Privacy-Preserving Channel Access for Internet of Things

This paper presents a new way of providing privacy for Internet of Things (IoT) in a multi-trust-domain environment. The key idea is to develop a privacy-aware slotted channel access mechanism using which IoT nodes from multiple operators or trust domains can share wireless channel without mutually exposing their identities, thus alleviating threats from cross-trust-domain traffic analysis geared toward node-profiling, link layer topology estimation, node-tracking, and flow-tracking. The proposed scheme uses a novel zero-exposure slot allocation scheme in which packet transmission timing is the only information that is used for scheduling, collision detection, and collision resolution purposes. In addition to the proposed access scheme, this paper reports the design of a custom hardware unit for implementing the proposed protocol in a test-bed of sensors, emulating IoT networks. Presented results include functional validation and performance of the proposed channel access while preventing complete cross-trust-domain identity exposure.

[1]  Nitin H. Vaidya,et al.  A dynamic mix method for wireless ad hoc networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[2]  Matthew K. Wright,et al.  Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.

[3]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[4]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[5]  Shijue Zheng,et al.  A Scheduling Algorithm for TDMA-Based MAC Protocol in Wireless Sensor Networks , 2009, 2009 First International Workshop on Education Technology and Computer Science.

[6]  Lili Qiu,et al.  Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[7]  Xiang-Yang Li,et al.  Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.

[8]  Xuemin Shen,et al.  An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.

[9]  J. Degesys,et al.  DESYNC: Self-Organizing Desynchronization and TDMA on Wireless Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[10]  Nitin H. Vaidya,et al.  A mix route algorithm for mix-net in wireless mobile ad hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[11]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[12]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[13]  Yuguang Fang,et al.  MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.

[14]  Ramesh Govindan,et al.  Cloud-enabled privacy-preserving collaborative learning for mobile sensing , 2012, SenSys '12.

[15]  Injong Rhee,et al.  DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad Hoc Networks , 2009, IEEE Trans. Mob. Comput..

[16]  Fan Zhang,et al.  Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping , 2011, 2011 31st International Conference on Distributed Computing Systems.

[17]  Bruce Hajek,et al.  Hiding traffic flow in communication networks , 1992, MILCOM 92 Conference Record.

[18]  David E. Culler,et al.  Versatile low power media access for wireless sensor networks , 2004, SenSys '04.

[19]  Tao Wu,et al.  Toward In-Band Self-Organization in Energy-Efficient MAC Protocols for Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[20]  Christoph P. Mayer Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Security and Privacy Challenges in the Internet of Things , 2008 .

[21]  Renjie Huang,et al.  TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks , 2009, Pervasive Mob. Comput..

[22]  Anton Stiglic,et al.  Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.

[23]  Ness B. Shroff,et al.  Energy Efficient Sleep/Wake Scheduling for Multi-Hop Sensor Networks: Non-Convexity and Approximation Algorithm , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[24]  Xuemin Shen,et al.  An Efficient Privacy-Preserving Scheme for Wireless Link Layer Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[25]  Peter Friess,et al.  Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .

[26]  Subir Biswas,et al.  Distributed TDMA for privacy sensitive anonymous networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[27]  Jiming Chen,et al.  Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks , 2011, IEEE Transactions on Wireless Communications.

[28]  Kamin Whitehouse,et al.  Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.

[29]  S. Yousefi,et al.  Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.

[30]  Injong Rhee,et al.  Z-MAC: a hybrid MAC for wireless sensor networks , 2005, SenSys '05.

[31]  Francesca Cuomo,et al.  Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks , 2006, SenSys '06.

[32]  Vitaly Shmatikov,et al.  Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.

[33]  Srinivasan Seshan,et al.  Improving wireless privacy with an identifier-free link layer protocol , 2008, MobiSys '08.

[34]  Zhihui Chen,et al.  Self organization and energy efficient TDMA MAC protocol by wake up for wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[35]  Yunhao Liu,et al.  Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.