Dissertation
Total Page:16
File Type:pdf, Size:1020Kb
!"##$%&'&"() !"#$%&'$(&)"**$(#+#",- ./("0+12&"-&3,1+#",-45+*$'&6$(0"1$*. 7$(8+**$( 9+:;&<%"0$(&=,(-* +-:$*#($>#$(&+?+'$@"*1A$(&B(+' ),?#,(&'$(&!$1A-"*1A$-&C"**$-*1A+8#$-&D)(;&#$1A-;E C"$-F&"@&GH:H*#&IJJK 6#H'"$-?$--L+A%&%#;&6#H'"$->%+##M& G&NOP&OOQ )"**$(#+#",-*:$>"$#&%#;&6#H'"$->%+##M& R-8,(@+#"? 5$#($H$(M& <;S-"0;4/(,8;&))(;&B$(+%'&TH"(1A@+2( To my wife Ulrike and my children Laurin and Annika Contents 1 Introduction 1 1.1 Contributions of this Dissertation .......................... 2 1.2 Organization and Outline of this Dissertation ................... 2 2 Background & State of the Art 5 2.1 Context-Aware Computing ............................. 5 2.1.1 Challenges .................................. 7 2.1.2 What is Context? .............................. 7 2.1.3 Definitions of Context ............................ 8 2.1.4 Early Examples of Context-Aware Applications .............. 9 2.1.5 Security and Privacy in Context-Aware Systems ............. 11 2.1.6 Meaning and Importance of Location for Context-Aware Systems .... 11 2.2 Location-Based Services ............................... 13 2.2.1 Definitions and Interpretations ....................... 14 2.2.2 Background on Location-Based Services .................. 14 2.2.3 Operations related to Localizations in GSM Networks .......... 16 2.2.4 Comparison between Location-Based Services and Context-Aware Computing ......................... 18 2.2.5 Location Technologies ............................ 19 2.2.6 Classification of Location-Based Services .................. 24 2.2.7 Examples of Location-Based Applications ................. 27 2.2.8 Design Patterns for Location-Based Services ................ 31 2.2.9 Location-Based Services and Privacy Protection ............. 33 2.2.10 Conclusions and Future of Location-Based Services ............ 37 2.3 Mobile Business and Markets ............................ 38 2.3.1 Location-Based Market ........................... 39 2.3.2 Different Actors in the Mobile Business .................. 40 2.3.3 Business Models ............................... 42 2.3.4 Definitions and Interpretations ....................... 44 2.4 Privacy ........................................ 47 2.4.1 A Short Historic ............................... 50 2.4.2 Privacy Legislation in Europe ........................ 52 2.4.3 Protocols and Standards ........................... 54 2.4.4 Privacy Concepts ............................... 56 i ii CONTENTS 2.4.5 Sensitive Data ................................ 58 2.4.6 Movement- and Transaction Privacy .................... 58 2.4.7 Management of Privacy Sensitive Data ................... 59 2.4.8 Privacy and Mobile Phones ......................... 59 2.4.9 Vulnerabilities of Mobile Networks ..................... 61 2.4.10 Location Privacy ............................... 63 2.4.11 Threats Resulting from the Availability of Location Information .... 64 2.4.12 Privacy Management ............................. 67 2.4.13 Privacy Models for Protection of Location Information .......... 68 2.4.14 Anonymity and Pseudonymity ....................... 69 2.4.15 Privacy Policies ................................ 70 2.4.16 Obfuscation .................................. 70 2.4.17 Identifiers and Pseudonyms ......................... 72 3 Selected Aspects of Secure Communication 73 3.1 Cryptographic Hash Functions ........................... 73 3.1.1 Basic Requirements of Cryptographic Hash Functions .......... 74 3.1.2 Message Authentication Code (MAC) ................... 75 3.1.3 Keyed-Message Authentication Code (HMAC) .............. 76 3.1.4 HMAC operational .............................. 76 3.1.5 Security Analysis of HMAC ......................... 77 3.2 Cryptographic Primitives and Security Services .................. 79 3.3 Authentication .................................... 81 3.3.1 Authentication and its Separation from Identification .......... 83 3.3.2 Authentication and its Separation from Confidentiality .......... 84 3.4 Authentication Schemes ............................... 86 3.4.1 Authentication Scheme by Lamport .................... 86 3.4.2 Time Efficient Stream Loss-tolerant Authentication (TESLA) ...... 88 4 A Location Service Platform with Privacy Protection: Concept and Design 91 4.1 System Architecture, Components and Basic Service Platform Interactions ... 91 4.1.1 Some Preliminary Assumptions and Clarifications ............ 92 4.2 Proposed HMAC Pseudonym generation Scheme ................. 97 4.2.1 Performance Calculations .......................... 99 4.2.2 HMAC measurements ............................ 100 4.2.3 Hash value calculations ........................... 100 4.3 Service Operations .................................. 101 4.3.1 Message Interactions for User Subscriptions ................101 4.3.2 Message Interactions for a Single Location Request ............ 106 4.3.3 Recovery from Pseudonym Chain Errors ..................108 4.3.4 Communication Pattern ...........................109 4.3.5 Assessment according to the Classification Schemes ............109 4.3.6 What kind of Applications? ......................... 110 4.4 Functional Details of the Location Service Platform ...............111 4.4.1 User Registration ............................... 112 CONTENTS iii 4.4.2 Initialization of the Self-Identifying Pseudonym .............. 113 4.4.3 Initialization of a Pseudonym Chain .................... 116 4.4.4 Client Initiates First Service Call ...................... 116 4.4.5 User Submits Single Location Request ................... 117 4.4.6 User-initiated Location Update .......................117 4.5 Administration of Long-term Localizations .....................120 4.6 Pseudonyms with respect to Off-the-Record Messaging .............. 122 4.6.1 Authentication ................................ 123 4.6.2 Repudiability ................................. 124 4.6.3 Re-keying and forward-security ....................... 124 4.6.4 Assuring Confidentiality ........................... 125 4.7 Location-Based Services Usage across different Network Domains ........125 4.7.1 System Architecture View .......................... 126 4.8 Summary ....................................... 129 5 Implementation Aspects 133 5.1 Location Service performing Cell-based Localization ...............133 5.2 Location Service processing GPS Locations read from GPX files ........ 136 5.3 Motion Simulator Module .............................. 137 5.4 User Management .................................. 139 5.5 Management Interface ................................ 140 5.6 The Managmement Module ............................. 141 5.6.1 Possible Future Development on the Management Module ........142 5.7 Access and Update Strategies to Remote Resources ................143 5.7.1 Client Side Update Strategies ........................ 143 5.7.2 Network Services Access Strategies ..................... 145 5.8 Summary ....................................... 147 6 A Transport Ticket Demonstrator 149 6.1 The Transport Ticket Process ............................149 6.1.1 Ticket provisioning .............................. 150 6.1.2 Invoking the Mobile Application ...................... 151 6.1.3 Configuration of a Single Ticket ...................... 152 6.1.4 Configuration of a Route Ticket ...................... 153 6.1.5 Route Ticket Example with enabled Tracking Function .........156 6.2 Summary ....................................... 158 7 Conclusions and Future Work 159 Curriculum Vitae 177 iv CONTENTS List of Figures 2.1 Location Update in the GSM Network [1] ..................... 17 2.2 Business Model .................................... 45 2.3 Hitherto Business Model [2] ............................. 46 2.4 New Business Model [2] ............................... 47 2.5 Vision of Google 2084 [3] (p. 12) .......................... 49 2.6 Pamphlets against French Royal Couple Marie Antoinette and Ludwig XVI [4] 51 3.1 Classification Tree of Cryptographic Hash Functions [5] ............. 75 3.2 The HMAC Construction [6] ............................ 77 3.3 Lamports Authentication Scheme Based on Hash Values [7] ........... 87 3.4 Timed Efficient Stream Loss-Tolerant Authentication (TESLA) [8] ....... 89 4.1 System Architecture ................................. 93 4.2 User Subscription ................................... 102 4.3 Presentity requests and accepts Watcher’s Subscription request .........104 4.4 Completion of the Subscription Proccess ......................105 4.5 Message Interactions according to First Prototype Implementation ....... 107 4.6 Registration, Subscription and Initialization of User’s Pseudonym Chain ....112 4.7 Initialization of Self-Identifying Pseudonyms .................... 114 4.8 Initialization of Pseudonyms ............................. 117 4.9 Blocking getLocation(.) Request .........................118 4.10 User Initiates Location Update with GPS Coordinates ..............119 4.11 Start of Periodic Notification Process with Correlator 5522 ...........120 4.12 Management of Identities Maintained in Different Domains [9] ..........126 4.13 Periodic Notification of Location Updates over Different Network Domains [9] . 128 5.1 Detection, Adaption and Notification of Location Changes ............134 5.2 Location Service Processing Location Information Stored in GPX Files .....135 5.3 Instant Event Notification on Location Changes ..................138 5.4 Management Interface with Integration of Google Maps [10] ...........141 5.5 LocationEvent Updates and Processor .......................146 6.1 Ticket Configuration [11] ..............................