1 / 22

Mobile Location Tracking in Metro Areas: Malnets and Others

Mobile Location Tracking in Metro Areas: Malnets and Others. Indiana University. Nathaniel Husted , Steven Myers. Agenda. Introduction Overview Methodology Results The UDelModels Simulator Physical Realization Of A Tracking Network Mitigating Privacy Attacks Conclusion.

beyla
Download Presentation

Mobile Location Tracking in Metro Areas: Malnets and Others

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Location Tracking in Metro Areas: Malnets andOthers Indiana University Nathaniel Husted, Steven Myers

  2. Agenda • Introduction • Overview • Methodology • Results • The UDelModelsSimulator • Physical Realization Of A Tracking Network • Mitigating Privacy Attacks • Conclusion

  3. Introduction • specifically quantify the degree to which WiFiIdentifier leakage presents a potential threat • tracking of individuals in dense metropolitan areas by a small and mobile sub-population working in collusion to monitor others’ locations. • We quantify the degree to which different variables • small changes in the broadcast radius of wireless signals have a significant effect on the ability to track individuals

  4. Overview ! Eve ! ! Alice

  5. Overview • Note that WiFi radios constantly send outprobe frames even when not connected to a network. • Determining a User’s BSSID(MAC) • Ask any nearby detector nodes and do data-filtering • If a tracker controlled a diverse number of APs, they could attempt to trick a user into connecting to one. • Purchase

  6. Methodology • 1. Simulate an appropriate number of traces, τ • 2. Choose a set S ⊂ τof locators • 3. Choose a set T ⊆ τ\ S of tracked individuals • 4. At each time period, for each x ∈ T record each y ∈ S that is within transmission diameter d. • 5.For each maximal set {y} ⊆ S that observes x in a given time period, use a trilateration to minimize the area within which x is expected to be. • 6. Determine the frequency with which each tracked individual x ∈ T is observed and to what area of accuracy (in m2) his or her position is learnt.

  7. Methodology

  8. Methodology • Population Density and Simulations • Chicago, Dallas • 3D vs. 2D. • Mobile vs. stationary devices • Metropolis vs. Other Environments • Pedestrians vs. Vehicles • The Usage of Phones 3D Mobile Metropolis Pedestrians

  9. Results • Frequency of Detection • Comparison of Dallas to Chicago • Density of Populations • The Effect of Network Prevalence on Detection • The Effect of Broadcast Diameter

  10. Results

  11. Results

  12. Results

  13. Results

  14. Results

  15. Results

  16. The UDelModels Simulator • This simulator attempts to recreate accurate human mobility, both micro and macro, by producing traces that match a number of key observed statistics from a number of data sources

  17. Physical Realization Of A Tracking Network • A lot of BSSIDs with tracking software • a control mechanism for smartphones to monitor BSSIDs • database

  18. Physical Realization Of A Tracking Network • Malnet will monitoring wireless traffic and look for probe request frames • Received Signal Strength Indication (RSSI) measures the strength of the radio signal detected and has historically been used as a proxy for distance in wireless positioning. • Send the record to the database and then triangulate the location

  19. Mitigating Privacy Attacks • How to defense • Ensure that the radios do not broadcast… • Jiang .et al. : • BSSID pseudonym that changes every time a client connects to a mobile access point • An opportunistic silent period • Decreasingthe transmit power of the wireless device dynamically • Greenstein et al: • SlyFi

  20. Conclusion • Quantify the potential for pervasive monitoring • Different variables have significant effects on tracking capability • All that is required is a way of gathering up mobile nodes in a sensor network via legitimate software or malware, and a system to process the sensor data

More Related