Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1565799.1565804acmconferencesArticle/Chapter ViewAbstractPublication PagestapiaConference Proceedingsconference-collections
research-article

Performing traffic analysis on a wireless identifier-free link layer

Published: 01 April 2009 Publication History

Abstract

Recent work has focused on removing explicit network identifiers (such as MAC addresses) from the wireless link layer to protect users' privacy. However, despite comprehensive proposals to conceal all information encoded in the bits of the headers and payloads of network packets, we find that a straightforward attack on a physical layer property yields information that aids in the profiling of users. In this paper, a statistical technique is developed to associate wireless packets with their respective transmitters solely using the signal strengths of overheard packets. Through experiments conducted in a real indoor office building environment, we demonstrate that packets with no explicit identifiers can be grouped together by their respective transmitters with high accuracy. We next show that this technique is sufficiently accurate to allow an adversary to conduct a variety of complex traffic analysis attacks. As an example, we demonstrate that one type of traffic analysis--a website fingerprinting attack--can be successfully implemented after packets have been associated with their transmitters. Finally, we propose and evaluate techniques that can introduce noise into the measurements of such physical layer phenomena to obfuscate the identifiers derived from them.

References

[1]
F. Armknecht, J. Girão, A. Matos, and R. L. Aguiar. Who said that? Privacy at link layer. In INFOCOM. IEEE, 2007.
[2]
B. Greenstein, D. McCoy, J. Pang, T. K. S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In Mobisys, 2008.
[3]
T. Hastie, R. Tibshirani, and J. H. Friedman. The Elements of Statistical Learning. Springer, 2001.
[4]
M. Liberatore and B. N. Levine. Inferring the source of encrypted HTTP connections. In CCS '06. ACM, 2006.
[5]
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In MobiCom, 2007.
[6]
C. Reis, R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan. Measurement-based models of delivery and interference in static wireless networks. SIGCOMM Comput. Commun. Rev., 36(4), 2006.
[7]
T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In Proc. 16th USENIX Security Symposium, 2007.
[8]
D. Singelée and B. Preneel. Location privacy in wireless personal area networks. In WiSe, 2006.
[9]
D. X. Song, D. Wagner, and X. Tian. Timing analysis of keystrokes and timing attacks on ssh. In 10th USENIX Security Symposium, 2001.
[10]
Q. Sun, D. R. Simon, Y.-M. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In IEEE Symposium on Security and Privacy, 2002.
[11]
C. J. Van Rijsbergen. Information Retrieval, 2nd edition. Dept. of Computer Science, University of Glasgow, 1979.
[12]
I. H. Witten and E. Frank. Data mining: Practical machine learning tools and techniques. Morgan Kaufmann, San Francisco, CA, USA, 2005.
[13]
C. Wright, L. Ballard, F. Monrose, and G. Masson. Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In Proceedings of the 16th USENIX Security Symposium, 2007.
[14]
C. Wright, F. Monrose, and G. Masson. On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research, 2006.

Cited By

View all
  • (2012)Obfuscating IEEE 802.15.4 communication using secret spreading codes2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)10.1109/WONS.2012.6152228(1-8)Online publication date: Jan-2012

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
TAPIA '09: The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations
April 2009
123 pages
ISBN:9781605582177
DOI:10.1145/1565799
  • Conference Chair:
  • Nina Berry
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2009

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

TAPIA '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2012)Obfuscating IEEE 802.15.4 communication using secret spreading codes2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)10.1109/WONS.2012.6152228(1-8)Online publication date: Jan-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media