Cornelius-Anonysense - AnonySense: Privacy-Aware...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: AnonySense: Privacy-Aware People-Centric Sensing Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin Institute for Security Technology Studies Dartmouth College, USA Nikos Triandopoulos Department of Computer Science University of Aarhus, Denmark ABSTRACT Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, mi- crophones, and accelerometers, for example) and the net- work world (with Wi-Fi and Bluetooth interfaces). Such devices offer many new opportunities for cooperative sens- ing applications. For example, users mobile phones may contribute data to community-oriented information services, from city-wide pollution monitoring to enterprise-wide de- tection of unauthorized Wi-Fi access points. This people- centric mobile-sensing model introduces a new security chal- lenge in the design of mobile systems: protecting the privacy of participants while allowing their devices to reliably con- tribute high-quality data to these large-scale applications. We describe AnonySense, a privacy-aware architecture for realizing pervasive applications based on collaborative, op- portunistic sensing by personal mobile devices. AnonySense allows applications to submit sensing tasks that will be distributed across anonymous participating mobile devices, later receiving verified, yet anonymized, sensor data reports back from the field, thus providing the first secure imple- mentation of this participatory sensing model. We describe our trust model, and the security properties that drove the design of the AnonySense system. We evaluate our proto- type implementation through experiments that indicate the feasibility of this approach, and through two applications: a Wi-Fi rogue access point detector and a lost-object finder. Categories and Subject Descriptors C.2.4 [ Communications ]: Distributed Systems; D.4.6 [ Operating Systems ]: Security and Protection; H.3.4 [ Information Systems ]: Systems and Software General Terms Design, Experimentation, Measurement, Security Keywords mobile sensing, opportunistic sensing, privacy, anonymity Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. MobiSys08, June 1720, 2008, Breckenridge, Colorado, USA. Copyright 2008 ACM 978-1-60558-139-2/08/06 ...$5.00. 1. INTRODUCTION Opportunistic sensing has been gaining popularity, with several systems and applications being proposed to leverage users mobile devices to collectively measure environmental data, sometimes used as context in pervasive-computing ap- plications. In these systems, applications can task mobile nodes (such as a users sensor-equipped mobile phone or ve-...
View Full Document

This note was uploaded on 08/25/2011 for the course EEL 6788 taught by Professor Boloni,l during the Spring '08 term at University of Central Florida.

Page1 / 14

Cornelius-Anonysense - AnonySense: Privacy-Aware...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online