Quantifying and Preventing Privacy Threats in Wireless Link Layer Protocols

نویسندگان

  • Jeffrey Pang
  • Srinivasan Seshan
  • Adrian Perrig
  • Peter Steenkiste
  • David Wetherall
چکیده

The proliferation of mobile wireless devices enables or magnifies several privacy threats that traditional link layer confidentiality mechanisms, such as payload encryption, do not protect against: user tracking, profiling, and traffic analysis. For example, it is well known that the exposure of long-lived, unique device addresses can be used to track users over time. Although these addresses can easily be changed, more subtle features exposed in encrypted link layer traffic can be used to identify and profile users as well. These features, which we call implicit identifiers, include identifiers used for service discovery, characteristics that encryption does not obscure, and protocol information in unencrypted headers. These features can not be easily removed without loss of crucial network functionality. This thesis quantifies privacy threats posed by these features and presents solutions that prevent their exposure to third parties. In doing so, we make three primary contributions: (1) We identify implicit identifiers that are exposed in wireless link layer protocols such as 802.11 and quantify how accurately they can be used to identify and track users. (2) An important class of implicit identifiers are those exposed by service discovery and rendezvous protocols. We have designed and implemented a mechanism that enhances existing discovery protocols so that they are anonymous—that is, so that they only expose identities to authorized parties. (3) A second important class of implicit identifiers are those exposed by analyzing exposed characteristics of encrypted messages, e.g., message sizes and inter-arrival times. We propose a rule-based system that enables efficient masking of sensitive traffic characteristics as they are discovered, without modifying applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mechanisms to Mitigate Wireless Privacy Threats

The proliferation of mobile wireless devices enables or magnifies several privacy threats that traditional link layer confidentiality mechanisms, such as payload encryption, do not protect against: user tracking, profiling, and traffic analysis. For example, it is well known that the exposure of long-lived, unique device addresses can be used to track users over time. Although these addresses c...

متن کامل

Quantifying and Mitigating Privacy Threats in Wireless Protocols and Services

The ubiquity of mobile wireless devices greatly magnifies the threats of clandestine physical tracking, profiling, and surveillance. This is because these devices often reveal their identities and locations to third parties, either inadvertently to eavesdroppers nearby or in reports to location-based services. In this dissertation, we address the challenges in building practical wireless protoc...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era

Today’s rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed with existing protocols. By considering 802.11 as a case study and analyzing publicly available 802.11 traces, we show that a device can be identified and tracked over time through its persistent link-layer address, list of k...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007