重点词:信息泄露、可穿戴设备。 要求佩戴额外的传感器 手环等带来的信息

Slides:



Advertisements
Similar presentations
高考短文改错专题 张柱平. 高考短文改错专题 一. 对短文改错的要求 高考短文改错的目的在于测试考生判断发现, 纠正语篇中 语言使用错误的能力, 以及考察考生在语篇中综合运用英 语知识的能力. 二. 高考短文改错的命题特点 高考短文改错题的形式有说明文. 短文故事. 书信等, 具有很 强的实用性.
Advertisements

1 中華電信 數據通信分公司 王余煥 2013/10/31. 2 大綱  前言  產業鏈發展  趨勢與挑戰  中華電信物聯網應用與案例分享.
2014 年上学期 湖南长郡卫星远程学校 制作 13 Getting news from the Internet.
2017/3/6 WIRESHARK 的安裝與基本操作.
2 美國與全球經濟概況 CHAPTER. 2 美國與全球經濟概況 CHAPTER C H A P T E R C H E C K L I S T 學習本章後,您將能: 描述美國與全球在生產什麼、如何生產,以及為誰生產貨 品與服務 1 透過循環流量模型,瞭解家計單位、廠商與政府之間的 互動 2.
“Internet+” Business Innovation
汇报人:李臻 中国海洋大学信息科学与工程学院 计算机科学与技术系
二維品質模式與麻醉前訪視滿意度 中文摘要 麻醉前訪視,是麻醉醫護人員對病患提供麻醉相關資訊與服務,並建立良好醫病關係的第一次接觸。本研究目的是以Kano‘s 二維品質模式,設計病患滿意度問卷,探討麻醉前訪視內容與病患滿意度之關係,以期分析關鍵品質要素為何,作為提高病患對醫療滿意度之參考。 本研究於台灣北部某醫學中心,通過該院人體試驗委員會審查後進行。對象為婦科排程手術住院病患,其中實驗組共107位病患,在麻醉醫師訪視之前,安排先觀看麻醉流程衛教影片;另外對照組111位病患,則未提供衛教影片。問卷於麻醉醫師
BOTNET Detection and Prevention
Physician Financial Incentives and Cesarean Section Delivery
桂小林 西安交通大学电子与信息工程学院 计算机科学与技术系
云实践引导产业升级 沈寓实 博士 教授 MBA 中国云体系产业创新战略联盟秘书长 微软云计算中国区总监 WinHEC 2015
An Ultra-Wearable, Wireless, Low Power ECG Monitoring System
Semantic-Synaptic Web Mining: A Novel Model for Improving the Web Mining 報告者:陳宜樺 報告日期:2015/9/25.
An Adaptive Cross-Layer Multi-Path Routing Protocol for Urban VANET
Feng Lin, Chen Song, Yan Zhuang, Wenyao Xu, Changzhi Li, Kui Ren
Some Effective Techniques for Naive Bayes Text Classification
Applications of Digital Signal Processing
Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting Source: IEEE Transactions On Cybernetics, Vol. 47, No. 2,February.
Platypus — Indoor Localization and Identification through Sensing Electric Potential Changes in Human Bodies.
指導教授:許子衡 教授 報告學生:翁偉傑 Qiangyuan Yu , Geert Heijenk
Ericsson Solutions for Intelligent Transport Systems and Solutions
Descriptive statistics
報告人:丁英智 資策會 網路多媒體研究所 11/3/2006
NLP Group, Dept. of CS&T, Tsinghua University
團隊研發能力 – 抗煞一號 二十天之內,完成抗煞一號的研發.
網路技術管理進階班---區域網路的技術發展
Source: IEEE Access, vol. 5, pp , October 2017
Notes appear on slides 4, 5, 6, and 62
数据通信与计算机网络技术.
附錄 通訊協定堆疊.
The Company The leading provider of vehicle identification and pricing information in Australia, New Zealand, Thailand, China, Hong Kong, Malaysia, Singapore,
基于人眼追踪的手机解锁系统 报告人:李映辉 指导老师:王继良
生物芯片技术 刘超 李世燕 谢宏林
第八組 劉佳衢.
常见问题解答 II. App上重置并清空数据库之后,手机app找不到圣诞灯怎么办? I. 打开APP,发现并连接不了圣诞灯怎么办?
Location Identification and Vehicle Tracking using VANET(VETRAC)
第 16 章 物聯網.
Interference between and Bluetooth And coexistence mechanisms
Classroom 2.0 教學媒體 第七組 圖傳系 邱欣瑩 圖傳系 張心維
Bluetooth connect without cables
A Study on the Next Generation Automatic Speech Recognition -- Phase 2
Demon.C 封面 UNIQUE PPT June 6, 2013.
指導教授:黃三益 教授 學生 洪瑞麟 m 蔡育洲 m 陳怡綾 m
資料庫 靜宜大學資管系 楊子青.
VIDEO COMPRESSION & MPEG
研究技巧與論文撰寫方法 中央大學資管系 陳彥良.
Guide to a successful PowerPoint design – simple is best
中国科学技术大学计算机系 陈香兰 2013Fall 第七讲 存储器管理 中国科学技术大学计算机系 陈香兰 2013Fall.
決策支援系統導論 資訊管理系 王淑卿.
虚 拟 仪 器 virtual instrument
2008 TIME USE SURVEY IN CHINA
Inter-band calibration for atmosphere
A Data Mining Algorithm for Generalized Web Prefetching
Philosophy of Life.
WIRELESS LAN B 邱培哲 B 張宏安.
An Efficient MSB Prediction-based Method for High-capacity Reversible Data Hiding in Encrypted Images 基于有效MSB预测的加密图像大容量可逆数据隐藏方法。 本文目的: 做到既有较高的藏量(1bpp),
Outline Overview of this paper Motivation and Initialization
Statistics Chapter 1 Introduction Instructor: Yanzhi Wang.
Chapter 10 Mobile IP TCP/IP Protocol Suite
Efficient Query Relaxation for Complex Relationship Search on Graph Data 李舒馨
TinyDB資料庫 靜宜大學資管系 楊子青.
Mobile IPv4.
Infrastructure as Learning Environment 学习环境的基础结构
行動寬頻介接網路與IoT實務應用-實驗課程
簡單迴歸分析與相關分析 莊文忠 副教授 世新大學行政管理學系 計量分析一(莊文忠副教授) 2019/8/3.
Automating Visual Privacy Protection Using a Smart LED
之前都是分类的蒸馏很简单。然后从分类到分割也是一样,下一篇是检测的蒸馏
WiFi is a powerful sensing medium
Presentation transcript:

Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers 重点词:信息泄露、可穿戴设备。 要求佩戴额外的传感器 手环等带来的信息 Aveek K. Das, Parth H. Pathak, Chen-Nee Chuah, Prasant Mohapatra University of California, Davis, CA, USA. Email: {akdas, phpathak, chuah, pmohapatra}@ucdavis.edu

BLE Fitness Trackers Fitness trackers have become increasing popular Notion of “quantified-self” Low energy consumption -> BLE becoming the dominant standard for wearable communication 200% growth in shipped devices from 2014 to 2015 量化生活概念的流行,可穿戴的测量设备越来越多,其中,运动手环在14年到15年增长了200%

Motivation Recent works show tracking of users’ hand motion by the sensors on wrists Widespead usage of BLE network Fitness Trackers IoT sensor Ibeacon type services Imperative to understand privacy leakage in BLE network data Measurement study of BLE privacy Communication between fitness trackers and smartphones 由于低功耗等特性,绝大多数运动手环都是使用ble通信。 目前ble最常应用在 作者限定了本篇工作的研究范围

BLE Introduction Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) 2.4 GHz radio frequencies as classic Bluetooth Adaptive frequency hopping 40 channels – 3 for advertisement and 37 for connection Each BLE device switches between broadcast mode and connection mode

BLE Standard – Advertising Packets Undirected Connectable Advertising Packets Includes: MAC address Public address Random address Advertising content

BLE Standard – Data Packets Adaptive frequency hopping Most data communication transfer of payload happens in “start” packets Smartphones communicate with peripheral periodically

BLE Privacy Leakage Advertising Packets Data Packets User Tracking Activity Detection Person Identification

User Tracking with BLE Advertising Packets

User Tracking Attack Model Fitness trackers continuously advertise Smartphone disconnects to preserve energy Broadcasts to indicate its presence Can be sniffed by 3rd party Mac address in advertising packets -> Device Tracking If address is not altered – even after boot cycle Device info + Auxiliary Information -> User Tracking Secondary knowledge like video camera Since BLE range is small, fine grained user tracking is possible Ble广播信号持续发放 – 可以被第三方设备监听 广播包中包含MAC地址 – 可以识别设备 广播包中包含设备信息 – 可以识别用户

Gymnasium Dataset 8 days – 2 hours per day 7.5 million advertising packets “Local Name” field – used to identify fitness trackers 99 unique fitness trackers Smartphones – Do not advertise

Activity Detection

Activity Detection – Experimental Setup 10 volunteers – each wearing a Fitbit on their wrist 150 seconds each Repeated 10 times Use BLE sniffer to sniff when Fitbit app is opened on IPhone 6 User asked to do some actions Sit on a chair Work on a computer at a desk Run

Activity Detection Data rate is proportional to user activity intensity Simple features – data rate, numbers of “start” and “empty” packets Use a decision tree to classifier the dataset Activity identification for one user – 97.6%

Person Identification

Person Identification Fibit uses accelerometer for determining users’ motion related statistics. Moderately high correlation between BLE network traffic features and accelerometer readings Linear regression models built using accelerometer features BLE network traffic can be efficient indicator of user’ gait and motion

Person Identification Results BLE network feature based prediction Data-rate, Start, Empty Packets, Payload Sizze, Interval between Packets 89% accuracy for 5 people groups False positives < 5% for all combinations Attack possible even when MAC address is altered Small group of users, pre-trained Works in offices or small gyms

Possible Prevention Strategies Randomized MAC addresses as per standard Chaff in data packets – to prevent data rate being proportional to activity Internet of Things necessitates importance of BLE network privacy

What’s next? Ble sniffer 现在能做到哪些功能? 1. 广播模式:改变自身的MAC地址,发送任意内容的广播包。 2. 被动监听模式:以第三方的模式被动监听ble连接发送的数据包,目前的 的工具能够完全破译ble的just work和6-digit pin配对模式,监听连接过程 的所有数据包,也可以进行重放攻击。 3. 主动监听模式:以中间人的模式介入连接,可以修改数据包内容,亦可以 主动构造数据包进行定向查询。

What’s next?

What’s next? 其他BLE设备? 智能家居 智能医疗保健设备 ……