Security and Cooperation in Wireless Networks
Georg-August University Göttingen
Privacy Protection privacy notions and metrics; privacy in RFID - - PowerPoint PPT Presentation
Privacy Protection privacy notions and metrics; privacy in RFID systems; location privacy in vehicular networks; Security and Cooperation in Wireless Networks Georg-August University Gttingen Chapter outline 1 Important privacy related
Security and Cooperation in Wireless Networks
Georg-August University Göttingen
Georg-August University Göttingen
Privacy Protection
2
Georg-August University Göttingen
Privacy Protection
– E.g. is a determined set of message senders and message receivers, the adversary may be still unable to relate senders to receivers
3
Georg-August University Göttingen
Privacy Protection
x x x A x
4
Georg-August University Göttingen
Privacy Protection
1 2
1 2 R 1 2
R R R I I
1 2
5
Georg-August University Göttingen
Privacy Protection
6
Georg-August University Göttingen
Privacy Protection
7
RFID tag RFID reader back-end database tagged
reading signal ID ID detailed
information
Georg-August University Göttingen
Privacy Protection
it is possible to track a person by tracking a constellation of a set of particular tags: in a given period of time, there may be a single person in a city wearing a specific type of shoes and wrist watch and carrying a specific book in a specific suitcase
8 watch: Casio book: Applied Cryptography shoes: Nike suitcase: Samsonite jeans: Lee Cooper
Georg-August University Göttingen
Privacy Protection
9
Georg-August University Göttingen
Privacy Protection
10
Georg-August University Göttingen
Privacy Protection
11
Georg-August University Göttingen
Privacy Protection
12
Georg-August University Göttingen
Privacy Protection
13
Georg-August University Göttingen
Privacy Protection
14
Georg-August University Göttingen
Privacy Protection
– a mechanism to determine which tags are present (singulation procedure) – IDs are leaves of a binary tree – reader performs a depth first search in the tree as follows
the prefix with the response
reader: prefix “-” ? tags: collision reader: prefix “0” ? tags: 0 reader: prefix “00” ? tags: 1 reader: prefix “1” ? tags: 0 reader: prefix “10” ? tags: collision
15
00 01 10 11 000 010 100 110 001 011 101 111 100 101 001
Note: real tag sizes are much larger (e.g., 96 bits for EPC)
Georg-August University Göttingen
Privacy Protection
16
Georg-August University Göttingen
Privacy Protection
– privacy zone: all IDs starting with 1
bit
reader
17
00 01 10 11 000 010 100 110 001 011 101 111 privacy zone transfer to the privacy zone upon purchase
Georg-August University Göttingen
Privacy Protection
18
Georg-August University Göttingen
Privacy Protection
19
c c+1 c+2 c+3 … p0 p1 p2 p3 EK EK EK EK
Georg-August University Göttingen
Privacy Protection
20
s1 s2 s3 s4 … p1 p2 p3 p4 H H H H G G G G
Georg-August University Göttingen
Privacy Protection
below the already identified key previous-level key
21
reader k1 k11 k 111
R
try all these keys until one of them works k1, k11, k111 tag ID
tag
Georg-August University Göttingen
Privacy Protection
22
k1 k11 k 111 P 0 P1 P 2 P 3
Georg-August University Göttingen
Privacy Protection
23
k1 k11 k 111 P 0 P1 P 2 P 3
Georg-August University Göttingen
Privacy Protection
24
Georg-August University Göttingen
Privacy Protection
25
Georg-August University Göttingen
Privacy Protection
26
Georg-August University Göttingen
Privacy Protection
27
A, GPS position, speed, direction predicted position at the time of the next heart beat B, GPS position, speed, direction
Georg-August University Göttingen
Privacy Protection
28
Georg-August University Göttingen
Privacy Protection
29
Georg-August University Göttingen
Privacy Protection
30
dij(t) t
Georg-August University Göttingen
Privacy Protection
31
n1 n2 nk x1 x2 xk
t1 tk N1 N2 Nk X1 X2 Xk
Georg-August University Göttingen
Privacy Protection
32
where pij is a cell of the matrix P of size nxn, where n is the number of gates of the mix zone and dij(t) describes the probability distribution of the delay when crossing the mix zone from gate i to gate j , (i.e. dij(t) is the probability of having delay t for an object who enters at gate i And exits from gate j).
Georg-August University Göttingen
Privacy Protection
33