The Panda Hunter Game Jie Gao Stony Brook University - - PowerPoint PPT Presentation

the panda hunter game
SMART_READER_LITE
LIVE PREVIEW

The Panda Hunter Game Jie Gao Stony Brook University - - PowerPoint PPT Presentation

The Panda Hunter Game Jie Gao Stony Brook University http://www.cs.sunysb.edu/ jgao IMA Workshop on Modern Applications of Homology and Cohomology, October 28-Nov 1, 2013. The Panda Hunter Game Save-The-Panda Organization monitors a vast


slide-1
SLIDE 1

The Panda Hunter Game

Jie Gao

Stony Brook University http://www.cs.sunysb.edu/∼jgao IMA Workshop on Modern Applications of Homology and Cohomology, October 28-Nov 1, 2013.

slide-2
SLIDE 2

The Panda Hunter Game

Save-The-Panda Organization monitors a vast habitat for pandas, by using a network of panda detecting sensors.

2 of 1

slide-3
SLIDE 3

The Panda Hunter Game

Save-The-Panda Organization monitors a vast habitat for pandas, by using a network of panda detecting sensors.

A sensor closest to the panda (i.e., the source) reports

periodocially to the sink: (panda, position, time stamp).

2 of 1

slide-4
SLIDE 4

The Panda Hunter Game

Save-The-Panda Organization monitors a vast habitat for pandas, by using a network of panda detecting sensors.

A sensor closest to the panda (i.e., the source) reports

periodocially to the sink: (panda, position, time stamp).

The data reports are delivered using wireless communication

through a set of relay nodes.

2 of 1

slide-5
SLIDE 5

The Panda Hunter Game

Save-The-Panda Organization monitors a vast habitat for pandas, by using a network of panda detecting sensors.

A sensor closest to the panda (i.e., the source) reports

periodocially to the sink: (panda, position, time stamp).

The data reports are delivered using wireless communication

through a set of relay nodes.

The hunter trying to locate the panda discovers that such data

reports are extremely useful to him.

2 of 1

slide-6
SLIDE 6

The Panda Hunter Game

Save-The-Panda Organization monitors a vast habitat for pandas, by using a network of panda detecting sensors.

A sensor closest to the panda (i.e., the source) reports

periodocially to the sink: (panda, position, time stamp).

The data reports are delivered using wireless communication

through a set of relay nodes.

The hunter trying to locate the panda discovers that such data

reports are extremely useful to him.

The hunter tries to breach the privacy of sensor data. 2 of 1

slide-7
SLIDE 7

The Importance of Privacy

Many environment monitoring settings: Smart Homes, Smart

Buildings, etc.

3 of 1

slide-8
SLIDE 8

The Importance of Privacy

Many environment monitoring settings: Smart Homes, Smart

Buildings, etc.

Protect data privacy: sensor data and its contextual information

are observable by only those who are suppose to observe them.

3 of 1

slide-9
SLIDE 9

The Importance of Privacy

Many environment monitoring settings: Smart Homes, Smart

Buildings, etc.

Protect data privacy: sensor data and its contextual information

are observable by only those who are suppose to observe them.

Privacy threats: Content oriented privacy threats: leaking of message content to

adversaries;

3 of 1

slide-10
SLIDE 10

The Importance of Privacy

Many environment monitoring settings: Smart Homes, Smart

Buildings, etc.

Protect data privacy: sensor data and its contextual information

are observable by only those who are suppose to observe them.

Privacy threats: Content oriented privacy threats: leaking of message content to

adversaries;

Contextual privacy: leaking of context information related to the

measurement and transmission of the sensor data: e.g., location of data sources.

3 of 1

slide-11
SLIDE 11

Protect Privacy

Content oriented privacy threats:

Can be handled by encryptions. 4 of 1

slide-12
SLIDE 12

Protect Privacy

Content oriented privacy threats:

Can be handled by encryptions.

Contextual privacy:

Cannot be addressed by encryptions. 4 of 1

slide-13
SLIDE 13

Protect Privacy

Content oriented privacy threats:

Can be handled by encryptions.

Contextual privacy:

Cannot be addressed by encryptions. Can be infered by monitoring the wireless signal in the air! 4 of 1

slide-14
SLIDE 14

Protect Privacy

Content oriented privacy threats:

Can be handled by encryptions.

Contextual privacy:

Cannot be addressed by encryptions. Can be infered by monitoring the wireless signal in the air! Focus of this talk; 4 of 1

slide-15
SLIDE 15

Model of the Network

Sensors deployed inside a planar domain R. 5 of 1

slide-16
SLIDE 16

Model of the Network

Sensors deployed inside a planar domain R. A data source generates multiple packets to the sink. 5 of 1

slide-17
SLIDE 17

Model of the Network

Sensors deployed inside a planar domain R. A data source generates multiple packets to the sink. Messages are encrypted. Only the sink has the key to decipher the

message content.

5 of 1

slide-18
SLIDE 18

Model of the Network

Sensors deployed inside a planar domain R. A data source generates multiple packets to the sink. Messages are encrypted. Only the sink has the key to decipher the

message content.

Need to decide how the packets are routed to the sink without

leaking the location of source to adversaries.

5 of 1

slide-19
SLIDE 19

Model of the Hunter/Adversary

Follows standard philosophy in network security:

6 of 1

slide-20
SLIDE 20

Model of the Hunter/Adversary

Follows standard philosophy in network security:

Non-malicious: the adversary does not interfere with the normal

functioning of the network. – otherwise, can be detected and removed by intrusion detection schemes.

6 of 1

slide-21
SLIDE 21

Model of the Hunter/Adversary

Follows standard philosophy in network security:

Non-malicious: the adversary does not interfere with the normal

functioning of the network. – otherwise, can be detected and removed by intrusion detection schemes.

Informed: the hunter is aware of the routing scheme used in the

network.

6 of 1

slide-22
SLIDE 22

Model of the Hunter/Adversary

Follows standard philosophy in network security:

Non-malicious: the adversary does not interfere with the normal

functioning of the network. – otherwise, can be detected and removed by intrusion detection schemes.

Informed: the hunter is aware of the routing scheme used in the

network.

Device-rich: equipped with antennas, spectrum analyzers, for

capturing packets in the wireless channel.

6 of 1

slide-23
SLIDE 23

Model of the Hunter/Adversary

Follows standard philosophy in network security:

Non-malicious: the adversary does not interfere with the normal

functioning of the network. – otherwise, can be detected and removed by intrusion detection schemes.

Informed: the hunter is aware of the routing scheme used in the

network.

Device-rich: equipped with antennas, spectrum analyzers, for

capturing packets in the wireless channel.

Powerful: ample computation resources. 6 of 1

slide-24
SLIDE 24

History—Internet

Hide sender’s identity on the Internet: anonymouse routing.

7 of 1

slide-25
SLIDE 25

History—Internet

Hide sender’s identity on the Internet: anonymouse routing.

Chaum’s mixes: messages are encrypted and sent to a central

server called the anonymizer, who removes the sender’s ID.

7 of 1

slide-26
SLIDE 26

History—Internet

Hide sender’s identity on the Internet: anonymouse routing.

Chaum’s mixes: messages are encrypted and sent to a central

server called the anonymizer, who removes the sender’s ID.

Onion routing: Source identifies the entire path 1, 2, · · · , n to the destination and

encrypts the message in layers in the order of the nodes on the path. A1[A2[A3[· · · An[M]]]]

7 of 1

slide-27
SLIDE 27

History—Internet

Hide sender’s identity on the Internet: anonymouse routing.

Chaum’s mixes: messages are encrypted and sent to a central

server called the anonymizer, who removes the sender’s ID.

Onion routing: Source identifies the entire path 1, 2, · · · , n to the destination and

encrypts the message in layers in the order of the nodes on the path. A1[A2[A3[· · · An[M]]]]

Each node descrypts the message using its own key, reveals only the

next hop.

7 of 1

slide-28
SLIDE 28

History—Internet

Hide sender’s identity on the Internet: anonymouse routing.

Chaum’s mixes: messages are encrypted and sent to a central

server called the anonymizer, who removes the sender’s ID.

Onion routing: Source identifies the entire path 1, 2, · · · , n to the destination and

encrypts the message in layers in the order of the nodes on the path. A1[A2[A3[· · · An[M]]]]

Each node descrypts the message using its own key, reveals only the

next hop.

No one on the path knows where the message is from (except the

previous hop) and where it goes (except the next hop).

7 of 1

slide-29
SLIDE 29

History—Internet

Hide sender’s identity on the Internet: anonymouse routing.

Chaum’s mixes Onion routing

Not applicable for wireless networks. due to

Lack of direct connection to a central server. 8 of 1

slide-30
SLIDE 30

History—Internet

Hide sender’s identity on the Internet: anonymouse routing.

Chaum’s mixes Onion routing

Not applicable for wireless networks. due to

Lack of direct connection to a central server. Public key encryption is computationally too heavy for wireless

sensor nodes.

8 of 1

slide-31
SLIDE 31

History—Internet

Hide sender’s identity on the Internet: anonymouse routing.

Chaum’s mixes Onion routing

Not applicable for wireless networks. due to

Lack of direct connection to a central server. Public key encryption is computationally too heavy for wireless

sensor nodes.

The open nature of wireless medium makes it suspectible to traffic

analysis attack.

8 of 1

slide-32
SLIDE 32

History—Wireless Sensor Network

[ICDCS’05] by Kamat et al—“Enhancing Source-Location Privacy in Sensor Network Routing”.

9 of 1

slide-33
SLIDE 33

History—Wireless Sensor Network

[ICDCS’05] by Kamat et al—“Enhancing Source-Location Privacy in Sensor Network Routing”.

Single-path routing (shortest-path, trajectory-based, directed

diffusion, etc.).

9 of 1

slide-34
SLIDE 34

History—Wireless Sensor Network

[ICDCS’05] by Kamat et al—“Enhancing Source-Location Privacy in Sensor Network Routing”.

Single-path routing (shortest-path, trajectory-based, directed

diffusion, etc.).

Flooding-based routing (including probabilistic flooding). 9 of 1

slide-35
SLIDE 35

History—Wireless Sensor Network

[ICDCS’05] by Kamat et al—“Enhancing Source-Location Privacy in Sensor Network Routing”.

Single-path routing (shortest-path, trajectory-based, directed

diffusion, etc.).

Flooding-based routing (including probabilistic flooding). All of these fail—hunter sits near the sink; upon hearing a

message, moves to the sender.

9 of 1

slide-36
SLIDE 36

History—Wireless Sensor Network

[ICDCS’05] by Kamat et al—“Enhancing Source-Location Privacy in Sensor Network Routing”.

Single-path routing (shortest-path, trajectory-based, directed

diffusion, etc.).

Flooding-based routing (including probabilistic flooding). All of these fail—hunter sits near the sink; upon hearing a

message, moves to the sender. The solution proposed: phantom routing

Send the message on a random walk until it gets far away from the

source.

Once far away, send the message to the sink. 9 of 1

slide-37
SLIDE 37

Review of Random Walks on a Graph G

A message at node u moves to a neighbor v with probability puv = 1/d(u) d(u) is the degree of u.

v puv = 1.

10 of 1

slide-38
SLIDE 38

Review of Random Walks on a Graph G

A message at node u moves to a neighbor v with probability puv = 1/d(u) d(u) is the degree of u.

v puv = 1.

Markov chain; 10 of 1

slide-39
SLIDE 39

Review of Random Walks on a Graph G

A message at node u moves to a neighbor v with probability puv = 1/d(u) d(u) is the degree of u.

v puv = 1.

Markov chain; Converges to a stationary distribution on vertices of G, if G is

non-bipartite.

10 of 1

slide-40
SLIDE 40

Review of Random Walks on a Graph G

A message at node u moves to a neighbor v with probability puv = 1/d(u) d(u) is the degree of u.

v puv = 1.

Markov chain; Converges to a stationary distribution on vertices of G, if G is

non-bipartite.

Mixing rate: the number of steps for the random walk to converge

to its limiting distribution.

10 of 1

slide-41
SLIDE 41

Review of Random Walks on a Graph G

A message at node u moves to a neighbor v with probability puv = 1/d(u) d(u) is the degree of u.

v puv = 1.

Markov chain; Converges to a stationary distribution on vertices of G, if G is

non-bipartite.

Mixing rate: the number of steps for the random walk to converge

to its limiting distribution.

Cover time: the expected number of steps to visit every node. 10 of 1

slide-42
SLIDE 42

Random Walks on a Geometric Random Graph

Geometric Random Graph: place n nodes uniformly randomly inside a unit square and connect two nodes within Euclidean distance r.

11 of 1

slide-43
SLIDE 43

Random Walks on a Geometric Random Graph

Geometric Random Graph: place n nodes uniformly randomly inside a unit square and connect two nodes within Euclidean distance r.

r ≥ α ·

  • log n/n, for a constant α: the graph is connected with

high probability.

Mixing rate: Θ(log n/r2) = Θ(n) w.h.p. [BGPS05]. 11 of 1

slide-44
SLIDE 44

Random Walks on a Geometric Random Graph

Geometric Random Graph: place n nodes uniformly randomly inside a unit square and connect two nodes within Euclidean distance r.

r ≥ α ·

  • log n/n, for a constant α: the graph is connected with

high probability.

Mixing rate: Θ(log n/r2) = Θ(n) w.h.p. [BGPS05]. Cover time: Θ(n log n) w.h.p. [CF09]. → A random walk of length

Θ(n log n) can deliver the message to the sink w.h.p.

11 of 1

slide-45
SLIDE 45

Random Walks on a Geometric Random Graph

Geometric Random Graph: place n nodes uniformly randomly inside a unit square and connect two nodes within Euclidean distance r.

r ≥ α ·

  • log n/n, for a constant α: the graph is connected with

high probability.

Mixing rate: Θ(log n/r2) = Θ(n) w.h.p. [BGPS05]. Cover time: Θ(n log n) w.h.p. [CF09]. → A random walk of length

Θ(n log n) can deliver the message to the sink w.h.p. Sink is not identifiable.

11 of 1

slide-46
SLIDE 46

Random Walks on a Geometric Random Graph

Geometric Random Graph: place n nodes uniformly randomly inside a unit square and connect two nodes within Euclidean distance r.

r ≥ α ·

  • log n/n, for a constant α: the graph is connected with

high probability.

Mixing rate: Θ(log n/r2) = Θ(n) w.h.p. [BGPS05]. Cover time: Θ(n log n) w.h.p. [CF09]. → A random walk of length

Θ(n log n) can deliver the message to the sink w.h.p. Sink is not identifiable. Hunter is upset and decides to improve his skills.

11 of 1

slide-47
SLIDE 47

The Hunter Comes to IMA...

The adversary places perfectly synchronized monitoring stations on

the network boundary.

These monitoring stations listen to the traffic and record the

signals.

Does the adversary hear anything? 12 of 1

slide-48
SLIDE 48

The Hunter Comes to IMA...

The adversary places perfectly synchronized monitoring stations on

the network boundary.

These monitoring stations listen to the traffic and record the

signals.

Does the adversary hear anything?—Yes. By the Central Limit Theorem, a uniform random walk (equal

up-down-left-right probabilities) of length Θ(n log n) hits the boundary of the grid with probability at least 1 − 1/ log n.

12 of 1

slide-49
SLIDE 49

The Hunter’s Strategy

The hunter tries to infer the source location from the distribution

  • f packets first seen on the boundary.

13 of 1

slide-50
SLIDE 50

The Hunter’s Strategy

The hunter tries to infer the source location from the distribution

  • f packets first seen on the boundary.

Figure : The first-hit distribution of a random walk started at the green point.

This first hit distribution is called the harmonic measure. 13 of 1

slide-51
SLIDE 51

Definition of Harmonic Measure

Notation:

Let R be any planar domain, with boundary ∂R. 14 of 1

slide-52
SLIDE 52

Definition of Harmonic Measure

Notation:

Let R be any planar domain, with boundary ∂R. Let X ⊂ ∂R be a portion of the boundary. 14 of 1

slide-53
SLIDE 53

Definition of Harmonic Measure

Notation:

Let R be any planar domain, with boundary ∂R. Let X ⊂ ∂R be a portion of the boundary. Let z be a point inside the domain (z ∈ R). 14 of 1

slide-54
SLIDE 54

Definition of Harmonic Measure

Notation:

Let R be any planar domain, with boundary ∂R. Let X ⊂ ∂R be a portion of the boundary. Let z be a point inside the domain (z ∈ R).

Definition

The probability that a Brownian motion started at z inside R exits the boundary ∂R through X is denoted the harmonic measure ω(X, R, z).

14 of 1

slide-55
SLIDE 55

Example: Harmonic Measure for the Disk

For the unit disk D, ω(X, D, 0) = |X|

2π .

15 of 1

slide-56
SLIDE 56

Example: Harmonic Measure for the Disk

For the unit disk D, ω(X, D, 0) = |X|

2π .

For a point x not equal to the origin, 15 of 1

slide-57
SLIDE 57

Example: Harmonic Measure for the Disk

For the unit disk D, ω(X, D, 0) = |X|

2π .

For a point x not equal to the origin,

apply the M¨

  • bius transformation

f (z) = z − x 1 − ¯ xz maps x to 0.

One can verify that

ω(X, D, z) = ω(f (X), D, 0) = |f (X)|

2π .

15 of 1

slide-58
SLIDE 58

Example: Harmonic Measure for the Disk

For the unit disk D, ω(X, D, 0) = |X|

2π .

For a point x not equal to the origin,

apply the M¨

  • bius transformation

f (z) = z − x 1 − ¯ xz maps x to 0.

One can verify that

ω(X, D, z) = ω(f (X), D, 0) = |f (X)|

2π .

What about a non-disk domain?

  • x

y po 2π y px 2π

15 of 1

slide-59
SLIDE 59

Conformal Maps

Definition

Maps that preserve angles. Maps differentiable in the complex sense.

Theorem (Riemann Mapping Theorem)

Any simply connected domain can be mapped conformally to the unit disk.

16 of 1

slide-60
SLIDE 60

Conformal Maps and Harmonic Measure

Conformal maps preserve harmonic measure [Lawler05].

17 of 1

slide-61
SLIDE 61

Conformal Maps and Harmonic Measure

Conformal maps preserve harmonic measure [Lawler05].

f is a conformal map between R and R′,

ω(X, R, x) = ω(f (X), R′, f (x)).

f R R f(a) f(b) f(x) x a b

17 of 1

slide-62
SLIDE 62

Example

Mapping a simply connected L-shaped domain to the unit disk conformally preserves the distribution of red points on the boundary.

18 of 1

slide-63
SLIDE 63

Hunter’s Attack: Single Source

Hunter gathers the fraction of total messages, dωz that first arrive

at each monitoring station z.

19 of 1

slide-64
SLIDE 64

Hunter’s Attack: Single Source

Hunter gathers the fraction of total messages, dωz that first arrive

at each monitoring station z.

This observed distribution is a Monte Carlo approximation to the

harmonic measure ω(X, R, z0), when a random walk is started at the (unknown) source z0.

19 of 1

slide-65
SLIDE 65

Hunter’s Attack: Single Source

Hunter gathers the fraction of total messages, dωz that first arrive

at each monitoring station z.

This observed distribution is a Monte Carlo approximation to the

harmonic measure ω(X, R, z0), when a random walk is started at the (unknown) source z0.

Problem: Infer z0 from ω(X, R, z0). 19 of 1

slide-66
SLIDE 66

Hunter’s Attack: Single Source

Hunter gathers the fraction of total messages, dωz that first arrive

at each monitoring station z.

This observed distribution is a Monte Carlo approximation to the

harmonic measure ω(X, R, z0), when a random walk is started at the (unknown) source z0.

Problem: Infer z0 from ω(X, R, z0). Solution: The expected exit-position is in fact, the location of the

source, i.e., Source =

  • z∈∂R

zdωz.

19 of 1

slide-67
SLIDE 67

Hunter’s Attack: Single Source

Hunter gathers the fraction of total messages, dωz that first arrive

at each monitoring station z.

This observed distribution is a Monte Carlo approximation to the

harmonic measure ω(X, R, z0), when a random walk is started at the (unknown) source z0.

Problem: Infer z0 from ω(X, R, z0). Solution: The expected exit-position is in fact, the location of the

source, i.e., Source =

  • z∈∂R

zdωz.

Why? 19 of 1

slide-68
SLIDE 68

Harmonic Function

A function h(x, y) is harmonic if ∂2h

∂x2 + ∂2h ∂y2 = 0.

20 of 1

slide-69
SLIDE 69

Harmonic Function

A function h(x, y) is harmonic if ∂2h

∂x2 + ∂2h ∂y2 = 0.

Mean Value property: The value of h at z0 = (x0, y0) equals the

average of the values of the points z = (x, y) on a unit circle ∂D around z0, i.e. h(z0) = 1 2π

  • ∂D

h(z0 + eiθ)dθ

20 of 1

slide-70
SLIDE 70

Harmonic Function

A function h(x, y) is harmonic if ∂2h

∂x2 + ∂2h ∂y2 = 0.

Mean Value property: The value of h at z0 = (x0, y0) equals the

average of the values of the points z = (x, y) on a unit circle ∂D around z0, i.e. h(z0) = 1 2π

  • ∂D

h(z0 + eiθ)dθ

The position function h(z0) = z0 is harmonic on R. 20 of 1

slide-71
SLIDE 71

Harmonic Function

A function h(x, y) is harmonic if ∂2h

∂x2 + ∂2h ∂y2 = 0.

Mean Value property: The value of h at z0 = (x0, y0) equals the

average of the values of the points z = (x, y) on a unit circle ∂D around z0, i.e. h(z0) = 1 2π

  • ∂D

h(z0 + eiθ)dθ

The position function h(z0) = z0 is harmonic on R. A conformal function f maps the unit disk D to the domain R

such that f (0) = z0. z0 = f (0) = 1 2π

  • ∂D

f (eiθ))dθ =

  • z∈∂R

zdωz

20 of 1

slide-72
SLIDE 72

Discrete Setting

Σ: a triangulated surface.

21 of 1

slide-73
SLIDE 73

Discrete Setting

Σ: a triangulated surface.

Cotangent edge weight: wij = 1

2(cot θk + cot θℓ), where θk and θℓ

are angles opposite to edge ij in the two triangles adjacent to ij.

21 of 1

slide-74
SLIDE 74

Discrete Setting

Σ: a triangulated surface.

Cotangent edge weight: wij = 1

2(cot θk + cot θℓ), where θk and θℓ

are angles opposite to edge ij in the two triangles adjacent to ij.

Random walk: Prob{vj|vi} = wij/

k wik.

21 of 1

slide-75
SLIDE 75

Discrete Setting

Σ: a triangulated surface.

Cotangent edge weight: wij = 1

2(cot θk + cot θℓ), where θk and θℓ

are angles opposite to edge ij in the two triangles adjacent to ij.

Random walk: Prob{vj|vi} = wij/

k wik.

Discrete harmonic measure:

ωk(vi) = Prob{Exits at vk|Starts at vi}.

21 of 1

slide-76
SLIDE 76

Discrete Setting

Σ: a triangulated surface.

Cotangent edge weight: wij = 1

2(cot θk + cot θℓ), where θk and θℓ

are angles opposite to edge ij in the two triangles adjacent to ij.

Random walk: Prob{vj|vi} = wij/

k wik.

Discrete harmonic measure:

ωk(vi) = Prob{Exits at vk|Starts at vi}.

Discrete Laplace operator: ∆f (vi) =

j wij(f (vj) − f (vi)).

21 of 1

slide-77
SLIDE 77

Discrete Setting

Σ: a triangulated surface.

Cotangent edge weight: wij = 1

2(cot θk + cot θℓ), where θk and θℓ

are angles opposite to edge ij in the two triangles adjacent to ij.

Random walk: Prob{vj|vi} = wij/

k wik.

Discrete harmonic measure:

ωk(vi) = Prob{Exits at vk|Starts at vi}.

Discrete Laplace operator: ∆f (vi) =

j wij(f (vj) − f (vi)).

Discrete Harmonic Function: ∆f = 0. 21 of 1

slide-78
SLIDE 78

Discrete Setting

Σ: a triangulated surface.

Cotangent edge weight: wij = 1

2(cot θk + cot θℓ), where θk and θℓ

are angles opposite to edge ij in the two triangles adjacent to ij.

Random walk: Prob{vj|vi} = wij/

k wik.

Discrete harmonic measure:

ωk(vi) = Prob{Exits at vk|Starts at vi}.

Discrete Laplace operator: ∆f (vi) =

j wij(f (vj) − f (vi)).

Discrete Harmonic Function: ∆f = 0. Discrete harmonic measures are harmonic functions. 21 of 1

slide-79
SLIDE 79

Discrete Setting

Σ: a triangulated surface.

Cotangent edge weight: wij = 1

2(cot θk + cot θℓ), where θk and θℓ

are angles opposite to edge ij in the two triangles adjacent to ij.

Random walk: Prob{vj|vi} = wij/

k wik.

Discrete harmonic measure:

ωk(vi) = Prob{Exits at vk|Starts at vi}.

Discrete Laplace operator: ∆f (vi) =

j wij(f (vj) − f (vi)).

Discrete Harmonic Function: ∆f = 0. Discrete harmonic measures are harmonic functions. Expected position function is also harmonic.

(x0, y0) =

  • vk∈∂Σ

(xk, yk)ωk(v0)

21 of 1

slide-80
SLIDE 80

Hunter’s Attack: Multiple Sources

k ≥ 1 sources, k is known. Hunter cannot differentiate the

messages from difference sources.

22 of 1

slide-81
SLIDE 81

Hunter’s Attack: Multiple Sources

k ≥ 1 sources, k is known. Hunter cannot differentiate the

messages from difference sources.

Hunter will use Maximum-Likelihood Estimates. 22 of 1

slide-82
SLIDE 82

Hunter’s Attack: Multiple Sources

k ≥ 1 sources, k is known. Hunter cannot differentiate the

messages from difference sources.

Hunter will use Maximum-Likelihood Estimates. Step1: Computer the harmonic measure ω(X, R, z) for all z ∈ R. 22 of 1

slide-83
SLIDE 83

Hunter’s Attack: Multiple Sources

k ≥ 1 sources, k is known. Hunter cannot differentiate the

messages from difference sources.

Hunter will use Maximum-Likelihood Estimates. Step1: Computer the harmonic measure ω(X, R, z) for all z ∈ R. Step2: Maximize the likelihood for source positions at z1, z2, · · · , zk to

generate the observed first hit distribution on ∂R.

22 of 1

slide-84
SLIDE 84

Hunter’s Attack: Multiple Sources

k ≥ 1 sources, k is known. Hunter cannot differentiate the

messages from difference sources.

Hunter will use Maximum-Likelihood Estimates. Step1: Computer the harmonic measure ω(X, R, z) for all z ∈ R. Step2: Maximize the likelihood for source positions at z1, z2, · · · , zk to

generate the observed first hit distribution on ∂R.

For Step1 Method1: Use Riemann Mapping from unit disk to R. 22 of 1

slide-85
SLIDE 85

Hunter’s Attack: Multiple Sources

k ≥ 1 sources, k is known. Hunter cannot differentiate the

messages from difference sources.

Hunter will use Maximum-Likelihood Estimates. Step1: Computer the harmonic measure ω(X, R, z) for all z ∈ R. Step2: Maximize the likelihood for source positions at z1, z2, · · · , zk to

generate the observed first hit distribution on ∂R.

For Step1 Method1: Use Riemann Mapping from unit disk to R. Method2: (Symm’s Method) Discretize R into n segments and apply

n independent harmonic functions hi. Solve the linear system. hi(z0) =

  • z∈∂R

hi(z)dωz

22 of 1

slide-86
SLIDE 86

Dirichlet Problem

Find a harmonic function f that satisfies the given condition on

the boundary of R.

23 of 1

slide-87
SLIDE 87

Dirichlet Problem

Find a harmonic function f that satisfies the given condition on

the boundary of R.

The solution exists and is unique. 23 of 1

slide-88
SLIDE 88

Dirichlet Problem

Find a harmonic function f that satisfies the given condition on

the boundary of R.

The solution exists and is unique.

Implication:

23 of 1

slide-89
SLIDE 89

Dirichlet Problem

Find a harmonic function f that satisfies the given condition on

the boundary of R.

The solution exists and is unique.

Implication:

Given the harmonic measure on boundary, finding the harmonic

function which gives the the position of source: unique solution.

23 of 1

slide-90
SLIDE 90

Dirichlet Problem

Find a harmonic function f that satisfies the given condition on

the boundary of R.

The solution exists and is unique.

Implication:

Given the harmonic measure on boundary, finding the harmonic

function which gives the the position of source: unique solution.

The same applies for k sources. 23 of 1

slide-91
SLIDE 91

Hunter’s Attack: General cases

Using Maximum-Likelihood Estimates, the hunter can also locate:

Mobile Sources. Sources moving on a line, or a known trajectory

which can be described in terms of a few parameters.

24 of 1

slide-92
SLIDE 92

Hunter’s Attack: General cases

Using Maximum-Likelihood Estimates, the hunter can also locate:

Mobile Sources. Sources moving on a line, or a known trajectory

which can be described in terms of a few parameters.

Fake Sources. Short-lived—These messages do no hit the boundary, and so we are

not counting them in our analysis.

24 of 1

slide-93
SLIDE 93

Hunter’s Attack: General cases

Using Maximum-Likelihood Estimates, the hunter can also locate:

Mobile Sources. Sources moving on a line, or a known trajectory

which can be described in terms of a few parameters.

Fake Sources. Short-lived—These messages do no hit the boundary, and so we are

not counting them in our analysis.

Long-lived—Analyze the traffic as in multiple sources. Note that

long-lived fake sources are costly.

24 of 1

slide-94
SLIDE 94

Hunter’s Attack: General cases

Using Maximum-Likelihood Estimates, the hunter can also locate:

Mobile Sources. Sources moving on a line, or a known trajectory

which can be described in terms of a few parameters.

Fake Sources. Short-lived—These messages do no hit the boundary, and so we are

not counting them in our analysis.

Long-lived—Analyze the traffic as in multiple sources. Note that

long-lived fake sources are costly.

Non-simple domain: 24 of 1

slide-95
SLIDE 95

Hunter’s Attack: General cases

Using Maximum-Likelihood Estimates, the hunter can also locate:

Mobile Sources. Sources moving on a line, or a known trajectory

which can be described in terms of a few parameters.

Fake Sources. Short-lived—These messages do no hit the boundary, and so we are

not counting them in our analysis.

Long-lived—Analyze the traffic as in multiple sources. Note that

long-lived fake sources are costly.

Non-simple domain: Monitors the interior boundaries. Apply the same integration. 24 of 1

slide-96
SLIDE 96

Hunter’s Attack: General cases

Using Maximum-Likelihood Estimates, the hunter can also locate:

Mobile Sources. Sources moving on a line, or a known trajectory

which can be described in terms of a few parameters.

Fake Sources. Short-lived—These messages do no hit the boundary, and so we are

not counting them in our analysis.

Long-lived—Analyze the traffic as in multiple sources. Note that

long-lived fake sources are costly.

Non-simple domain: Monitors the interior boundaries. Apply the same integration. Or, use MLE. 24 of 1

slide-97
SLIDE 97

Discussion—Sequel Ideas

Non-Uniform/Biased Random Walk? 25 of 1

slide-98
SLIDE 98

Discussion—Sequel Ideas

Non-Uniform/Biased Random Walk?—Harmonic Measure

changes, but since the hunter is informed (i.e., knows the bias), the same analysis can be performed.

25 of 1

slide-99
SLIDE 99

Discussion—Sequel Ideas

Non-Uniform/Biased Random Walk?—Harmonic Measure

changes, but since the hunter is informed (i.e., knows the bias), the same analysis can be performed.

Randomize the transition probability? 25 of 1

slide-100
SLIDE 100

Discussion—Sequel Ideas

Non-Uniform/Biased Random Walk?—Harmonic Measure

changes, but since the hunter is informed (i.e., knows the bias), the same analysis can be performed.

Randomize the transition probability?—This might work, but

then need to make sure that the resulting random walk is ergodic—covers everything eventually, and the stationary distribution is well behaved.

25 of 1

slide-101
SLIDE 101

Discussion—Sequel Ideas

Non-Uniform/Biased Random Walk?—Harmonic Measure

changes, but since the hunter is informed (i.e., knows the bias), the same analysis can be performed.

Randomize the transition probability?—This might work, but

then need to make sure that the resulting random walk is ergodic—covers everything eventually, and the stationary distribution is well behaved.

Take home message: The problem of privacy preserving routing is re-opened. 25 of 1

slide-102
SLIDE 102

Discussion—Sequel Ideas

Non-Uniform/Biased Random Walk?—Harmonic Measure

changes, but since the hunter is informed (i.e., knows the bias), the same analysis can be performed.

Randomize the transition probability?—This might work, but

then need to make sure that the resulting random walk is ergodic—covers everything eventually, and the stationary distribution is well behaved.

Take home message: The problem of privacy preserving routing is re-opened. When using random walks one should be aware of the traffic analysis

attack presented here.

25 of 1

slide-103
SLIDE 103

Discussion—Sequel Ideas

Non-Uniform/Biased Random Walk?—Harmonic Measure

changes, but since the hunter is informed (i.e., knows the bias), the same analysis can be performed.

Randomize the transition probability?—This might work, but

then need to make sure that the resulting random walk is ergodic—covers everything eventually, and the stationary distribution is well behaved.

Take home message: The problem of privacy preserving routing is re-opened. When using random walks one should be aware of the traffic analysis

attack presented here.

25 of 1

slide-104
SLIDE 104

Acknowledgement

Joint work with Rui Shi, Mayank Goswami, Xianfeng David Gu,

Stony Brook University.

Is Random Walk Truly Memoryless - Traffic Analysis and Source

Location Privacy Under Random Walks, Proc. of the 32nd Annual IEEE Conference on Computer Communications (INFOCOM’13), April, 2013.

Questions and comments? 26 of 1