Providing Mobile Users' Anonymity in Hybrid Networks

被引:0
|
作者
Ardagna, Claudio A. [1 ]
Jajodia, Sushil [2 ]
Samarati, Pierangela [1 ]
Stavrou, Angelos [2 ]
机构
[1] Univ Milan, DTI, I-26013 Crema, Italy
[2] George Mason Univ, CSIS, Fairfax, VA 22030 USA
来源
基金
美国国家科学基金会;
关键词
PROTOCOL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices to connect to both WiFi and cellular networks. Unlike existing anonymity schemes, we consider all parties that can intercept communications between the mobile user and a server as potential privacy threats. We formally quantify the privacy exposure and the protection of our system in the presence of malicious neighboring peers, global WiFi eavesdroppers, and omniscient mobile network operators. We show how our system provides an automatic incentive for users to collaborate, since by forwarding packets for other peers users gain anonymity for their own traffic.
引用
收藏
页码:540 / +
页数:3
相关论文
共 50 条
  • [1] Providing Users' Anonymity in Mobile Hybrid Networks
    Ardagna, Claudio A.
    Jajodia, Sushil
    Samarati, Pierangela
    Stavrou, Angelos
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2013, 12 (03)
  • [2] FLASCHE - A mechanism providing anonymity for mobile users
    Zugenmaier, A
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2005, 3424 : 121 - 141
  • [3] On providing anonymity in wireless sensor networks
    Wadaa, A
    Olariu, S
    Wilson, L
    Eltoweissy, M
    Jones, K
    [J]. TENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 411 - 418
  • [4] Providing anonymity in wireless sensor networks
    Ouyang, Yi
    Le, Zhengyi
    Xu, Yurong
    Triandopoulos, Nikos
    Zhang, Sheng
    Ford, James
    Makedon, Fillia
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 145 - 148
  • [5] Using group anonymity to hide the identity of VoIP mobile users communicating over hybrid networks while preserving quality of service
    Sabra, Zahraa
    Artail, Hassan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (17): : 2792 - 2808
  • [6] On providing sink anonymity for wireless sensor networks
    Ngai, Edith C. -H.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) : 77 - 86
  • [7] Providing Desirable Data to Users when Integrating Wireless Sensor Networks with Mobile Cloud
    Zhu, Chunsheng
    Leung, Victor C. M.
    Wang, Hai
    Chen, Wei
    Liu, Xiulong
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 607 - 614
  • [8] Providing differentiated services to mobile IP users
    Braun, T
    Stattenberger, G
    [J]. LCN 2001: 26TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2001, : 89 - 90
  • [9] Anonymity and Security in Mobile Ad Hoc Networks
    Bolla, Jhansi Vazram
    Vatsavayi, Valli Kumari
    Murthy, J. V. R.
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 71 - +
  • [10] Mobile anonymity of dynamic groups in vehicular networks
    Xi, Yong
    Shi, Weisong
    Schwiebert, Loren
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (03) : 219 - 231