Top Banner
©2011 Patrick Tague Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy
29

Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

Aug 07, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Mobile Security14-829 – Fall 2011

Patrick Tague

Class #17 – Location Security and Privacy

Page 2: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Announcements• HW #3 is due today

• Exam is in-class on Nov 9

Page 3: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Agenda• Location security

• Location privacy

Page 4: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Location, Location, Location

Incorporation of location information into various

protocols and services has changed the landscape in

networked systems across domains.

Geo-spatial resource

provisioning

Location-based

applications & services

Distributed tracking

& monitoring

Geographic network

services (e.g., routing)

Navigation & mapping Social networking

Page 5: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Location Security

What does it mean to secure location?

• Location privacy

• Location secrecy

• Selective location

disclosure

• Untraceability

• Malicious location

estimation service

• Estimation precision

• Spoofing

• Misleading, lying, etc.

Page 6: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Secure Localization

Is it possible to secure the location estimation process?

• Process of localization is

based on reference data

– Is the source trustworthy?

– Can the data be verified?

– Is the data reliable?

• Reference data may be

noisy or imprecise

– How to incorporate

redundancy for reliable

location estimation?

• Location estimation

services can be attacked

– Vulnerabilities?

– How to mitigate them?

• System or devices may be

tightly constrained

– How efficient is the

estimation algorithm?

– What are the trade-offs?

Page 7: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Location in Different Domains• Secure location estimation:

– GPS

– MANET and WSN

– WLAN

– Smartphones

Page 8: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

GPS Localization• GPS satellites serve as mobile reference points

for Earth-based receivers

– All satellites have high-precision, tightly synchronized

clocks and precisely known locations

– Receivers use timing information to measure distance

from multiple satellites (3 is enough, more is better)

– Location is estimated using 3-D multi-lateration

Dist d3 from (x3,y3,z3)Dist d2 from (x2,y2,z2)

Dist d1 from (x1,y1,z1)

Page 9: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

GPS Location Security• GPS satellite network is well guarded

– Physical security: so you want to tamper with a

satellite...?

– Reliability: clocks are closely monitored

• GPS Spoofing

– “Rogue” GPS devices can look like satellites

– Interfere with time-sync process

Spoofing signal

Page 10: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Localization• Many different types of localization using

infrastructure-based or distributed approaches

– Many techniques mimic GPS in one way or another

– Trusted devices can serve as reference points

– Physical characteristics provide distance estimates or

bounds from reference points

• Resource constraints are limiting factor

– Algorithms must be fast and efficient

– GPS is not cost-effective for continual use in batter-

powered devices

Page 11: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Relative Localization

Each localizing device collects geometric relationships

relative to several reference points (xi,yi)

Local presence I can hear

you, so I must

be near (x,y)

Connectivity

Rx signal strength RSS = R →

distance d

Time of flight Time t →

distance d

Time-difference Time t2-t1 →

distance d

Angle of arrivalq1

q2

Page 12: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Securing Relative

Measurements• Measurements taken with respect to reference

points should be:

– Authentic

• Measurements from authorized reference points only

– Verifiable

• Integrity of measurement should be guaranteed

• If possible, physical measurement should be unforgeable

– Highly available

• Location information should be ready when needed

– Protected from various forms of attack

Page 13: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Example: SeRLoc[Lazos & Poovendran, 2004]

• SeRLoc = Secure Range-independent Localization

L1

L4

L2

L3

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

1 1 1 2 3 3 3 3 4 4 4 3 3 3 3 3 3

1 1 2 2 2 3 4 4 4 4 4 4 4 3 3 2 2

1 1 2 2 4 4 4 4 4 4 4 4 4 4 3 3 2

2 2 2 2 3 4 4 4 4 4 4 4 4 3 2 2 2

2 2 3 3 3 3 4 4 4 4 4 4 3 3 2 2 2

2 2 2 3 3 3 3 4 4 4 4 3 3 2 2 2 2

1 2 2 2 3 3 3 3 4 4 3 2 2 2 3 4 3

2 2 2 3 3 3 3 3 2 2 2 2 1 1 1 1 1

0 0 0 0 1 1 1 1 0 0 0 0 0 0 0 0 0

Li : { (Xi, Yi) || (θi,1, θi,2) || (Hn-j(PWi)), j, IDLi } K0

Page 14: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Example: Verifiable

Multilateration [Čapkun & Hubaux, 2005]

• Basic idea of VM:

– Using distance bounding, an

attacker can only increase the

measured distance

Time of flight

N1

N1*N2

Time t →

distance d

• VM benefit:

– Increasing distance

measurements will

either have negligible

effect on location or

be large enough to

detect misbehavior

Page 15: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Compass

Mobility Helps Localization

1

M

2

4

3

M

i

Mobile Node

Reference

Estimated

position is

centroid of

intersection

Distance

M

New

estimated

position

Page 16: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

WLAN Localization• WiFi localization is typically based on received

signal strength mappings within buildings

– This is currently deployed in Bldg 23

• With additional assistance from Bluetooth beacons

– Requires building surveys for training data

Page 17: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Smartphone Localization• Hybrid devices can use hybrid localization

– A-GPS + WiFi localization + cell triangulation

• A-GPS (assisted GPS) allows a receiver to get additional

information from an assistance server to lock on to satellites

more quickly to solve time-to-first-fix problems

– Mobile mesh nodes will be able to use any

combination of selective (A-)GPS, mobility

information, and relative location

Page 18: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Location Privacy• What about location privacy?

• Why do we care?

– How to prevent location disclosure?

– How to prevent location inference?

Page 19: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Location Disclosure• Benefits of disclosing

one's location

– e-911 service (gov't-

mandated location

tracking)

– Navigation & mapping

– Location-sensitive ads

– Local traffic / weather

– Finder apps

– Social networking

– Remote monitoring (e.g.,

tracking children)

– Safety (e.g., in VANET)

– …

• Risks of location

disclosure

– Tracking / linking

• Surveillance

• Inferring context:

lifestyle, medical

condition, political

views, preferences

• → Targeted malice

(e.g., stalking)

– Location-sensitive ad spam

– …

Page 20: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Cellular Location• Service providers are required by law to track

cell phone locations using GPS or tower-based

triangulation

– For emergency use, law enforcement use, etc.

– Disclosure of location information is tightly regulated

• Mostly “opt-in” disclosure only

• Mobile apps and services using location are not

part of this protection

Page 21: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Location Privacy in Apps• Third-party apps are subject to different laws

and policies regarding location

– Apps can (and do!) take advantage of unnecessary

privileges to record users' location, movement, etc.

– Location privacy is really in the hands of the mobile

developers, not the users or providers

– Significant number of selected Android apps recently

shown to incorrectly manage sensitive info [Enck et al.,

“TaintDroid”, USENIX OSDI 2010]

Page 22: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

WLAN Location• Challenges to location privacy in WLAN

– Network operators are untrusted

– High density of APs; many may be malicious

– Precise (~1m) localization

– Broadcast IDs (MAC addresses)

• Very easy to eavesdrop on devices' MAC addresses, even if

security features are enabled

• Static MACs allow for easy tracking of devices/users

– MAC pseudonyms can be used to prevent tracking

• As long as previous/current MAC addresses are unlinkable

[Gruteser & Grunwald, WMASH 2003]

Page 23: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Mitigating Traceability• Preventing packet correlation for tracking

– In WiFi, RFID, Bluetooth, etc.

• Synchronization, shared secrets, and PRNG are enough to use

pseudonyms effectively (as in WiFi systems)

• Without sync + PRNGs (such as RFID tags), a trusted authority

(RFID database) can store ID-to-pseudonym look-up table [Alomair et al., DSN 2010]

– Even with ID pseudonymity, attackers can observe

and correlate traffic to trace users

• → Location privacy isn't just about the location or the user

ID

Page 24: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Traffic Anonymization• In multi-hop networks (MANET/WSN), packet

linking via traffic analysis can expose source and

relay locations

– Analysis of inter-packet timing reveals correlation

– Possible approach to source anonymity is to inject

dummy traffic and randomize packet timing to

reduce correlation [Alomair et al., Globecom 2010]

Page 25: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Leveraging Silence• Communication is typically bursty

– Short-lived sessions of activity, followed by sessions

of inactivity, or “silence”

– Silent periods can be used instead of synchronization

• Sender and receiver know to refresh pseudonyms whenever a

burst session begins

– Vehicular networks (VANET) [Sampigethaya et al., ESCAR 2005]

Page 26: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Location Privacy Challenges1. Understanding the privacy goals

– What needs to be protected?

– What are the rules to be enforced?

2. Understanding the threat

– What are attackers goals, capabilities, methods, …?

– Practicality of attacker assumptions?

3. Metrics

– How to measure privacy protection and enforcement?

– How to evaluate and incorporate risk?

Page 27: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Concerns for Developers• What can developers do to protect location?

– Protect explicit location information

• Secure storage of location data

• Don't store it at all

– Protect against location “leakage” - implicit info

• Include an anonymization mechanism to protect against

tracking, traffic analysis, etc.

– Develop according to a well-defined attacker model

– Disclose location usage to users

Page 28: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

Concerns with Developers• Unfortunately:

– Malicious developers can scrape location information

very easily

– Users are responsible for checking permissions to see

what apps are allowed to do

– Users are responsible for reading license agreements

and disclosure statements to see what developers

claim they are doing with user data

Page 29: Mobile Security - Carnegie Mellon Universitymews.sv.cmu.edu/teaching/14829/f11/files/tague_14829f11...©2011 Patrick Tague Location, Location, Location Incorporation of location information

©2011 Patrick Tague

What's Next?• 11/2: SURVEY on mobile location privacy

• 11/7: Guest speaker – Didier Serra, Inside Secure

• 11/9: Exam