skip to main content
10.1145/1378600.1378607acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Improving wireless privacy with an identifier-free link layer protocol

Published: 17 June 2008 Publication History

Abstract

We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers such as MAC addresses, the contents of management messages, and other protocol fields that the existing 802.11 protocol relies on to be sent in the clear. By obscuring these fields, we greatly increase the difficulty of identifying or profiling users from their transmissions in ways that are otherwise straightforward. Our design, called SlyFi, is nearly as efficient as existing schemes such as WPA for discovery, link setup, and data delivery despite its heightened protections; transmission requires only symmetric key encryption and reception requires a table lookup followed by symmetric key decryption. Experiments using our implementation on Atheros 802.11 drivers show that SlyFi can discover and associate with networks faster than 802.11 using WPA-PSK. The overhead SlyFi introduces in packet delivery is only slightly higher than that added by WPA-CCMP encryption (10% vs. 3% decrease in throughput).

References

[1]
Hostap driver. http://hostap.epitest.fi/.]]
[2]
libgcrypt. http://directory.fsf.org/project/libgcrypt/.]]
[3]
Madwifi driver. http://madwifi.org/.]]
[4]
roofnet. http://pdos.csail.mit.edu/roofnet/doku.php.]]
[5]
Soekris engineering. http://www.soekris.com/net4801.htm.]]
[6]
Ieee 802.11i-2004 amendment to ieee std 802.11, 2004. standards.ieee.org/getieee802/download/802.11i-2004.pdf.]]
[7]
Abadi, M., and Fournet, C. Private authentication. Theor. Comput. Sci. 322, 3 (2004), 427--476.]]
[8]
Armknecht, F., Girão, J., Matos, A., and Aguiar, R. L. Who said that? privacy at link layer. In INFOCOM (2007), IEEE.]]
[9]
Bellare, M., Boldyreva, A., Desai, A., and Pointcheval, D. Key-privacy in public-key encryption. In ASIACRYPT (2001).]]
[10]
Bellare, M., and Yee, B. Forward-security in private-key cryptography. Topics in Cryptology - CT-RSA'03, LNCS 2612 (2003).]]
[11]
Chandra, R., Mahajan, R., Padmanabhan, V., and Zhang, M. CRAWDAD data set microsoft/osdi2006 (v. 2007-05-23). http://crawdad.cs.dartmouth.edu.]]
[12]
Cheng, Y.-C., Bellardo, J., Benko;, P., Snoeren, A. C., Voelker, G. M., and Savage, S. Jigsaw: solving the puzzle of enterprise 802.11 analysis. SIGCOMM CCR (2006).]]
[13]
Cox, L. P., Dalton, A., and Marupadi, V. SmokeScreen: Flexible privacy controls for presence-sharing. In MobiSys (2007).]]
[14]
Dingledine, R., Mathewson, N., and Syverson, P. Tor: The second-generation onion router. In USENIX Security (2004).]]
[15]
Greenstein, B., Gummadi, R., Pang, J., Chen, M. Y., Kohno, T., Seshan, S., and Wetherall, D. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in an Era of Wireless Devices. In HotOS XI (2007).]]
[16]
Gruteser, M., and Grunwald, D. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. ACM MONET 10 (2005).]]
[17]
Hu, Y.-C., and Wang, H. J. A framework for location privacy in wireless networks. In SIGCOMM Asia Workshop (April 2005).]]
[18]
Jiang, T., Wang, H., and Hu, Y.-C. Preserving location privacy in wireless LANs. In MobiSys (2007).]]
[19]
Juels, A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication 24, 2 (Feb. 2006).]]
[20]
Kohler, E., Morris, R., Chen, B., Jannotti, J., and Kaashoek, M. F. The click modular router. ACM Transactions on Computer Systems 18, 3 (August 2000), 263--297.]]
[21]
Pang, J., Greenstein, B., Gummadi, R., Seshan, S., and Wetherall, D. 802.11 user fingerprinting. In MobiCom (Sept. 2007).]]
[22]
Pang, J., Greenstein, B., McCoy, D., Seshan, S., and Wetherall, D. Tryst: The case for confidential service discovery. In HotNets (2007).]]
[23]
Patwari, N., and Kasera, S. K. Robust location distinction using temporal link signatures. In MobiCom (2007).]]
[24]
Reis, C., Mahajan, R., Rodrig, M., Wetherall, D., and Zahorjan, J. Measurement-based models of delivery and interference in static wireless networks. SIGCOMM CCR 36, 4 (2006).]]
[25]
Rodrig, M., Reis, C., Mahajan, R., Wetherall, D., Zahorjan, J., and Lazowska, E. CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17). http://crawdad.cs.dartmouth.edu.]]
[26]
Saponas, T. S., Lester, J., Hartung, C., Agarwal, S., and Kohno, T. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In USENIX Security (2007).]]
[27]
Singelée, D., and Preneel, B. Location privacy in wireless personal area networks. In WiSe (2006).]]
[28]
Song, D. X., Wagner, D., and Tian, X. Timing analysis of keystrokes and timing attacks on ssh. In USENIX Security (2001).]]
[29]
Song, J., Poovendran, R., Lee, J., and Iwata, T. The AES-CMAC algorithm. RFC 4493, June 2006.]]
[30]
Sun, Q., Simon, D. R., Wang, Y.-M., Russell, W., Padmanabhan, V. N., and Qiu, L. Statistical identification of encrypted web browsing traffic. In IEEE Security and Privacy (2002).]]
[31]
Suomalainen, J., Valkonen, J., and Asokan, N. Security associations in personal networks: A comparative analysis. Tech. Rep. NRC-TR-2007-004, Nokia Research Center, Jan. 2007.]]
[32]
Tao, P., Rudys, A., Ladd, A., and Wallach, D. Wireless LAN location sensing for security application. In WISE (2003).]]
[33]
Wright, C., Ballard, L., Monrose, F., and Masson, G. Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In USENIX Security (Aug. 2007).]]
[34]
Wright, C., Monrose, F., and Masson, G. On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research (Aug. 2006).]]

Cited By

View all

Index Terms

  1. Improving wireless privacy with an identifier-free link layer protocol

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        MobiSys '08: Proceedings of the 6th international conference on Mobile systems, applications, and services
        June 2008
        304 pages
        ISBN:9781605581392
        DOI:10.1145/1378600
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 17 June 2008

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. 802.11
        2. anonymity
        3. privacy
        4. wireless

        Qualifiers

        • Research-article

        Conference

        Mobisys08
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 274 of 1,679 submissions, 16%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)13
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 06 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media