1 / 10

Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era

Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era. Benn Greenstein Ramakrishna Gummadi Jeffrey Pang Mike Y. Chen Tadayoshi Kohno Srinivasan Seshan David Wetherall. Presented by: Ryan Genato. Overview. Background The Paper Introduction Scenarios

darin
Download Presentation

Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era Benn Greenstein Ramakrishna Gummadi Jeffrey Pang Mike Y. Chen Tadayoshi Kohno SrinivasanSeshan David Wetherall Presented by: Ryan Genato

  2. Overview • Background • The Paper • Introduction • Scenarios • Challenges • Conclusions • Other Methods • Conclusions • Bibliography

  3. Firstly, an introduction… • http://www.youtube.com/watch?v=K-X2XzKqBiE

  4. Introduction • There is a heightened level of wireless connectivity • Wireless networks are vulnerable to eavesdropping • Eavesdropping can infringe on location privacy

  5. Scenarios • Provider cross-referencing corporate info with public network info (that they serve) • Leveraging persistent addressing (MAC) • Monitoring an individual’s network access • Leveraging probe request frames (SSID) • Extrapolating provider network statistics • Leveraging packet sequence numbers

  6. Challenges • Balancing the need for names to address devices with keeping them from being identifiable by name • Discover and use resources without revealing the action or past history • Designing protocols to avoid leaking identifying information through physical characteristics of transmissions, control information, etc.

  7. Conclusions • “This paper argues that wireless networks pose new threats to privacy” • Prior efforts to anonymize communication still leak explicit identifiable information

  8. Other Methods • Foursquare, Facebook • Seekdroid, Lookout, Find My iPhone • Google Maps, WiGLE, Skyhook

  9. Conclusions • Wireless location privacy issues will only continue to grow as an issue as wireless connectivity increases • Security is limited by our standards and protocols, but also by human vulnerability

  10. Bibliography • "Wireless LAN Service Overview." TechNet. N.p., n.d. Web. 12 Mar. 2012. • McCullagh, Declan. "Removing your Wi-Fi network from Google's map." CNET. N.p., 14 Nov. 2011. Web. 12 Mar. 2012. • Riley, Steve. "Myth vs. reality: Wireless SSIDs." TechNet Blogs. N.p., 16 Oct. 2007. Web. 12 Mar. 2012.

More Related