K Shared3 … O(# potential senders) Can’t identify the decryption key in the packet or else it is linkable 99

100 What can Protocol Control Info Reveal? 100 Wardriving Database Anonymous

101 101 Problem: Identifiers Enable Tracking


Download ppt "Improving the Privacy of Wireless Protocols Jeffrey Pang Carnegie Mellon University."

Similar presentations


Ads by Google