skip to main content
10.1145/1734583.1734593acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
research-article

I am a sensor, and I approve this message

Published:22 February 2010Publication History

ABSTRACT

Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera.

This paper presents a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We present two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.

References

  1. AMD. AMD64 Architecture Programmer's Manual, Volume 2, 2009. http://www.amd.com/us-en/assets/content_type/white_papers_and_tech_docs/24593.pdf.Google ScholarGoogle Scholar
  2. App Games. Swine Flu Tracker Map iPhone Game, 2009. http://www.1888freeonlinegames.com/iphonegames/free-swine-flu-tracker-map-119.html.Google ScholarGoogle Scholar
  3. E. Brickell, J. Camenisch, and L. Chen. Direct Anonymous Attestation. In Proc. of 11th CCS, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless Device Identification using Radiometric Signatures. In Proc. of 14th Mobicom, September 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Dua, N. Bulusu, and W. chang Feng. Towards Trustworthy Participatory Sensing. In Proc. of the 4th HotSec, August 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. U. Feige and A. Shamir. Witness indistinguishable and witness hiding protocols. In Proceedings of 22nd STOC, Baltimore, MD, May 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Fretzagias and M. Papadopouli. Cooperative location-sensing for wireless networks. In Proceedings of the 2nd PerCom, Orlando, FL, March 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Ganeriwal and M. B. Srivastava. Reputation-based framework for high integrity sensor networks. In Proceedings of the ACM Workshop on Security in Ad-hoc & Sensor Networks (SASN), Washington, DC, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Gilber, L. P. Cox, J. Jung, and D. Wetherall. Toward trustworhy participatory sensing. In Proceedings of the 11th HotMobile, Annapolis, MD, February 2010.Google ScholarGoogle Scholar
  10. S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. In Proceedings of the 17th STOC, Providence, RI, May 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Goldwasser and E. Waisbard. Efficient transformation of well known signature schemes into designated confirmer signature schemes. TR: MCS03-13, The Weizmann Institute of Science, 2003.Google ScholarGoogle Scholar
  12. Google. Panoramio -- Photos of the World, 2009. http://www.panoramio.com.Google ScholarGoogle Scholar
  13. R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy. Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks. In Proc. of the 6th NSDI, April 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. U. Hengartner. location privacy based on trusted computing and secure logging. In Proc. of the 4th SecureComm, September 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Intel. Intel Trusted Execution Technology, 2009. http://download.intel.com/technology/security/downloads/315168.pdf.Google ScholarGoogle Scholar
  16. V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi. Location-based Trust for Mobile User-generated Content: Applications, Challenges and Implementations. In Proc. of the 9th HotMobile, February 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Liu, P. Ning, and W. Du. Attack-resistant location estimation in sensor networks. In Proceedings of the 4th IPSN, Los Angeles, CA, April 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Mohan, V. Padmanabhan, and R. Ramjee. Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In Proc. of the 6th SenSys, November 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Paulos, R. Honicky, and E. Goodman. Sensing Atmosphere. In Proc. of the Workshop on Everyday Mobile Phones in Support of Participatory Research, November 2007.Google ScholarGoogle Scholar
  20. Purdue University. Cell phone sensors detect radiation to thwart nuclear terrorism, 2008. http://www.purdue.edu/UNS/x/2008a/080122FischbachNuclear.html.Google ScholarGoogle Scholar
  21. S. Saroiu and A. Wolman. Enabling new mobile applications with location proofs. In Proc. of 10th HotMobile, February 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Skyhook Wireless. Skyhook, 2009. http://www.skyhookwireless.com.Google ScholarGoogle Scholar
  23. N. O. Tippenhauer, K. Rasmussen, C. Popper, and S. Capkun. Attacks on public wlan-based positioning systems. In Proc. of the 7th MobiSys, June 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman. Lockr: Better Privacy for Social Networks. In Proc. of the 5th coNEXT, December 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Trusted Computing Group. TMP Specification version 1.2, 2009. www.trustedcomputinggroup.org/specs/TPM/.Google ScholarGoogle Scholar
  26. Wi-Fi FreeSpot. Directory, 2009. http://www.wififreespot.com.Google ScholarGoogle Scholar
  1. I am a sensor, and I approve this message

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
        February 2010
        99 pages
        ISBN:9781450300056
        DOI:10.1145/1734583

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 February 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate96of345submissions,28%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader