Privacy Analysis of User Association Logs in a Large-scale Wireless LAN

被引:0
作者
Tan, Keren [1 ]
Yan, Guanhua [2 ]
Yeo, Jihwang [1 ]
Kotz, David [1 ]
机构
[1] Dartmouth Coll, ISTS, Hanover, NH 03755 USA
[2] Los Alamos Natl Lab, CCS 3, Los Alamos, NM USA
来源
2011 PROCEEDINGS IEEE INFOCOM | 2011年
基金
美国国家科学基金会;
关键词
MOBILITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User association logs play an important role in wireless network research. One concern of sharing such logs with other researchers, however, is that they pose potential privacy risks for the network users. Today, the common practice in sanitizing these logs before releasing them to the public is to anonymize users' sensitive information, such as their devices' MAC addresses and their exact association locations. In this work, we aim to study whether such sanitization measures are sufficient to protect user privacy. By simulating an adversary's role, we propose a novel type of correlation attack in which the adversary uses the anonymized association log to build signatures against each user, and when combined with auxiliary information, such signatures can help to identify users within the anonymized log. Using a user association log that contains more than four thousand users and millions of association records, we demonstrate that this attack technique, under certain circumstances, is able to pinpoint the victim's identity exactly with a probability as high as 70%, or narrow it down to a set of 20 candidates with a probability close to 100%. We further evaluate the effectiveness of standard anonymization techniques, including generalization and perturbation, in mitigating correlation attacks; our experimental results reveal only limited success of these methods, suggesting that more thorough treatment is needed when anonymizing wireless user association logs before public release.
引用
收藏
页码:31 / 35
页数:5
相关论文
共 19 条
  • [1] Bauer K., 2008, P HOTPETS JUL
  • [2] Brekne T., 2005, P PET MAY
  • [3] Community Resource for Archiving Wireless Data At Dartmouth (CRAWDAD), 2011, TR2011679
  • [4] Coull S. E., 2007, P NDSS FEB
  • [5] Durbin R., 1998, Biological sequence analysis: probabilistic models of proteins and nucleic acids
  • [6] Franklin J., 2006, P USENIX SEC JUL
  • [7] Hsu W. J., 2007, P ACM MOBICOM SEP
  • [8] Periodic properties of user mobility and access-point popularity
    Kim, Minkyong
    Kotz, David
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2007, 11 (06) : 465 - 479
  • [9] Kudoh T., 2000, P CONLL LLL SEP
  • [10] Kumar U., 2009, P GLOBECOM NOV