Practical privacy enhancing technologies for mobile systems

Loading...
Thumbnail Image

URL

Journal Title

Journal ISSN

Volume Title

Doctoral thesis (article-based)
Checking the digitized thesis and permission for publishing
Instructions for the author

Date

2009

Major/Subject

Mcode

Degree programme

Language

en

Pages

Verkkokirja (476 KB, 56 s.)

Series

TKK dissertations, 168

Abstract

Mobile computers and handheld devices can be used today to connect to services available on the Internet. One of the predominant technologies in this respect for wireless Internet connection is the IEEE 802.11 family of WLAN standards. In many countries, WLAN access can be considered ubiquitous; there is a hotspot available almost anywhere. Unfortunately, the convenience provided by wireless Internet access has many privacy tradeoffs that are not obvious to mobile computer users. In this thesis, we investigate the lack of privacy of mobile computer users, and propose practical enhancements to increase the privacy of these users. We show how explicit information related to the users' identity leaks on all layers of the protocol stack. Even before an IP address is configured, the mobile computer may have already leaked their affiliation and other details to the local network as the WLAN interface openly broadcasts the networks that the user has visited. Free services that require authentication or provide personalization, such as online social networks, instant messengers, or web stores, all leak the user's identity. All this information, and much more, is available to a local passive observer using a mobile computer. In addition to a systematic analysis of privacy leaks, we have proposed four complementary privacy protection mechanisms. The main design guidelines for the mechanisms have been deployability and the introduction of minimal changes to user experience. More specifically, we mitigate privacy problems introduced by the standard WLAN access point discovery by designing a privacy-preserving access-point discovery protocol, show how a mobility management protocol can be used to protect privacy, and how leaks on all layers of the stack can be reduced by network location awareness and protocol stack virtualization. These practical technologies can be used in designing a privacy-preserving mobile system or can be retrofitted to current systems.

Description

Keywords

privacy, mobile systems, IEEE 802.11, anonymity, wireless networks

Other note

Parts

  • [Publication 1]: Janne Lindqvist and Laura Takkinen. 2006. Privacy management for secure mobility. In: Ari Juels and Marianne Winslett (editors). Proceedings of the 5th ACM Workshop on Privacy in the Electronic Society (WPES 2006). Alexandria, Virginia, USA. 30 October 2006.
  • [Publication 2]: Tuomas Aura, Janne Lindqvist, Michael Roe, and Anish Mohammed. 2008. Chattering laptops. In: Nikita Borisov and Ian Goldberg (editors). Proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS 2008). Leuven, Belgium. 23-25 July 2008. Springer. Lecture Notes in Computer Science, volume 5134, pages 167-186. © 2008 by authors.
  • [Publication 3]: Janne Lindqvist and Juha-Matti Tapio. 2008. Protecting privacy with protocol stack virtualization. In: Vijay Atluri and Marianne Winslett (editors). Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society (WPES 2008). Alexandria, Virginia, USA. 27 October 2008.
  • [Publication 4]: Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, and Michael Roe. 2009. Privacy-preserving 802.11 access-point discovery. Cambridge, United Kingdom. Microsoft Research Technical Report, MSR-TR-2009-7. An abridged version of this article is available in: David Basin, Srdjan Capkun, and Wenke Lee (editors). Proceedings of the Second ACM Conference on Wireless Network Security (WiSec 2009). Zürich, Switzerland. 16-18 March 2009, pages 123-130. © 2009 by authors.

Citation