Abstract
This paper introduces a privacy-aware geographic routing protocol for Human Movement Networks (HumaNets). HumaNets are fully decentralized opportunistic and delay-tolerate networks composed of smartphone devices. Such networks allow participants to exchange messages phone-to-phone and have applications where traditional infrastructure is unavailable (e.g., during a disaster) and in totalitarian states where cellular network monitoring and censorship are employed. Our protocol leverages self-determined location profiles of smartphone operators’ movements as a predictor of future locations, enabling efficient geographic routing over metropolitan-wide areas. Since these profiles contain sensitive information about participants’ prior movements, our routing protocol is designed to minimize the exposure of sensitive information during a message exchange. We demonstrate via simulation over both synthetic and real-world trace data that our protocol is highly scalable, leaks little information, and balances privacy and efficiency: messages are 30% more likely to be delivered than similar random walk protocols, and the median latency is only 23-28% greater than epidemic protocols while requiring an order of magnitude fewer messages.
Keywords
- Message Exchange
- General Node
- Universal Mobile Telecommunication System
- Location Privacy
- Universal Mobile Telecommunication System
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download conference paper PDF
References
Aviv, A.J., Sherr, M., Blaze, M., Smith, J.M.: Evading Cellular Data Monitoring with Human Movement Networks. In: USENIX Workshop on Hot Topics in Security (HotSec) (August 2010)
Grossglauser, M., Vetterli, M.: Locating mobile nodes with ease: learning efficient routes from encounter histories alone. IEEE/ACM Trans. Netw. 14(3), 457–469 (2006)
Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket Switched Networks and Human Mobility in Conference Environments. In: ACM SIGCOMM Workshop on Delay-Tolerant Networking, WDTN (2005)
El Defrawy, K., Tsudik, G.: PRISM: Privacy-friendly Routing in Suspicious MANETs (and VANETs). In: International Conference on Network Protocols, ICNP (2008)
Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: An Efficient Secure Distributed Anonymous Routing Protocol for Mobile and Wireless Ad Hoc Networks. Computer Communications 28(10), 1193–1203 (2005)
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: ACM International Conference on Mobile Systems, Applications, and Services, MobiSys (2003)
Yao, A.C.: Protocols for Secure Computations. In: Symposium on Foundations of Computer Science, FOCS (1982)
Shikfa, A., Onen, M., Molva, R.: Privacy and Confidentiality in Context-Based and Epidemic Forwarding. Computer Communications 33(13), 1493–1504 (2010)
3rd Generation Partnership Project: Universal Mobile Telecommunications System (UMTS); Synchronization in (UTRAN) Stage 2. Technical Specification Group Services and System Aspects 3GPP TS25.402 v8.1.0, 3rd Generation Partnership Project (July 2009)
Mann, P.: Timing Synchronization for 3G Wireless. EE Times Asia (December 2004)
Bilton, N.: Tracking File Found in iPhones. The New York Times (April 20, 2011)
Lee, K., Hong, S., Kim, S.J., Rhee, I., Chong, S.: SLAW: A New Mobility Model for Human Walks. In: IEEE International Conference on Computer Communications, INFOCOM (2009)
Piorkowski, M., Sarafijanovoc-Djukic, N., Grossglauser, M.: A Parsimonious Model of Mobile Partitioned Networks with Clustering. In: Conference on COMmunication Systems and NETworkS, COMSNETS (2009)
Rhee, I., Shin, M., Hong, S., Lee, K., Chong, S.: On the Levy-Walk Nature of Human Mobility. In: IEEE International Conference on Computer Communications, INFOCOM (2008)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)
Lindgren, A., Doria, A., Schelén, O.: Probabilistic Routing in Intermittently Connected Networks. In: Dini, P., Lorenz, P., de Souza, J.N. (eds.) SAPIR 2004. LNCS, vol. 3126, pp. 239–254. Springer, Heidelberg (2004)
Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: On Non-cooperative Location Privacy: A Game-theoretic Analysis. In: ACM Conference on Computer and Communications Security, CCS (2009)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks. IEEE Transactions on Wireless Communications 5(9), 2376–2385 (2006)
Lu, X., Hui, P., Towsley, D., Pu, J., Xiong, Z.: Anti-localization Anonymous Routing for Delay Tolerant Network. Computer Networks 54(11), 1899–1910 (2010)
Husted, N., Myers, S.: Mobile Location Tracking in Metro Areas: Malnets and Others. In: ACM Conference on Computer and Communications Security, CCS (2010)
Sy, D., Chen, R., Bao, L.: ODAR: On-Demand Anonymous Routing in Ad Hoc Networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS (2006)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561, IETF (2003)
Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet. In: Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X) (October 2002)
Cheng, P., Weng, J., Tung, L., Lee, K., Gerla, M., Haerri, J.: GeoDTN+Nav: A Hybrid Geographic and Dtn Routing with Navigation Assistance in Urban Vehicular Networks. In: Symposium on Vehicular Computing Systems (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aviv, A.J., Sherr, M., Blaze, M., Smith, J.M. (2012). Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. In: Foresti, S., Yung, M., Martinelli, F. (eds) Computer Security – ESORICS 2012. ESORICS 2012. Lecture Notes in Computer Science, vol 7459. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33167-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-33167-1_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33166-4
Online ISBN: 978-3-642-33167-1
eBook Packages: Computer ScienceComputer Science (R0)
