Opportunistic Computing in Wireless Networks
Total Page:16
File Type:pdf, Size:1020Kb
OPPORTUNISTIC COMPUTING IN WIRELESS NETWORKS DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Zhimin Yang, B.E., M.E., M.S. Graduate Program in Computer Science and Engineering The Ohio State University 2010 Dissertation Committee: Dong Xuan, Adviser Ten-Hwang Lai Feng Qin Copyright by Zhimin Yang 2010 ABSTRACT Opportunistic computing is the exploitation of opportunities as they arise to pro- vide computing services that meet application requirements. It maximally utilizes available resources to improve such services subject to application constraints. When applied to different applications, we have different concrete instances of opportunistic computing. In this dissertation, we focus on its utilization in the context of wire- less networking applications. Particularly, we study four instances of opportunistic computing in wireless networks: opportunistic social networking, opportunistic local- ization, opportunistic encryption, and opportunistic authentication. First, we study opportunistic social networking with mobile phones. We develop E-SmallTalker, a novel distributed mobile communication system that aims to fa- cilitate more effective social networking among strangers in physical proximity. We propose a privacy-preserving opportunistic commonality discovery protocol that uti- lizes iterative Bloom filters to encode user information. We eliminate unnecessary user interactions by exploiting Bluetooth service attributes to publish encoded user data. Second, we study opportunistic localization in wireless sensor networks. We pro- pose an “anti-sensor network” system to localize an adversary’s sensors in a non- cooperative environment where these sensors try to evade or deter localization. The system relies on a set of monitors opportunistically observing intermittent wireless ii signals emitted by sensors in the protected area. With these observations, we esti- mate sensor locations with an opportunistic localization algorithm. We also design improved algorithms to handle additional countermeasures that sensors can employ such as message encryption and non-uniform transmission power levels. Third, we study opportunistic encryption in wireless LANs. We identify and analyze security issues in the current 802.11i security standard. We illustrate the se- vere consequences resulting from the lack of frame authentication with an exemplary denial-of-service attack. We propose a new key-establishment algorithm for oppor- tunistic encryption in the link layer. Our algorithm makes minimal changes to the existing 802.11 protocol. Fourth, we study opportunistic authentication in wireless web applications. We propose opportunistically utilizing users’ trusted devices such as mobile phones to aid web authentication in wireless networks. We design and implement a prototype one- time-password (OTP) authentication system that works seamlessly in heterogeneous environments. We propose a one-time-password reference service that allows an OTP- token to be opportunistically used in multiple web applications. We also propose a new connection-aware one-time-password algorithm to thwart man-in-the-middle attacks by using connection information. iii Dedicated To My Family For Love and Support iv ACKNOWLEDGMENTS First of all, I would like to thank my advisor, Dr. Xuan, for his superb guidance and inspirations throughout this academic experience. I really enjoyed all the insight- ful conversations which made this dissertation possible. Dr. Xuan showed me how to rigorously define and refine problems, develop solutions, and organize research papers. He’s knowledgeable, patient and always has insightful suggestions and comments. Dr. Xuan broadened my scope and his diligence and passion for high quality research will always encourage me to achieve more. Both my wife and I thank Dr. Xuan from the bottom of our hearts for the kind support and help when our family was in the difficult and unexpected situations. All the wonderful Thanksgiving, Christmas, and Chinese New Year parties at Dr. Xuan’s home are joyful memories which can never be forgettable. I can’t say enough to thank him. I am also extremely grateful to Dr. Ten H. Lai, Dr. Feng Qin, Dr. Eylem Ekici, and Dr. Timothy Long for serving in my candidacy exam and/or dissertation committees and their constructive feedback in this research. I would also like to acknowledge my labmates, Dr. Xun Wang, Dr. Sriram Chel- lappan, Dr. Wenjun Gu, Dr. Xiaole Bai, Adam C. Champion, Boxuan Gu, Jiangpeng Dai, Xudong Ni and Jin Teng for the stimulating discussions. You make my life in OSU so enjoyable. I wish you the best in your career. v I would like to express my gratitude to all those who have advised, helped, and supported me during the past years. Finally, I am forever indebted to my family for their unconditional love and sup- port throughout my life. My lovely son, David, is the every reason for me to go ahead. vi VITA April 14, 1972 ..............................Born – Harbin, China 1995 ........................................Bachelor in Engineering Harbin Institute of Technology Harbin, China 1997 ........................................Master in Engineering Harbin Institute of Technology Harbin, China 2009 ........................................Master of Science The Ohio State University 2005 – Present ..............................Graduate Teaching Associate / Gradu- ate Research Associate The Ohio State University PUBLICATIONS Research Publications Zhimin Yang, Eylem Ekici, Dong Xuan. “A Localization-Based Anti-Sensor Network System”. Proceedings of the 26th IEEE International Conference on Computer Com- munications (IEEE INFOCOM mini conference), 2396 - 2400, Anchorage, Alaska, USA, May 2007. Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia Jia. “On Security Vulnera- bilities of Null Data Frames in IEEE 802.11 based WLANs”. Proceedings of the 28th IEEE International Conference on Distributed Computing Systems(IEEE ICDCS), 28 - 35, Beiing, China, June 2008. vii Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan. “Link-Layer Protection in 802.11i WLANs with Dummy Authentication”. Proceedings of the 2nd ACM Conference on Wireless Network Security (ACM WiSec short paper), 131 - 138, Zurich, Switzerland, March 2009. Xudong Ni, Zhimin Yang, Xiaole Bai, Adam Champion, Dong Xuan. “DiffUser: Differentiated User Access Control on Smartphone”. Proceedings of the 5th IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS), Macau, China, Oct. 2009. Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam Champion, Dong Xuan. “Malicious Shellcode Detection with a Virtual Memory Snapshot”. to appear in Proc. of IEEE International Conference on Computer Communications (IEEE INFOCOM), 2010. Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia, Can Que. “Null Data Frame: A Double-edged Sword in IEEE 802.11 WLANs”. to appear in IEEE Transactions on Parallel and Distributed Systems (TPDS), accepted 2009 . Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Shen, Dong Xuan. “PerFallD: A Pervasive Fall Detection System Using Mobile Phones”. to appear in Proc. of IEEE PerCom Workshop on Pervasive Healthcare (PerHealth), 2010. Zhimin Yang, Boying Zhang, Jiangpeng Dai, Adam C. Champion, Dong Xuan, Du Li. “E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity”. to appear in Proc. of IEEE International Conference on Distributed Computing Systems(IEEE ICDCS), 2010. viii FIELDS OF STUDY Major Field: Computer Science and Engineering Studies in: Computer Networking Prof. Anish Arora Prof. Eylem Ekici Prof. Ten-H. Lai Prof. David Lee Prof. Ming T. Liu Prof. Prasun Sinha Prof. Dong Xuan Software Systems Prof. Paul Sivilotti Prof. Igor Malkiman Parallel and Distributed Systems Prof. P. Sadayappan Prof. Gagan Agrawal Prof. Feng Qin ix TABLE OF CONTENTS Page Abstract....................................... ii Dedication...................................... iv Acknowledgments.................................. v Vita ......................................... vii ListofFigures ................................... xiii Chapters: 1. INTRODUCTION .............................. 1 1.1 Motivation ............................... 1 1.2 ContributionsofThisDissertation . 6 1.3 OrganizationofThisDissertation . 9 2. OPPORTUNISTIC SOCIAL NETWORKING WITH MOBILE PHONES 11 2.1 Motivation ............................... 12 2.2 RelatedWork.............................. 17 2.3 Opportunistic Social Networking: Privacy Preserving Commonality DiscoveryandVerification . 22 2.3.1 Commonality Discovery Problem . 22 2.3.2 Opportunistic Commonality Discovery Protocol . .. 25 2.3.3 Opportunistic Commonality Verification Protocol . ... 29 2.4 E-SmallTalker System Design, Implementation and Evaluation. 32 2.4.1 SystemArchitecture . 32 2.4.2 SystemImplementation . 39 x 2.4.3 SystemPerformanceEvaluation. 40 2.5 Discussions ............................... 47 2.6 Summary ................................ 50 3. OPPORTUNISTIC LOCALIZATION IN WIRELESS SENSOR NETWORKS 51 3.1 Motivation ............................... 52 3.2 RelatedWork.............................. 54 3.3 The Opportunistic Localization System Architecture . ...... 55 3.3.1 SystemDescription. 55 3.3.2 SensorCounter-Measures . 57 3.4 Opportunistic Localization Algorithms . ... 58 3.4.1 Basic Opportunistic Localization Methodology . .. 58 3.4.2 Localization with Encrypted Messages . 64 3.4.3 Localization with Power Level Variations . 69 3.5 PerformanceEvaluation .