Location Privacy Protection using Physical Layer Cooperation

undefined
 
Presenter: Tam Vu
1
Joint work with
Sangho Oh
1
, Marco Gruteser
1
, Suman Banerjee
2
1
WINLAB, Rutgers University
2
Department of Computer Sciences, University of Wisconsin
 
9/6/2024
1
 
Phantom
:
 
Physical Layer Cooperation for
 
    Location Privacy Protection
Motivation
 
9/6/2024
2
 
s
1
 
s
2
 
s
3
 
Adversary Localizing and
Tracking System
 
Adversary Localization System
 
9/6/2024
3
 
1
 
2
 
x
 
 
1
 
2
 
y
 
 
u(1,1)
 
u(2,1)
 
u
A
 
s
1
 
s
2
 
s
3
 
v
2
 
u(1,2)
 
Alice
 
 
 
Eve
(Adversary
Localization
System)
 
 
 
 
AP
 
Localization algorithm: Radio fingerprinting technique
Compare the measured signal vector, 
r={r
1
,r
2
,r
3
}, 
with training data
measured at each reference point, 
u(x,y)
Select the best matching location for the target user’s location
9/6/2024
4
 
s
1
 
s
2
 
s
3
 
Adversary Localizing and
Tracking System
Existing solutions
 
Transmission power variation
Transmission frequency variation
 
∆P
 
∆P
 
∆P
9/6/2024
5
Existing solutions
Transmission power variation
Transmission frequency variation
Directional antennal
s
1
s
2
s
3
Adversary Localizing and 
Tracking System
Can we create the same effects without a cumbersome directional antennal ?
Phantom : Ghosts Creation
 
Cloning 
= With the help of  collaborators, transmitters create fake
locations with same identity as that of the ones being protected
Two synchronized signals from Alice and Bob are combined at
adversary sensors
Received signal vector , 
r={r
1
,r
2
,r
3
},  
is different from the signal
vector from Alice and Bob
Challenges
Collaborating partners must transmit the exact same bits using the
same transmission parameters (e.g. frequency, power, time...)
Synchronization
Dummy packet creation
 
Not
Alice
 
Alice
 
Bob
(Cooperator)
 
Eve
 
Pw
1
 
Pw
2
 
 Pr=Pw
1
+Pw
2
 
AP
9/6/2024
6
 
Coordination and dummy packet creation
 
Backend coordinator
Registration, authentication, association, coordination, shared key (
k
ab
)
distribution
Avoid peer-to-peer coordination
Explicit coordination may risk the location privacy of nodes
7
 
Ghost
 
BC
 
Cooperation for
Cloning
 
A
(Transmitter)
 
B
(Cooperator)
 
IP
 
k
ab
10101…
A
01101…
A
 
Alice
 
Bob
 
τ
i
 
Source
Address
 
Message
Payload
 
Dummy packet
for A’s ghost
10101…
A
 
 
Beacon from AP
 
Phantom Experiments
 
Demonstrate creating clones of nodes by
cooperative transmission
Use software defined radios (GNU
Radios)
Transmit 802.11g packets
Show the RSS change in adversary
sensors due to cooperative transmission
 
 
 
9/6/2024
8
 
Frequency Synchronization
 
Frequency synchronization
Manual configuration
Reduce ICI between the two signals
 
 
After
 
Before
 
Manual
calibration
 
9/6/2024
9
 
Time Synchronization
 
9/6/2024
10
 
Time synchronization
Coarse:
Use GPS in outdoors: ~500nsec
cheap GPS modules
Indoors: Use beacon from AP
Fine time offset (τ
off 
) adjustment
Caused by imperfect local oscillator
Measured by correlating the received
signal with preamble (known signal
pattern)
 
 
 
 
Cloning Experiments: Results (2)
 
After time/frequency synchronization
Pass the integrity check of the adversary
Measured RSS is the sum of two
received signal power
 
9/6/2024
11
 
ORBIT Experiment:
Location privacy protection performance measure
 
Experiment setup: ORBIT
Transmitter and cooperator
2 GNU Radios
Adversary
Nodes in ORBIT Grid
Cooperation power control
Change the location of the clone
Power configuration
Tx-1 power = k [dBm]
Tx-2 power = 20-k [dBm]
 
9/6/2024
12
 
Conclusion
 
9/6/2024
13
 
Phantom enables users to dynamically create confusion about
their location by creating additional ghost transmission from
different locations with the same identity
 
We implemented a proof of concept using software defined
radios as transmitters and explored issues related to
frequency and time synchronization of such transmitters.
 
We demonstrated the feasibility of inducing localization
errors through cooperative transmissions.
Slide Note
Embed
Share

The research presents PhantomPhantom, a system for protecting location privacy by leveraging physical layer cooperation. It explores the challenges of adversary localization systems and proposes solutions such as transmission power and frequency variations. The concept of creating ghost locations and coordination through dummy packet creation is discussed to prevent tracking and localization. Overall, the study aims to enhance privacy protection in location-based systems.

  • Location Privacy
  • Physical Layer Cooperation
  • Adversary Localization
  • Transmission Variations
  • Ghost Creation

Uploaded on Sep 06, 2024 | 1 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Phantom Phantom: Physical Layer Cooperation for Location Privacy Protection Presenter: Tam Vu1 Joint work with Sangho Oh1, Marco Gruteser1, Suman Banerjee2 1WINLAB, Rutgers University 2Department of Computer Sciences, University of Wisconsin 9/6/2024 1

  2. Motivation Adversary Localizing and Tracking System s1 s3 s2 9/6/2024 2

  3. Adversary Localization System Localization algorithm: Radio fingerprinting technique Compare the measured signal vector, r={r1,r2,r3}, with training data measured at each reference point, u(x,y) Select the best matching location for the target user s location AP s2 s1 x 2 1 Eve (Adversary Localization System) . u(1,1) . u(2,1) . . 1 v2 . u(1,2) . . . 2 uA . . . . y Alice . . . . s3 9/6/2024 3

  4. Existing solutions Transmission power variation Transmission frequency variation Adversary Localizing and Tracking System s1 s3 s2 9/6/2024 4

  5. Existing solutions Transmission power variation Transmission frequency variation Directional antennal Adversary Localizing and Tracking System s1 s3 s2 Can we create the same effects without a cumbersome directional antennal ? 9/6/2024 5

  6. Phantom : Ghosts Creation Cloning = With the help of collaborators, transmitters create fake locations with same identity as that of the ones being protected Two synchronized signals from Alice and Bob are combined at adversary sensors Received signal vector , r={r1,r2,r3}, is different from the signal vector from Alice and Bob Challenges Collaborating partners must transmit the exact same bits using the same transmission parameters (e.g. frequency, power, time...) Synchronization Dummy packet creation Pw2 Alice AP Pw1 Eve Pr=Pw1+Pw2 Not Alice Bob (Cooperator) 9/6/2024 6

  7. Coordination and dummy packet creation Backend coordinator Registration, authentication, association, coordination, shared key (kab) distribution Avoid peer-to-peer coordination Explicit coordination may risk the location privacy of nodes Ghost BC IP Cooperation for Cloning kab Dummy packet for A s ghost Message Payload Source Address A (Transmitter) B (Cooperator) Alice A A 01101 10101 i A 10101 Beacon from AP Bob 7

  8. Phantom Experiments Demonstrate creating clones of nodes by cooperative transmission Use software defined radios (GNU Radios) Transmit 802.11g packets Show the RSS change in adversary sensors due to cooperative transmission 9/6/2024 8

  9. Frequency Synchronization Frequency synchronization Manual configuration Reduce ICI between the two signals Before Manual calibration After 9/6/2024 9

  10. Time Synchronization Time synchronization Coarse: Use GPS in outdoors: ~500nsec cheap GPS modules Indoors: Use beacon from AP Fine time offset ( off ) adjustment Caused by imperfect local oscillator Measured by correlating the received signal with preamble (known signal pattern) Fine Time offset adjustment Before After 9/6/2024 10

  11. Cloning Experiments: Results (2) After time/frequency synchronization Pass the integrity check of the adversary Measured RSS is the sum of two received signal power 9/6/2024 11

  12. ORBIT Experiment: Location privacy protection performance measure Experiment setup: ORBIT Transmitter and cooperator 2 GNU Radios Adversary Nodes in ORBIT Grid Cooperation power control Change the location of the clone Power configuration Tx-1 power = k [dBm] Tx-2 power = 20-k [dBm] 9/6/2024 12

  13. Conclusion Phantom enables users to dynamically create confusion about their location by creating additional ghost transmission from different locations with the same identity We implemented a proof of concept using software defined radios as transmitters and explored issues related to frequency and time synchronization of such transmitters. We demonstrated the feasibility of inducing localization errors through cooperative transmissions. 9/6/2024 13

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#