计算机科学 ›› 2018, Vol. 45 ›› Issue (8): 7-12.doi: 10.11896/j.issn.1002-137X.2018.08.002
韩秀萍1, 王智1, 裴丹2
HAN Xiu-ping1, WANG Zhi1, PEI Dan2
摘要: 如今,上亿的Wi-Fi热点被广泛部署,用于给人们提供Wi-Fi连网服务。为了加快Wi-Fi连接的速度,移动设备会发送探测请求帧来发现附近的无线热点,并且保存曾经连接过的AP的SSID,即首选网络列表 (PNL)。已有研究表明,由探测请求帧发出的SSID构成的Wi-Fi指纹会泄露用户的隐私信息。基于对现实情况中Wi-Fi指纹所造成的隐私泄露程度的分析,提出了数据驱动的隐私保护方案。首先,针对4个城市中2700万用户连接400万Wi-Fi热点的行为进行了测量研究,并证明了在很多场景下Wi-Fi指纹都可以用来区分用户。基于对Wi-Fi指纹中SSID语义信息的研究,可以推断出这些用户的身份信息(如工作信息)。其次,提出了一种基于协同过滤的启发式方法,它通过给用户的PNL中添加伪SSID来模糊其信息,并使得附近的人彼此之间的PNL与Wi-Fi指纹都更加相似。最后,基于真实的Wi-Fi连接数据验证了上述策略的有效性,实验结果表明,修改PNL不仅能保护用户隐私,而且能保证快速的Wi-Fi连接。
中图分类号:
[1]DAI Z,DINO A,MACAULAY S A.Attacking Automatic Wireless Network Selection[C]∥Proceedings of the Sixth Annual IEEE SMC Information Assurance Workshop.IEEE,2005:365-372. [2]FREUDIGER J.How Talkative is Your Mobile Device?:An Experimental Study of Wi-Fi Probe Requests[C]∥Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks.ACM,2015. [3]CHERNYSHEV M,VALLI C,HANNAY P.On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers[J].IEEE Transactions on Information Forensics and Security,2016,11(3):584-593. [4]FAN Y C,CHEN Y C,TUNG K C,et al.A Framework forEna-bling User Preference Profiling Through Wi-Fi Logs[J].IEEE Transactions on Knowledge and Data Engineering,2016,28(3):592-603. [5]XU Q,ZHENG R,SAAD W,et al.Device Fingerprinting inWireless Networks:Challenges and Opportunities[J].IEEE Communications Surveys and Tutorials,2016,18 (1):94-104. [6]CUNCHE M,KAAFAR M A,BORELI R.Linking Wireless Devices Using Information Contained in Wi-Fi Probe Requests[J].Pervasive and Mobile Computing,2014,11(4):56-69. [7]BONNE B,QUAX P,LAMOTTE W.Raising Awareness onSmartphone Privacy Issues with SASQUATCH,and Solving Them with PrivacyPolice∥Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems:Computing,Networking and Services.2014:379-381. [8]LINDQVIST J,AURA T,DANEZIS G,et al.Privacy-preser-ving 802.11 Access-point Discovery[C]∥Proceedings of the Second ACM Conference on Wireless Network Security.ACM,2009:123-130. [9]KIM Y S,TIAN T,NGUYEN L T,et al.Lapwin:Location-aided Probing for Protecting User Privacy in Wi-Fi Networks[C]∥Proceedings of IEEE Conference on Communications and Network Security.2014:427-435. [10]PANG J,GREENSTEIN B,GUMMADI R,et al.802.11 User Fingerprinting[C]∥Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking.ACM,2007:99-110. [11]DESMOND L C C,YUAN C C,PHENG T C,et al.Identifying Unique Devices Through Wireless Fingerprinting[C]∥Procee-dings of the First ACM Conference on Wireless Network Security.ACM,2008:46-55. [12]CHENG N,MOHAPATRA P,CUNCHE M,et al.InferringUser Relationship from Hidden Information in Wlans[C]∥Mi-litary Communications Conference.IEEE,2012:1-6. [13]BARBERA M V,EPASTO A,MEI A,et al.Signals from The Crowd:Uncovering Social Relationships through Smartphone Probes[C]∥Proceedings of the 2013 Conference on Internet Measurement Conference.ACM,2013:265-276. [14]LUZIO A D,MEI A,STEFA J.Mind Your Probes:De-anonymization of Large Crowds through Smartphone Wi-Fi Probe Requests[C]∥Proceedings of the 35th Annual IEEE International Conference on Computer Communications.IEEE,2016:1-9. [15]SONG Y,YANG C,GU G.Who is Peeping at Your Passwords at Starbucks?-To Catch An Evil Twin Access Point[C]∥Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks.IEEE,2010:323-332. [16]CALLEGATI F,CERRONI W,RAMILLI M.Man-in-the-Middle Attack to the Https Protocol[J].IEEE Security and Privacy,2009,7(1):78-81. [17]SKINNER K,NOVAK J.Privacy and Your App[C]∥Apple Worldwide Dev.Conf.(WWDC).America,2015. [18]Android 6.0 Changes[EB/OL].https://developer.android.com/about/versions/ marshmallow/android-6.0-changes.html. [19]WANG W.Wireless Networking in Windows 10[C]∥Windows Hardware Engineering Community Conference (WinHEC).2015. [20]VANHOEF M,MATTE C,CUNCHE M,et al.Why Mac Address Randomization is not Enough:An Analysis of Wi-Fi Network Discovery Mechanisms∥Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.ACM,2016:413-424. [21]VANHOEF M,MATTE C,CUNCHE M,et al.Why Mac Address Randomization is not Enough:An Analysis of Wi-Fi Network Discovery Mechanisms[C]∥Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.ACM,2016:413-424. [22]ZANG H,BOLOT J.Anonymization of Location Data does not Work:A Large-scale Measurement Study[C]∥Proceedings of the 17th Annual International Conference on Mobile Computing and Networking.ACM,2011:145-156. [23]XU C,TENG J,JIA W.Enabling Faster and Smoother Handoffs in Ap-dense 802.11 Wireless Networks[J].Computer Communications,2010,33(15):1795-1803. [24]TERVEEN L,HILL W.Beyond Recommender Systems:He-lping People Help Each Other[C]∥HCI in the New Millen-nium.2001:487-509. |
[1] | 雷羽潇, 段玉聪. 面向跨模态隐私保护的AI治理法律技术化框架[J]. 计算机科学, 2021, 48(9): 9-20. |
[2] | 谭琪, 张凤荔, 王婷, 王瑞锦, 周世杰. 融入结构度中心性的社交网络用户影响力评估算法[J]. 计算机科学, 2021, 48(7): 124-129. |
[3] | 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞. 基于用户偏好和位置分布的假位置生成方法[J]. 计算机科学, 2021, 48(7): 164-171. |
[4] | 郭奕杉, 刘漫丹. 基于时空轨迹数据的异常检测[J]. 计算机科学, 2021, 48(6A): 213-219. |
[5] | 何权奇, 余飞鸿. 面向无线网络相机的低功耗架构研究综述[J]. 计算机科学, 2021, 48(6A): 369-373. |
[6] | 彭大川, 杨喜敏, 唐菀, 张潇, 范垒. 软件定义无线网络中双网络通道互备无线接入点切换方案[J]. 计算机科学, 2021, 48(6A): 427-431. |
[7] | 季琰, 戴华, 姜莹莹, 杨庚, 易训. 面向混合云的可并行多关键词Top-k密文检索技术[J]. 计算机科学, 2021, 48(5): 320-327. |
[8] | 郭蕊, 芦天亮, 杜彦辉. WSN中基于目标决策的源位置隐私保护方案[J]. 计算机科学, 2021, 48(5): 334-340. |
[9] | 彭春春, 陈燕俐, 荀艳梅. 支持本地化差分隐私保护的k-modes聚类方法[J]. 计算机科学, 2021, 48(2): 105-113. |
[10] | 郭上铜, 王瑞锦, 张凤荔. 区块链技术原理与应用综述[J]. 计算机科学, 2021, 48(2): 271-281. |
[11] | 魏礼奇, 赵志宏, 白光伟, 沈航. 基于生成对抗网络的位置隐私博弈机制[J]. 计算机科学, 2021, 48(10): 266-271. |
[12] | 余雪勇, 陈涛. 边缘计算场景中基于虚拟映射的隐私保护卸载算法[J]. 计算机科学, 2021, 48(1): 65-71. |
[13] | 冯安然, 王旭仁, 汪秋云, 熊梦博. 基于PCA和随机树的数据库异常访问检测[J]. 计算机科学, 2020, 47(9): 94-98. |
[14] | 李彦, 申德荣, 聂铁铮, 寇月. 面向加密云数据的多关键字语义搜索方法[J]. 计算机科学, 2020, 47(9): 318-323. |
[15] | 曹素娥, 杨泽民. 基于聚类分析算法和优化支持向量机的无线网络流量预测[J]. 计算机科学, 2020, 47(8): 319-322. |
|