NXG01-5: Privacy through Virtual Hording
- 1 November 2006
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Globecom 2006
Abstract
The wireless digital lifestyle comes to the expense of less privacy and security. This environment is prone to be monitored by rogue users, eager to learn from our lifestyle habits and use them for their own profit. The IP protocol provides very few mechanisms, in order to safeguard user privacy and impair efficient data-mining of user habits. This paper will address an identity architecture that makes use of both data (L2) and network (L3) layer identifiers in order to provide a pseudonimization function, based on virtual hoarding concepts. Our proposal is especially interesting when able to exploit the broadcast and promiscuous nature of wireless communications that usually is regarded as a security concern. A prototype implementation has been developed and tested.Keywords
This publication has 8 references indexed in Scilit:
- Host Identity Protocol (HIP) ArchitecturePublished by RFC Editor ,2006
- Mobility Support in IPv6Published by RFC Editor ,2004
- SIP: Session Initiation ProtocolPublished by RFC Editor ,2002
- A protocol for anonymous communication over the InternetPublished by Association for Computing Machinery (ACM) ,2000
- CrowdsACM Transactions on Information and System Security, 1998
- Security Architecture for the Internet ProtocolPublished by RFC Editor ,1998
- Anonymous connections and onion routingIEEE Journal on Selected Areas in Communications, 1998
- SOCKS Protocol Version 5Published by RFC Editor ,1996