T15-Anonysense - AnonySense: Privacy-Aware People-Centric...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
AnonySense: Privacy-Aware People-Centric Sensing Leith Tussing EEL 6788 Spring 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
University of Central Florida Overview Introduction Security Risks Architecture Protocols Evaluation Future Work Resources
Background image of page 2
University of Central Florida Introduction Data collection through personal mobile devices is quickly becoming a viable option for mass data gathering. Mobile devices are becoming more feature rich with each iterative generation. What used to be a multi thousand dollar bulky unit is now a sub $100 cell phone. As the micro computer replaced the mainframe systems of yore, mobile devices are rapidly replacing the desktop and laptop machines of today.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
University of Central Florida Introduction (continued) Mobile devices will be the super computers of tomorrow. Time slicing tasks across billions of free floating devices. As of the end of 2009 60% (4 billion) of the world population use cell phones. As mobile devices are more widely used for data collection the larger the risk of privacy invasion of user’s data and personal information. As you collect more accurate data you end up with less privacy for the individual collecting the data. Inversely increasing the privacy results in less accurate data for those requesting information.
Background image of page 4
University of Central Florida Introduction (continued) More researchers are turning to opportunistic sensing to gather results where there is no fixed sensing or the inability to add it. Even though it’s a best-effort service it offers a low cost and large mobile infrastructure. Issues with opportunistic sensing 1. Heterogeneous & unpredictable collection of devices 2. Interface via autonomous WAPs & public Internet 3. Poses new and mostly untackled security risks.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
University of Central Florida Security Risks Location/Time based user identifications attacks Rogue AP hosting & spoofing Mobile device/sensor/software tampering Maliciously crafted tasks Server spoofing Packet sniffing Data spoofing/manipulation
Background image of page 6
AnonySense Architecture The author’s of this paper proposed and implemented a prototype of a system they called AnonySense, “a privacy-aware architecture for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices.” An application independent infrastructure for handling anonymous tasking and reporting. Built on the idea of minimal trust and task separation to
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 26

T15-Anonysense - AnonySense: Privacy-Aware People-Centric...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online