opportunistic sensing:

17
Opportunistic Sensing: Security Challenges for the New Paradigm Michael Betancourt UCF - EEL 6788 Dr. Turgut Apu Kapadia MIT Lincoln Laboratory David Kotz Dartmouth College Nikos Triandopoulos Boston University

Upload: dasha

Post on 25-Feb-2016

67 views

Category:

Documents


2 download

DESCRIPTION

Opportunistic Sensing:. Apu Kapadia MIT Lincoln Laboratory. David Kotz Dartmouth College. Nikos Triandopoulos Boston University. Security Challenges for the New Paradigm. Michael Betancourt UCF - EEL 6788 Dr. Turgut. Overview. Introduction Urban Sensing Examples Applications Examples - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Opportunistic Sensing:

Opportunistic Sensing:Security Challenges for the New Paradigm

Michael BetancourtUCF - EEL 6788

Dr. Turgut

Apu KapadiaMIT Lincoln Laboratory

David KotzDartmouth College

Nikos TriandopoulosBoston University

Page 2: Opportunistic Sensing:

Overview

1. Introduction2. Urban Sensing Examples3. Applications Examples4. Security Challenges

     a. Confidentiality and Privacy Issues     b. Integrity Issues     c. Availability Issues     d. Challenges in Participatory Sensing5.  Conclusion

Page 3: Opportunistic Sensing:

Introduction

• Opportunistic people centric sensingo Small devices carried by people that sense informationo Direct or indirect relation to human activityo Environmental conditions

• Advantageso Leverage millions of deviceso No need to manually deployo Highly mobile and accessible

• Disadvantageso High risks in securityo Data integrity

Page 4: Opportunistic Sensing:

Urban Sensing ExamplesCarTel• Maps traffic patterns

BikeNet• Bicycle network infrastructure

CenceMe• User activity social networking CarTel Interface

BikeNet InterfaceCenceMe Interface

Page 5: Opportunistic Sensing:

Application Examples

• Urban data collection and processingo Large scale online data collectiono Being able to locate lost objectso Measuring the flow of bicycles in an urban center

• Environmental monitoring at the human levelo  Optimize energy usage for heating and coolingo  Personal Environmental Impact Report

Page 6: Opportunistic Sensing:

Security Challenges Overview

Challenges1. Context privacy– Anonymous tasking– Anonymous data reporting– Reliable data readings– Data authenticity– System integrity– Preventing data suppression– Participation– Fairness

Page 7: Opportunistic Sensing:

Confidentiality and Privacy IssuesContext PrivacyProblems• It is cumbersome for users to specify fine grain policies• Once the data is on the server who can access the h/w

Solutions• Virtual walls

o Group settings in categorieso Only information outside the wall can be seen

• Faceso Data changes according to who is viewing

• Future Researcho Determining what data can be used without being able to

infer other datao Grabbing only enough data for application purpose

without sacrificing usability

Page 8: Opportunistic Sensing:

Confidentiality and Privacy IssuesAnonymous TaskingProblems• By tasking specific users it is possible to gain personal

information• Determining reliability of participants could reduce

anonymitySolutions• Tasking Service

o Users download all tasks and selectively choose which to do

•  Attribute based authenticationo Users reveal only their attributes

Page 9: Opportunistic Sensing:

Confidentiality and Privacy IssuesMasking Users' Location• Blind Tasking• Transfer data to other nodes before uploading

o Overall routing structure must be protectedo Data needs to be encrypted to not be intercepted

• Hitchhikingo Only include characteristics about locationo Disadvantageous for limited popularity

• Introduce blur and random jittero Decreases accuracyo Amount of error needs to be constrained

•  Automatic Spatiotemporal Blurringo Generalize location through large geographical tileso Only upload data when enough sets are available

Page 10: Opportunistic Sensing:

Integrity IssuesReliable Data StorageProblems• Any participant with an appropriately configured device can

report falsified data• Devices are controlled by users• Incentives to mask private information

Solutions• Redundancy

o Task cloningo Fixed sensor ground truth

• Game Theoryo Reputation based system

Page 11: Opportunistic Sensing:

Integrity IssuesData AuthenticityProblems• Tampered data during transit• Current schemes correspond to fixed sensors where there is

a stable topological tree that spans sensorsSolutions• Cryptographoically enhanced error-correcting techniques

o Encrypted data that shows if it has been tampered with• Group signatures

o Allows multiple groups to use a single verifying signatureo Cracked signatures and be redistributed without taking

down the entire infrastructure

Page 12: Opportunistic Sensing:

Integrity IssuesSystem IntegrityProblems• Tasks need to have their source verified• Data received needs to be accurate and temporally relevant

Solutions• Task specific languages• Secure crytographic states

o Provide topological, temporal and user-related parameters to validate the information received.

Page 13: Opportunistic Sensing:

Availability IssuesPreventing Data Suppression• Denial of Service (DoS) due to devices ignoring task

requests• Network availability of devices• Data consuming applications could be killed by users• If users are unable to control the data access, they are less

likely to carry the device or permit tasks to be performed

Distributed DoS (DDoS) Attack

Page 14: Opportunistic Sensing:

Availability IssuesParticipationProblems• Users must have incentives to gain mass participation• Difficult to convince giving away private information with little

to no benefitSolutions• Convenience is key to appeal• Provide incentives that are compatible with users' needs and

interests• Privacy-aware hybrid payoff model

o Beneficial services vs privacy loss they experience

Page 15: Opportunistic Sensing:

Availability IssuesFairness

• People centric applications provide direct benefits to users

• Users will try to cheat to gain better service for themselveso Tasking others to complete

their taskso Not contributing back to the

community

BitTorrent Inc. Logo

Battlefield 2142 Cover Art

Page 16: Opportunistic Sensing:

Challenges in Participatory Sensing

• Users are tasked and have to manually partake in gathering information

• Additional security challenges arise as the user may leak more information than the task specifieso Taking a picture of a menu on a table

• Integrity becomes difficult as the user can fabricate sensor data or not provide the correct results of the tasko Ratings of a restaurant

4 Rivers Smokehouse Google User Review

Page 17: Opportunistic Sensing:

Conclusion

• Opportunistic people centric sensing• Most applications contain personal information• Securing that information becomes key

o Providing a service that people would want to participateo Keepings users data secure as to not be harmedo Even obscuring the data may not be enough for complete

anonymity• Participatory sensing needs additional security thought• Questions?