Fingerprinting Mobile User Positions in Sensor Networks: Attacks and Countermeasures

We demonstrate that the network flux over the sensor network provides fingerprint information about the mobile users within the field. Such information is exoteric in the physical space and easy to access through passive sniffing. We present a theoretical model to abstract the network flux according to the statuses of mobile users. We fit the theoretical model with the network flux measurements through Nonlinear Least Squares (NLS) and develop an algorithm that iteratively approaches the NLS solution by Sequential Monte Carlo Estimation. With sparse measurements of the flux information at individual sensor nodes, we show that it is easy to identify the mobile users within the network and instantly track their movements without breaking into the details of the communicational packets. Our study indicates that most of existing systems are vulnerable to such attack against the privacy of mobile users. We further propose a set of countermeasures that redistribute and reshape the network traffic to preserve the location privacy of mobile users. With a trace driven simulation, we demonstrate the substantial threats of the attacks and the effectiveness of the proposed countermeasures.

[1]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[2]  Jie Gao,et al.  MAP: Medial axis based geometric routing in sensor networks , 2005, MobiCom '05.

[3]  Xenofon D. Koutsoukos,et al.  Tracking mobile nodes using RF Doppler shifts , 2007, SenSys '07.

[4]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[5]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[6]  Tristan Henderson,et al.  CRAWDAD trace set dartmouth/campus/snmp (v. 2004-11-09) , 2004 .

[7]  Leonidas J. Guibas,et al.  Fingerprinting Mobile User Positions in Sensor Networks , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[8]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[9]  D. D. Morrison Methods for nonlinear least squares problems and convergence proofs , 1960 .

[10]  Yunhao Liu,et al.  Sensor Network Navigation without Locations , 2009, INFOCOM.

[11]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[12]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[13]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[14]  Leonidas J. Guibas,et al.  Predictive QoS routing to mobile sinks in wireless sensor networks , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[15]  Kaj Madsen,et al.  Methods for Non-Linear Least Squares Problems (2nd ed.) , 2004 .

[16]  Roy H. Campbell,et al.  Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[17]  Yunhao Liu,et al.  LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[18]  Leonidas J. Guibas,et al.  Composable Information Gradients in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[19]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .