Fingerprinting mobile user positions in sensor networks: attacks and countermeasures

We demonstrate that the network flux over the sensor network provides fingerprint information about the mobile users within the field. Such information is exoteric in the physical space and easy to access through passive sniffing. We present a theoretical model to abstract the network flux according...

Full description

Saved in:
Bibliographic Details
Main Authors: Li, Zhenjiang., Jiang, Jonathan Xiaoye., Guibas, Leonidas J.
Other Authors: School of Computer Engineering
Format: Article
Language:English
Published: 2013
Subjects:
Online Access:https://hdl.handle.net/10356/102510
http://hdl.handle.net/10220/16526
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-102510
record_format dspace
spelling sg-ntu-dr.10356-1025102020-05-28T07:17:44Z Fingerprinting mobile user positions in sensor networks: attacks and countermeasures Li, Zhenjiang. Jiang, Jonathan Xiaoye. Guibas, Leonidas J. School of Computer Engineering DRNTU::Engineering::Computer science and engineering::Computer systems organization::Special-purpose and application-based systems We demonstrate that the network flux over the sensor network provides fingerprint information about the mobile users within the field. Such information is exoteric in the physical space and easy to access through passive sniffing. We present a theoretical model to abstract the network flux according to the statuses of mobile users. We fit the theoretical model with the network flux measurements through Nonlinear Least Squares (NLS) and develop an algorithm that iteratively approaches the NLS solution by Sequential Monte Carlo Estimation. With sparse measurements of the flux information at individual sensor nodes, we show that it is easy to identify the mobile users within the network and instantly track their movements without breaking into the details of the communicational packets. Our study indicates that most of existing systems are vulnerable to such attack against the privacy of mobile users. We further propose a set of countermeasures that redistribute and reshape the network traffic to preserve the location privacy of mobile users. With a trace driven simulation, we demonstrate the substantial threats of the attacks and the effectiveness of the proposed countermeasures. 2013-10-16T05:15:29Z 2019-12-06T20:56:08Z 2013-10-16T05:15:29Z 2019-12-06T20:56:08Z 2012 2012 Journal Article Li, Z. J., Jiang, J. X. Y., & Guibas, L. J. (2012). Fingerprinting mobile user positions in sensor networks: attacks and countermeasures. IEEE transactions on parallel and distributed systems, 23(4), 676-683. https://hdl.handle.net/10356/102510 http://hdl.handle.net/10220/16526 10.1109/TPDS.2011.213 en IEEE transactions on parallel and distributed systems
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Computer systems organization::Special-purpose and application-based systems
spellingShingle DRNTU::Engineering::Computer science and engineering::Computer systems organization::Special-purpose and application-based systems
Li, Zhenjiang.
Jiang, Jonathan Xiaoye.
Guibas, Leonidas J.
Fingerprinting mobile user positions in sensor networks: attacks and countermeasures
description We demonstrate that the network flux over the sensor network provides fingerprint information about the mobile users within the field. Such information is exoteric in the physical space and easy to access through passive sniffing. We present a theoretical model to abstract the network flux according to the statuses of mobile users. We fit the theoretical model with the network flux measurements through Nonlinear Least Squares (NLS) and develop an algorithm that iteratively approaches the NLS solution by Sequential Monte Carlo Estimation. With sparse measurements of the flux information at individual sensor nodes, we show that it is easy to identify the mobile users within the network and instantly track their movements without breaking into the details of the communicational packets. Our study indicates that most of existing systems are vulnerable to such attack against the privacy of mobile users. We further propose a set of countermeasures that redistribute and reshape the network traffic to preserve the location privacy of mobile users. With a trace driven simulation, we demonstrate the substantial threats of the attacks and the effectiveness of the proposed countermeasures.
author2 School of Computer Engineering
author_facet School of Computer Engineering
Li, Zhenjiang.
Jiang, Jonathan Xiaoye.
Guibas, Leonidas J.
format Article
author Li, Zhenjiang.
Jiang, Jonathan Xiaoye.
Guibas, Leonidas J.
author_sort Li, Zhenjiang.
title Fingerprinting mobile user positions in sensor networks: attacks and countermeasures
title_short Fingerprinting mobile user positions in sensor networks: attacks and countermeasures
title_full Fingerprinting mobile user positions in sensor networks: attacks and countermeasures
title_fullStr Fingerprinting mobile user positions in sensor networks: attacks and countermeasures
title_full_unstemmed Fingerprinting mobile user positions in sensor networks: attacks and countermeasures
title_sort fingerprinting mobile user positions in sensor networks: attacks and countermeasures
publishDate 2013
url https://hdl.handle.net/10356/102510
http://hdl.handle.net/10220/16526
_version_ 1681057098675257344