This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: AnonySense: Privacy-Aware People-Centric Sensing Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin Institute for Security Technology Studies Dartmouth College, USA Nikos Triandopoulos Department of Computer Science University of Aarhus, Denmark ABSTRACT Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, mi- crophones, and accelerometers, for example) and the net- work world (with Wi-Fi and Bluetooth interfaces). Such devices offer many new opportunities for cooperative sens- ing applications. For example, users mobile phones may contribute data to community-oriented information services, from city-wide pollution monitoring to enterprise-wide de- tection of unauthorized Wi-Fi access points. This people- centric mobile-sensing model introduces a new security chal- lenge in the design of mobile systems: protecting the privacy of participants while allowing their devices to reliably con- tribute high-quality data to these large-scale applications. We describe AnonySense, a privacy-aware architecture for realizing pervasive applications based on collaborative, op- portunistic sensing by personal mobile devices. AnonySense allows applications to submit sensing tasks that will be distributed across anonymous participating mobile devices, later receiving verified, yet anonymized, sensor data reports back from the field, thus providing the first secure imple- mentation of this participatory sensing model. We describe our trust model, and the security properties that drove the design of the AnonySense system. We evaluate our proto- type implementation through experiments that indicate the feasibility of this approach, and through two applications: a Wi-Fi rogue access point detector and a lost-object finder. Categories and Subject Descriptors C.2.4 [ Communications ]: Distributed Systems; D.4.6 [ Operating Systems ]: Security and Protection; H.3.4 [ Information Systems ]: Systems and Software General Terms Design, Experimentation, Measurement, Security Keywords mobile sensing, opportunistic sensing, privacy, anonymity Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. MobiSys08, June 1720, 2008, Breckenridge, Colorado, USA. Copyright 2008 ACM 978-1-60558-139-2/08/06 ...$5.00. 1. INTRODUCTION Opportunistic sensing has been gaining popularity, with several systems and applications being proposed to leverage users mobile devices to collectively measure environmental data, sometimes used as context in pervasive-computing ap- plications. In these systems, applications can task mobile nodes (such as a users sensor-equipped mobile phone or ve-...
View Full Document
This note was uploaded on 08/25/2011 for the course EEL 6788 taught by Professor Boloni,l during the Spring '08 term at University of Central Florida.
- Spring '08