A Location Privacy Framework with Mobility Using Host Identity
Download
Report
Transcript A Location Privacy Framework with Mobility Using Host Identity
Keiji Maekawa
Graduate School of Informatics, Kyoto University
Yasuo Okabe
Academic Center for Computing and Media Studies, Kyoto University
Mobility and location privacy
Capability of preventing others from learning
one’s location
Your location might be leaked out to others…
▪ Correspondents
▪ Eavesdroppers
Alice
(Mobile Node)
Eve
Alice is now connecting
from that college’s
network .
This person in my
network is
probably Alice!
Bob
(Correspondent
Node)
Desired conditions
Anonymity against eavesdroppers
▪ They cannot identify the sender and the receiver of packets.
Both end-points can authenticate each other,
but they don’t know about exact location.
This is surely from Alice,
though I don’t know
where she is.
Alice
(Mobile Node)
Bob
Eve
Who the hell is
this???
Case study: Mobile IP
Home Address is the identifier.
Care-of Address is the locator.
Never knows MN’s location
Always knows MN’s location
Mobile
Node
Home
Agent
Correspon
dent Node
MN’s Home
Network
Mobile
Node
Mobile
Node
Case study: Mobile IP (Route Optimization)
CN, HA, and eavesdroppers on the path can trace
the MN’s location simply looking at IP headers.
Mobile
Node
Home
Agent
Correspon
dent Node
MN’s Home
Network
Mobile
Node
Mobile
Node
It is difficult to design a protocol so that ANY
node doesn’t know the MN’s location.
Including trusted nodes such as Home Agent
It’s trade-off between privacy and performance.
In some case, privacy may be more important than
performance.
Related Works
HIP and BLIND
Problem Statement
What is to be solved
Our Proposal
Protocol Design
Conclusion
ID/locator separation
Host Identity is a public key pair
Host Identity Tag (HIT) is the identifier
▪ 128-bit hash of Host identity
Base Exchange
2 round trip key exchange
Exchange public keys for authentication
Establish SAs (IPsec ESP)
Rendezvous Mechanism
HIT & IP address stored in a Rendezvous Server (RVS)
▪ MN’s IP address is kept up to date
The first (I1) packet is forwarded
▪ Then, end-points start to communicate directly
To: HIT of B
IP of RVS
A
RVS
Registration /
Location Update
B
MN sends UPDATE messages to CN and RVS
on roaming.
Sessions in upper layers are kept
UPDATE
A
B
A
UPDATE
RVS
Complete identity protection
Only end-points can recognize the IDs in packets.
Eavesdroppers can’t identify them.
HIT(A)
HIT(B)
A
B
???
HIT(A)
HIT(B)
src/dst IDs are Blinded HIT with nonce N
BHIT= hash(N || HIT)
Nonce is randomly generated in each session
Extended Base Exchange
A variation of Diffie-Hellman
HIT(A)
HIT(B)
A
B
BHIT(A)
BHIT(B)
HIT(A)
HIT(B)
BHIT[I] = hash(Nonce || HIT[I])
BHIT[R] = hash(Nonce || HIT[R])
Initiator
Responder
I1: BHIT[I] → BHIT[R] , Nonce
Determines HIT[R] by
trying all own HITs.
R1: BHIT[R] → BHIT[I] , DH[R]
Generates the Key by DH
Encrypt HI[I] with the Key
I2: BHIT[I] → BHIT[R] , DH[I] , { HI[I] }
R2: BHIT[R] → BHIT[I] , { HI[R] }
Generates the Key by DH
Decrypt HI[I] with the Key
Encrypt HI[R] with the Key
Location privacy for the BLIND
Forwarding Agent (FA)
SPINAT
FA conceals MN’s location from CN
FA doesn’t know both IDs.
Not know A’s ID
A
FA
HIP communication
Not know A’s address
B
Goal
To achieve both Mobility and Location Privacy
Approach
The protocol is based on BLIND
▪ Good identity protection
Introduce mobility into BLIND
To realize mobility with BLIND
Rendezvous mechanism dealing with blinded HIT
Movement transparency support
Problems are:
RVS cannot resolve blinded HIT.
Raw HITs should be concealed.
HIP-in-HIP tunneling
Establish SAs with RVS with BLIND, then securely
send a packet with raw HITs as a HIP option.
The raw HIT info is deleted
BHIT[B]+HIT[B]
at RVS on forwarding.
RVS
F
BHIT[B]
A
Blinded Channel
B
Mobility support by Forwarding Agents
Use a temporary HIT for FA registration
Intra-FA handover
MN sends update message only to FA.
▪ MN is identified by the temporary HIT
This roaming is traced by FA and nodes in MN-FA.
A
A
F
B
Inter-FA handover
The MN registers to another FA with a new
temporary HIT after roaming.
All identifiers are changed at once.
There’s possibly packet loss.
▪ Expects retransmission in upper layers
THIT(A)
IP(A) SPI
RVS
F1
A
AHIT(A)
THIT(A)’
IP(A)
IP(A)’
B
update
update
F2
THIT(A)’
IP(A)’
SPI’
Single Points of Failure
There may be some extensions for robustness.
Forwarding Agents
▪ Multiplexing
Rendezvous Server
▪ DHT-based
Collusion
If CN and FA collude, MN’s ID and location can be
combined.
When some incident happens,
police can inspect MN’s location.
Implementation and evaluation is ongoing.
We proposed the Mobile BLIND Framework
Achievement
▪ Anonymity for eavesdroppers
▪ Conceal location from correspondents
▪ Movement Transparency
Extensions to BLIND
▪ Blind Rendezvous Mechanism
▪ Mobility support by extended Forwarding Agents