skip to main content
10.1145/1179601.1179612acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Privacy management for secure mobility

Published: 30 October 2006 Publication History

Abstract

Anonymous Internet access has been researched extensively and many proposals exist for enhancing the privacy of users. However, there are vast amounts of legacy authentication systems that do not take the privacy of the users into consideration. Many networks use, for example, MAC address or IP address based authentication, despite of their limited security properties. These authentication systems hinder the possibility to use e.g. pseurandom MAC addresses for privacy protection. In this paper, we propose a privacy management system for layers below the transport layer in the IP stack. Our implementation allows the users to decide their privacy parameters depending on their current situation. The implementation uses the Host Identity Protocol to provide authenticated and secure seamless handovers for mobile nodes. The approach is also applicable to an IP stack without the Host Identity Protocol.

References

[1]
J. Arkko, P. Nikander, and M. Näslund. Enhancing privacy with shared pseudo random sequences. In Security Protocols, 13rd International Workshop, Apr. 2005.
[2]
T. Aura and A. Zugenmaier. Privacy, control and internet mobility. In Security Protocols, 12th International Workshop, Apr. 2004.
[3]
A. Escudero-Pascual. Privacy in the next generation Internet: Data protection in the context of European Union policy. PhD thesis, Royal Institute of Technology, 2002.
[4]
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis. In ACM WMASH, Sept. 2003.
[5]
D. Hong, M. Yuan, and V. Y. Shen. Dynamic Privacy Management: a Plug-in Service for the Middleware in Pervasive Computing. In MobileHCI'05, Sept. 2005.
[6]
S. Katti, D. Katabi, and K. Puchala. Slicing the Onion: Anonymous Routing without PKI. In HotNets IV, Nov. 2005.
[7]
R. Moskowitz and P. Nikander. RFC 4423: Host Identity Protocol (HIP) Architecture, May 2006.
[8]
R. Moskowitz, P. Nikander, P. Jokela, and T. Henderson. Host Identity Protocol, June 2006. Internet-Draft (work in progress). Expires: Dec. 2006.
[9]
R. Moskowitz, P. Nikander, P. Jokela, and T. Henderson. Using ESP transport format with HIP, June 2006. Internet-Draft (work in progress). Expires: Dec. 2006.
[10]
T. Narten and R. Draves. RFC 3041: Privacy Extensions for Stateless Address Autoconfiguration in IPv6, Jan. 2001.

Cited By

View all
  • (2012)Enterprise Network Packet Filtering for Mobile Cryptographic IdentitiesEmergent Trends in Personal, Mobile, and Handheld Computing Technologies10.4018/978-1-4666-0921-1.ch005(75-89)Online publication date: 2012
  • (2010)Enterprise Network Packet Filtering for Mobile Cryptographic IdentitiesInternational Journal of Handheld Computing Research10.4018/jhcr.20100909051:1(79-94)Online publication date: Jan-2010
  • (2009)A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted ModuleThe KIPS Transactions:PartC10.3745/KIPSTC.2009.16-C.3.33516C:3(335-346)Online publication date: 30-Jun-2009
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic society
October 2006
128 pages
ISBN:1595935568
DOI:10.1145/1179601
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. host identity protocol
  3. mobility
  4. privacy

Qualifiers

  • Article

Conference

CCS06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2012)Enterprise Network Packet Filtering for Mobile Cryptographic IdentitiesEmergent Trends in Personal, Mobile, and Handheld Computing Technologies10.4018/978-1-4666-0921-1.ch005(75-89)Online publication date: 2012
  • (2010)Enterprise Network Packet Filtering for Mobile Cryptographic IdentitiesInternational Journal of Handheld Computing Research10.4018/jhcr.20100909051:1(79-94)Online publication date: Jan-2010
  • (2009)A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted ModuleThe KIPS Transactions:PartC10.3745/KIPSTC.2009.16-C.3.33516C:3(335-346)Online publication date: 30-Jun-2009
  • (2009)Privacy-preserving 802.11 access-point discoveryProceedings of the second ACM conference on Wireless network security10.1145/1514274.1514293(123-130)Online publication date: 16-Mar-2009
  • (2008)Protecting privacy with protocol stack virtualizationProceedings of the 7th ACM workshop on Privacy in the electronic society10.1145/1456403.1456416(65-74)Online publication date: 27-Oct-2008
  • (2008)Random Beacon for Privacy and Group SecurityProceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication10.1109/WiMob.2008.91(514-519)Online publication date: 12-Oct-2008
  • (2008)Chattering LaptopsProceedings of the 8th international symposium on Privacy Enhancing Technologies10.1007/978-3-540-70630-4_11(167-186)Online publication date: 23-Jul-2008
  • (2007)Securing network location awareness with authenticated DHCP2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 200710.1109/SECCOM.2007.4550359(391-402)Online publication date: Sep-2007
  • (2006)IPv6 Stateless Address Autoconfiguration Considered HarmfulMILCOM 200610.1109/MILCOM.2006.302471(1-5)Online publication date: Oct-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media