Skip to main content

FLASCHE – A Mechanism Providing Anonymity for Mobile Users

  • Conference paper
Book cover Privacy Enhancing Technologies (PET 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3424))

Included in the following conference series:

Abstract

The protection goal anonymity helps to preserve the privacy of us ers by ensuring that their identity remains unknown. Many mechanisms ena bling anonymity exist. However, these mechanisms work inefficiently when used in mobile wireless networks. This contribution shows how anonymity can be provided efficiently for mobile users by exploiting the fact that they are mobile. A possible realization, called FLASCHE, is described.

Part of this work was done while the author was at the University of Freiburg

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jendricke, U., Markotten, D.G.t.: Usability meets Security - The Identity- Manager as your Personal Security Assistant for the Internet. In: Proceedings of the 16th Annual Computer Security Applications Conference, pp. 344–353 (December 2000)

    Google Scholar 

  2. Common Criteria for Information Technology Security Evaluation. Part 2: Security Func tional Requirements. Version 2.1 (August 1999)

    Google Scholar 

  3. Rannenberg, K., Pfitzmann, A., Müller, G.: Sicherheit, insbesondere mehrseitige IT-Sicherheit. In: Müller, G., Pfitzmann, A. (eds.) Komponenten, Integration, Mehrseitige Sicherheit in der Kommunikationstechnik, vol. 1, pp. 21–29. Addison Wesley Bonn, Reading (1997)

    Google Scholar 

  4. Rannenberg, K.: Zertifizierung mehrseitiger IT-Sicherheit: Kriterien und organisatorische Rahmenbedingungen. Vieweg Wiesbaden (1998)

    Google Scholar 

  5. Clarke, R.: Identified, Anonymous and Pseudonymous Transactions: The Spectrum of Choice. In: Proceedings of the User Identification & Privacy Protection Conference, September 1999 (1999), http://www.ana.edu.au/people/Roger.Clarke/DV/UIPP99.html (accessed on March 1, 2002)

  6. Pfitzmann, A., Köhntopp, M.: Anonymity, Unobservability, and Pseudonymity A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Shmatikov, V., Hughes, D.: Defining Anonymity and Privacy(extended abstract). In: Workshop on Issues in the Theory of Security (WITS 2002) (2002)

    Google Scholar 

  8. Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. Technical Report SRI-CSL-98, Computer Science Laboratory, SRI (1998)

    Google Scholar 

  9. Chaum, D.: The dining cryptographers problem: unconditional sender and recipient un-traceability. Journal of Cryptology 1(1), 65–75 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  10. Waidner, M., Pfitzmann, B.: Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks. In: Fakultät für Informatik, Universität Karlsruhe, Interner Bericht 5/89 (March 1989), http://www.semper.org/sirene/publ/WaPf_89IB_DCandFailStop.ps.gz (accessed on May 24, 2002)

  11. Martin, D.: Local Anonymtiy in the Internet. Ph. D. Thesis, Boston University of Computer Science (1999)

    Google Scholar 

  12. Borning, M., Kesdogan, D., Spaniol, O.: Anonymität und Unbeobachtbarkeit im Internet (Anonymity and Untraceability in the Internet). it+ti Informationstechnik und Technische Informatik 5(43), 246–253 (2001)

    Google Scholar 

  13. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 2(24), 84–88 (1981)

    Article  Google Scholar 

  14. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)

    Google Scholar 

  15. Kesdogan, D., Egner, J., Büschkes, R.: Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 83–98. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  16. Berthold, O., Federrath, H., Köpsell, S.: Web MIXes: A System for Anonymous and Unobservable Internet Access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 115–129. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE Security and Privacy Symposium (2003)

    Google Scholar 

  18. Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and Systems Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  19. Foreman, G.H., Zahorjan, J.: The Challenges of Mobile Computing. IEEE Computer 6(27) (1994)

    Google Scholar 

  20. Narten, T., Draves, R.: Privacy Extensions for Stateless Autoconfiguration in IPv6 (January 2001), http://www.ietf.org/rfc/rfc3041.txt (accessed on June 21, 2002)

  21. Orava, P., Haverinen, H., Honkanen, J.-P., Edney, J.: Temporary MAC Addresses for Anonymity. Document 02/261 of the 802.11i working group (2002), http://grouper.ieee.org/groups/802/11/Documents/D2T251-300.html (accessed on June 6, 2003)

  22. Zugenmaier, A.: The Freiburg Privacy Diamond - A Conceptual Model for Mobility in Anonymity Mechanisms. Proceedings of IEEE Globecom 2003 (2003)

    Google Scholar 

  23. Zugenmaier, A., Kreutzer, M., Müller, G.: The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment, Kommunikation in Verteilten Systemen, KIVS 2003, Leipzig (2003)

    Google Scholar 

  24. Department of Defense MIL-STD-2401. World Geodetic System WGS84, http://164.214.2.59/publications/specs/printed/WGS84/wgs84.html (accessed on March 7, 2002)

  25. Krengel, U.: Einführung in die Wahrscheinlichkeitstheorie und Statistik, 4th edn. Vieweg Braunschweig/Wiesbaden (1998)

    Google Scholar 

  26. Wiese, H.: Das neue Internetprotokoll IPv6. Hanser Verlag München (2002)

    Google Scholar 

  27. Narten, T., Draves, R.: Privacy Extensions for Stateless Autoconfiguration in IPv6 (January 2001), http://www.ietf.org/rfc/rfc3041.txt (accessed on June 21, 2002)

  28. Anderson, R.: Security Engineering: A Guide to Building Dependable Systems. Wiley, Chichester (2001)

    Google Scholar 

  29. Bellovin, S.: Defending Against Sequence Number Attacks (May 1996), http://www.ietf.org/rfc/rfc1948.txt (accessed on July 30, 2002)

  30. Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol – HTTP/1.1 (June 1999), http://www.ietf.org/rfc/rfc2616.txt (accessed on May 21, 2002)

  31. Khare, R., Lawrence, S.: Upgrading to TLS Within HTTP/1.1 (May 2000), http://www.ietf.org/rfc/rfc2817.txt (accessed on May 21, 2002)

  32. Jendricke, U.: Der Identitätsmanager. Doctoral Thesis, Rhombos Verlag (2002)

    Google Scholar 

  33. Stevens, R.: Programmierung von UNIX-Netzwerken, 2nd edn. Hanser (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zugenmaier, A. (2005). FLASCHE – A Mechanism Providing Anonymity for Mobile Users. In: Martin, D., Serjantov, A. (eds) Privacy Enhancing Technologies. PET 2004. Lecture Notes in Computer Science, vol 3424. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11423409_9

Download citation

  • DOI: https://doi.org/10.1007/11423409_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26203-9

  • Online ISBN: 978-3-540-31960-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics