The Community for Technology Leaders
RSS Icon
Issue No.04 - April (2012 vol.23)
pp: 676-683
Mo Li , Nanyang Technological University, Singapore
Xiaoye (Jonathan) Jiang , Stanford University, Stanford
Leonidas J. Guibas , Stanford University, Stanford
We demonstrate that the network flux over the sensor network provides fingerprint information about the mobile users within the field. Such information is exoteric in the physical space and easy to access through passive sniffing. We present a theoretical model to abstract the network flux according to the statuses of mobile users. We fit the theoretical model with the network flux measurements through Nonlinear Least Squares (NLS) and develop an algorithm that iteratively approaches the NLS solution by Sequential Monte Carlo Estimation. With sparse measurements of the flux information at individual sensor nodes, we show that it is easy to identify the mobile users within the network and instantly track their movements without breaking into the details of the communicational packets. Our study indicates that most of existing systems are vulnerable to such attack against the privacy of mobile users. We further propose a set of countermeasures that redistribute and reshape the network traffic to preserve the location privacy of mobile users. With a trace driven simulation, we demonstrate the substantial threats of the attacks and the effectiveness of the proposed countermeasures.
Sensor networks, network flux, mobile user, fingerprint.
Mo Li, Xiaoye (Jonathan) Jiang, Leonidas J. Guibas, "Fingerprinting Mobile User Positions in Sensor Networks: Attacks and Countermeasures", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 4, pp. 676-683, April 2012, doi:10.1109/TPDS.2011.213
[1] J. Al-Muhtadi, R. Campbell, A. Kapadia, M.D. Mickunas, and S. Yi, "Routing through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments," Proc. IEEE 22nd Int'l Conf. Distributed Computing Systems (ICDCS), 2002.
[2] P. Bahl and V.N. Padmanabhan, "RADAR: An In-Building RF-Based User Location and Tracking System," Proc. IEEE INFOCOM, 2000.
[3] A.R. Beresford and F. Stajano, "Location Privacy in Pervasive Computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, Jan.-Mar. 2003.
[4] J. Bruck, J. Gao, and A.A. Jiang, "MAP: Medial Axis Based Geometric Routing in Sensor Network," Proc. ACM MobiCom, 2005.
[5] J. Deng, R. Han, and S. Mishra, "Countermeasures against Traffic Analysis Attacks in Wireless Sensor Networks," Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SECURECOMM), 2005.
[6] J. Hightower and G. Borriello, "Location Systems for Ubiquitous Computing," Computer, vol. 34, no. 8, pp. 57-66, Aug. 2001.
[7] D. Kotz, T. Henderson, and I. Abyzov, "Trace Set Dartmouth/Campus/Movement (v1.3)," 2005.
[8] B. Kusy, A. Ledeczi, and X. Koutsoukos, "Tracking Mobile Nodes Using RF Doppler Shits," Proc. ACM Fifth Int'l Conf. Embedded Networked Sensor Systems (SenSys), 2007.
[9] B. Kusy, H. Lee, M. Wicke, N. Milosavljevic, and L. Guibas, "Perdictive QoS Routing to Mobile Sinks in Wireless Sensor Networks," Proc. Information Processing in Sensor Networks (IPSN), 2009.
[10] M. Li, X. Jiang, and L. Guibas, "Fingerprinting Mobile User Positions in Sensor Networks," Proc. IEEE 30th Int'l Conf. Distributed Computing Systems (ICDCS), 2010.
[11] M. Li, Y. Liu, J. Wang, and Z. Yang, "Sensor Network Navigation without Locations," Proc. IEEE INFOCOM, 2009.
[12] H. Lin, M. Lu, N. Milosavljevic, J. Gao, and L.J. Guibas, "Composable Information Gradients in Wireless Sensor Networks," Proc. Seventh Int'l Conference Information Processing in Sensor Networks (IPSN), 2008.
[13] S. Madden, M.J. Franklin, and J.M. Hellerstein, "TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks," Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI), 2002.
[14] K. Madsen, H. Nielsen, and O. Tingleff, "Methods for Nonlinear Least Squares Problems," technical report, 2004.
[15] L.M. Ni, Y. Liu, Y.C. Lau, and A. Patil, "LANDMARC: Indoor Location Sensing Using Active RFID," ACM Wireless Networks, vol. 10, pp. 701-710, Nov. 2004.
[16] J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, "802.11 User Fringerprinting," Proc. ACM MobiCom, 2007.
[17] N.B. Priyantha, A. Chakraborty, and H. Balakrishnan, "The Cricket Location-Support System," Proc. ACM MobiCom, 2000.
[18] R. Want, A. Hopper, V. Falcao, and J. Gibbons, "The Active Badge Location System," ACM Trans. Information Systems (TOIS), vol. 10, pp. 91-102, 1992.
23 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool