1 / 20

Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes

Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes. JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla. Outline. Background. Mobility anonymity attacks. Countermeasure ( Motion-MIX). Asymptotic network security model.

elani
Download Presentation

Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Traffic Sensor Network versus Motion-MIX:Tracing and Protecting Mobile Wireless Nodes JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla

  2. Outline • Background. • Mobility anonymity attacks. • Countermeasure ( Motion-MIX). • Asymptotic network security model. • Security analysis of motion-MIX.

  3. Mobile Traffic Sensor Network • Recent advances in manufacturing technologies have enabled the physical realization of small, light-weight, low-power, and low-cost micro air vehicles.

  4. Concept of Mobile Anonymity • In fixed networks • anonymity: identity and location are synonyms • In mobile networks • anonymity: identity and location are not synonyms. • motion pattern is also a security concern. • venue: the smallest area to which the adversary can “pinpoint” the node only via the node’s communication.

  5. Mobile Anonymity Attacks • Motion pattern attack by mobile traffic analysis If the adversary moves faster than the victim, it can always trace it’s motion pattern.

  6. Mobile Anonymity Attacks • Venue privacy attack (VPA) • (VPA-a): enumerates the set of currently active nodes. • (VPA-b): computes related metrics such as the size of the set. • (VPA-c): performs traffic analysis against a venue. (How many and what kind of connections in-and-out the venue).

  7. Design Assumption • Adversary model • Capable of scanning the entire network area in short time. • Honest-but-curious. • Polynomially-bounded cryptanalyst who cannot invert one-way functions or differentiate cryptographically strong pseudorandom bits from truly random bits with non-negligible probability. • Network model • Pairwise key sharing.

  8. Motion-MIX • K incoming mobile nodes or wireless packet flows get fully mixed in the Motion-MIX. • K-anonymity: the adversary cannot differentiate these k nodes.

  9. In motion-MIX, any mobile node inside a motion-MIX venue should send out decoy traffic to ensure k-anonymity. The above algorithm running on mobile nodes can ensure that there are approximate k wireless transmission in its one-hop neighborhood during the unit time interval.

  10. Adversary’s capability decides the inner circle. • The roaming nodes decide the outer ring.

  11. Content Analysis • A mobile node should be indistinguishable from other nodes in the same motion-MIX venue from the adversary’s view. • A mobile node’s traffic should be indistinguishable from another’s in the same motion-MIX venue from the adversary’s view.

  12. Necessary Conditions • Identity-free routing Every mobile node does not reveal its own identity to other nodes. • One-time packet content E.g., for 100 packets, the 2 extreme cases (1 sender to 1 recipient & 100 different senders to 100 different recipients) and all cases in-between are equally probable. • Avoid being captured the mobile node’s radio signature.

  13. Negligible function Definition: A function u: N→R is negligible, if for every positive integer c and all sufficiently large n’s (i.e., there exists Nc>0, for all n>Nc), In cryptography, the longer the key length is, the more asymptotically secure a cryptosystem is. In our analysis, the larger the network scale is, the more asymptotically secure the network is.

  14. Underlying Mobile Networking Model The spatial distribution of a node is expressed as For random waypoint (RWP) mobility model in a square network area of size a×a.

  15. Underlying Mobile Networking Model If there are N nodes in the network and each of them roams independently and identically. Random presence of mobile nodes is modeled by a spatial Poisson point process. Uniform Non-uniform

  16. Security Guarantee of Motion-MIX Theorem 1: The security breach probability of motion-MIX, ( the probability that there are less than k uncompromised nodes in the venue quantified by Δ’), is negligible with respect to the network scale N.

  17. Security Guarantee of Motion-MIX Theorem 2: The security breach probability of node tracing, ( the probability that the adversary can trace an active transmitting mobile node v’s motion pattern without losing the target), is negligible with respect to N and |T|.

  18. Security Guarantee of Motion-MIX Publicity assumption : The adversary knows the entire identity set and the network area, it can estimate that the expected number of nodes in each venue is • Nodes in each venue transmit k = E(k') real/decoy packets in a fully distributed manner.

  19. Security Guarantee of Motion-MIX Theorem 3: In a wireless ad hoc network, a motion-MIX is min(k,E(kΔ’))-anonymous, where Δ’ is the size of the least enlarged venue defined on the venue size Δ.

More Related