Providing Mobile Users' Anonymity in Hybrid Networks
نویسندگان
چکیده
We present a novel hybrid communication protocol that guarantees mobile users’ k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices to connect to both WiFi and cellular networks. Unlike existing anonymity schemes, we consider all parties that can intercept communications between the mobile user and a server as potential privacy threats. We formally quantify the privacy exposure and the protection of our system in the presence of malicious neighboring peers, global WiFi eavesdroppers, and omniscient mobile network operators. We show how our system provides an automatic incentive for users to collaborate, since by forwarding packets for other peers users gain anonymity for their own traffic.
منابع مشابه
Vehicular Networks: A Survey on Architecture, Communication Technologies and Applications
The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable. This system consists of many fixed and mobile nodes (Vehicles, Trains, Vessels, Air planes), Wireless and Wired Telecommunication Technologies to exchange information between mobile nodes or betwee...
متن کاملRadenkovic, Milena and Vaghi, Ivan and Zakhary, Sameh and Benslimane, Abderrahim (2013) AdaptAnon: adaptive anonymity for service queries in mobile opportunistic networks. In: 2013 IEEE International Conference on Communications
Social routing protocols are typically used to transfer messages among users and services in mobile opportunistic networks. Adaptive mechanisms are needed for achieving user anonymization and providing sufficient level of user anonymity due to the constant changes in underlying topology, mobility patterns and density of users and their queries. This paper describes a novel flexible and adaptive...
متن کاملA Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote service providers over mobile network operators which are assumed to be trusted and not improperly use or disclose users’ information. In this paper, we remove this assumption, offering privacy protection of users’ requests again t...
متن کاملDynamic Anonymity
Encryption protects communication partners from disclosure of their secret messages but cannot prevent traffic analysis and the leakage of information about “who communicates with whom”. In the presence of collaborating adversaries, this linkability of actions can danger anonymity. However, reliably providing anonymity is crucial in many applications. Especially in contextaware mobile business,...
متن کاملA Self-certified Mechanism for Mutual Authentication and Key Exchange in Roaming Services
In this paper, a novel mutual authentication and key exchange protocol based on self-certified mechanism is proposed for roaming services in the global mobility network (GLOMONET). The main new features of the proposed protocol include identity anonymity, one-time session key renewal, and distributed security management scheme. Identity anonymity protects location privacy of mobile users in the...
متن کامل