Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Design and Evaluation of Anonymity Solutions for Mobile Networks
Karlstad University, Faculty of Economic Sciences, Communication and IT.
2007 (English)Doctoral thesis, comprehensive summary (Other scientific)
Abstract [en]

Internet and mobile communications have had a profound effect on today's society. New services are constantly being deployed, in which personal data are being processed in return for personally tailored services. While mobile networks lay the groundwork for new innovative services, at the same time they pose numerous privacy challenges. There is the risk that honest citizens participating in mobile communications will have their privacy invaded for "the greater good". We argue that it is highly important that individuals are empowered to retain control over their personal spheres. Thus, the goal of this thesis is to design and evaluate anonymous overlay networks} adapted for mobile networks that allow users to control which information leaves their personal spheres in a mobile communication.

Technically, by using an anonymous overlay network, users can communicate with their communication partners without disclosing their network identities. In this thesis, we propose three different anonymous overlay networks tailored for mobile networks. First, two approaches are proposed for anonymous browsing on the mobile Internet, namely mCrowds and a Tor-based approach. By applying theoretical analysis and\,/\,or practical experiments, we show that these approaches offer an appropriate trade-off between the offered degree of anonymity and performance loss. Second, an anonymous overlay network for use in mobile ad hoc networks - Chameleon - is suggested.

Besides the actual design of these anonymous overlay networks, this thesis provides novel contributions in other essential areas of privacy protection and anonymous communication. First, also non-technical aspects of privacy protection are thoroughly discussed, including legal, social, and user interface aspects. Second, we survey existing metrics for quantifying anonymity and also propose new ideas regarding anonymity metrics. Third, we review and classify existing mechanisms for anonymous communication in mobile ad hoc networks. Lastly, we also propose a cryptographic technique for building up the user base of an anonymous overlay network in a secure and privacy-friendly manner.

Place, publisher, year, edition, pages
Fakulteten för ekonomi, kommunikation och IT , 2007.
Series
Karlstad University Studies, ISSN 1403-8099 ; 2007:48
Keywords [en]
privacy, anonymity, anonymous overlay networks, anonymity metrics, pseudonymity, identity management, mobile Internet, location based services, mobile ad hoc networks
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-1282ISBN: 978-91-7063-152-8 (print)OAI: oai:DiVA.org:kau-1282DiVA, id: diva2:5144
Public defence
2008-01-21, Sjöströmssalen, 1B 309, Karlstads universitet, Karlstad, 13:00
Opponent
Supervisors
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2018-01-12
List of papers
1. Privacy Risks and Challenges for the Mobile Internet
Open this publication in new window or tab >>Privacy Risks and Challenges for the Mobile Internet
2004 (English)In: Proceedings of the IEEE Summit on Law and Computing, 2004, p. 98-118Conference paper, Published paper (Other academic)
Identifiers
urn:nbn:se:kau:diva-1948 (URN)
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2010-09-22Bibliographically approved
2. On the Fundamentals of Anonymity Metrics
Open this publication in new window or tab >>On the Fundamentals of Anonymity Metrics
2007 (English)In: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/ 11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society / [ed] Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato and Leonardo Martucci, 2007Conference paper, Published paper (Refereed)
National Category
Computer Sciences
Identifiers
urn:nbn:se:kau:diva-1949 (URN)
Conference
The IFIP WG 9.2, 9.6/11.7, 11.6/FIDIS Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4-10, 2007
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2018-01-12Bibliographically approved
3. Privacy-Enhanced WAP Browsing with mCrowds: Anonymity Properties and Performance Evaluation of the mCrowds System
Open this publication in new window or tab >>Privacy-Enhanced WAP Browsing with mCrowds: Anonymity Properties and Performance Evaluation of the mCrowds System
2004 (English)Conference paper, Published paper (Refereed)
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-1950 (URN)
Conference
The 4th Annual Information Security South Africa Conference (ISSA 2004)
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2018-06-04Bibliographically approved
4. Practical Anonynous Communication on the Mobile Internet using Tor
Open this publication in new window or tab >>Practical Anonynous Communication on the Mobile Internet using Tor
2007 (English)In: Proceedings of the 3rd International Workshop on the Value of Security through Collaboration (SEVOCAL 2007), 2007Conference paper, Published paper (Other academic)
Identifiers
urn:nbn:se:kau:diva-1951 (URN)
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2010-09-09Bibliographically approved
5. Requirements for Privacy-Enhancements for Mobile Ad Hoc Networks
Open this publication in new window or tab >>Requirements for Privacy-Enhancements for Mobile Ad Hoc Networks
2005 (English)In: 3rd German Workshop on Ad Hoc Networks  (WMAN 2005): Proceedings of Informatik 2005 - Informatik LIVE! Band 2, 2005, p. 344-348Conference paper, Published paper (Other academic)
Identifiers
urn:nbn:se:kau:diva-1952 (URN)
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2010-09-22Bibliographically approved
6. Towards Anonymity in Mobile Ad Hoc Networks: The Chameleon Protocol and its Anonymity Analysis
Open this publication in new window or tab >>Towards Anonymity in Mobile Ad Hoc Networks: The Chameleon Protocol and its Anonymity Analysis
2006 (English)Report (Other scientific)
Abstract [en]

This paper presents Chameleon, a novel anonymous overlay network for mobile ad hoc environments. As far we know, Chameleon is the first low-latency anonymous overlay network applied in a mobile ad hoc setting. It was designed with the special characteristics of mobile ad hoc networks in mind, such as limited battery lifetime, user mobility and vanishing nodes. In this paper, we also evaluate Chameleon against a number of requirements that an anonymous overlay network should adhere to in order to be suitable for mobile ad hoc networks. In particular, the anonymity properties of Chameleon are thoroughly analyzed.

Place, publisher, year, edition, pages
Fakulteten för ekonomi, kommunikation och IT, 2006. p. 23
Series
Karlstad University Studies, ISSN 1403-8099 ; 2006:35
Keywords
anonymous communication mechanisms, mobile ad hoc networks, privacy
National Category
Computer Sciences
Identifiers
urn:nbn:se:kau:diva-1343 (URN)91-7063-066-6 (ISBN)
Available from: 2008-01-29 Created: 2008-01-29 Last updated: 2018-01-12
7. Privacy & Anonymity in Mobile Ad Hoc Networks
Open this publication in new window or tab >>Privacy & Anonymity in Mobile Ad Hoc Networks
2008 (English)In: Handbook of Research on Wireless Security / [ed] Yan Zhang, Jun Zheng & Miao Ma, IGI Global , 2008Chapter in book (Other academic)
Place, publisher, year, edition, pages
IGI Global, 2008
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-1954 (URN)10.4018/978-1-59904-899-4 (DOI)9781599048994 (ISBN)
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2020-07-10Bibliographically approved
8. Self-certified Sybil-Free Pseudonyms: Introducing Privacy in Infrastructureless Wireless Networks
Open this publication in new window or tab >>Self-certified Sybil-Free Pseudonyms: Introducing Privacy in Infrastructureless Wireless Networks
(English)Manuscript (Other academic)
Identifiers
urn:nbn:se:kau:diva-1955 (URN)
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2010-09-09Bibliographically approved
9. Trust in PRIME
Open this publication in new window or tab >>Trust in PRIME
Show others...
2005 (English)In: Proceedings of the 5th IEEE International Symposium on Signal Processing and IT, IEEE conference proceedings, 2005, p. 552-559Conference paper, Published paper (Other academic)
Abstract [en]

The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end user's trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2005
National Category
Computer Sciences Information Systems
Research subject
Computer Science; Information Systems
Identifiers
urn:nbn:se:kau:diva-1956 (URN)10.1109/ISSPIT.2005.1577157 (DOI)0-7803-9313-9 (ISBN)
Conference
the 5th IEEE International Symposium on Signal Processing and IT, 21-21 Dec. 2005, Athens
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2018-06-04Bibliographically approved

Open Access in DiVA

fulltext(1500 kB)2602 downloads
File information
File name FULLTEXT01.pdfFile size 1500 kBChecksum SHA-1
3009932bcd35246d05d8f3a3fc3d5e334096af11663c733d18d31a5812d34af9640cb8ff
Type fulltextMimetype application/pdf

By organisation
Faculty of Economic Sciences, Communication and IT
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 2607 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 924 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf