Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Towards Anonymity in Mobile Ad Hoc Networks: The Chameleon Protocol and its Anonymity Analysis
Karlstad University, Faculty of Economic Sciences, Communication and IT.
Karlstad University, Faculty of Economic Sciences, Communication and IT.
Karlstad University, Faculty of Economic Sciences, Communication and IT.
2006 (English)Report (Other scientific)
Abstract [en]

This paper presents Chameleon, a novel anonymous overlay network for mobile ad hoc environments. As far we know, Chameleon is the first low-latency anonymous overlay network applied in a mobile ad hoc setting. It was designed with the special characteristics of mobile ad hoc networks in mind, such as limited battery lifetime, user mobility and vanishing nodes. In this paper, we also evaluate Chameleon against a number of requirements that an anonymous overlay network should adhere to in order to be suitable for mobile ad hoc networks. In particular, the anonymity properties of Chameleon are thoroughly analyzed.

Place, publisher, year, edition, pages
Fakulteten för ekonomi, kommunikation och IT , 2006. , p. 23
Series
Karlstad University Studies, ISSN 1403-8099 ; 2006:35
Keywords [en]
anonymous communication mechanisms, mobile ad hoc networks, privacy
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kau:diva-1343ISBN: 91-7063-066-6 (print)OAI: oai:DiVA.org:kau-1343DiVA, id: diva2:5219
Available from: 2008-01-29 Created: 2008-01-29 Last updated: 2018-01-12
In thesis
1. Design and Evaluation of Anonymity Solutions for Mobile Networks
Open this publication in new window or tab >>Design and Evaluation of Anonymity Solutions for Mobile Networks
2007 (English)Doctoral thesis, comprehensive summary (Other scientific)
Abstract [en]

Internet and mobile communications have had a profound effect on today's society. New services are constantly being deployed, in which personal data are being processed in return for personally tailored services. While mobile networks lay the groundwork for new innovative services, at the same time they pose numerous privacy challenges. There is the risk that honest citizens participating in mobile communications will have their privacy invaded for "the greater good". We argue that it is highly important that individuals are empowered to retain control over their personal spheres. Thus, the goal of this thesis is to design and evaluate anonymous overlay networks} adapted for mobile networks that allow users to control which information leaves their personal spheres in a mobile communication.

Technically, by using an anonymous overlay network, users can communicate with their communication partners without disclosing their network identities. In this thesis, we propose three different anonymous overlay networks tailored for mobile networks. First, two approaches are proposed for anonymous browsing on the mobile Internet, namely mCrowds and a Tor-based approach. By applying theoretical analysis and\,/\,or practical experiments, we show that these approaches offer an appropriate trade-off between the offered degree of anonymity and performance loss. Second, an anonymous overlay network for use in mobile ad hoc networks - Chameleon - is suggested.

Besides the actual design of these anonymous overlay networks, this thesis provides novel contributions in other essential areas of privacy protection and anonymous communication. First, also non-technical aspects of privacy protection are thoroughly discussed, including legal, social, and user interface aspects. Second, we survey existing metrics for quantifying anonymity and also propose new ideas regarding anonymity metrics. Third, we review and classify existing mechanisms for anonymous communication in mobile ad hoc networks. Lastly, we also propose a cryptographic technique for building up the user base of an anonymous overlay network in a secure and privacy-friendly manner.

Place, publisher, year, edition, pages
Fakulteten för ekonomi, kommunikation och IT, 2007
Series
Karlstad University Studies, ISSN 1403-8099 ; 2007:48
Keywords
privacy, anonymity, anonymous overlay networks, anonymity metrics, pseudonymity, identity management, mobile Internet, location based services, mobile ad hoc networks
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-1282 (URN)978-91-7063-152-8 (ISBN)
Public defence
2008-01-21, Sjöströmssalen, 1B 309, Karlstads universitet, Karlstad, 13:00
Opponent
Supervisors
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2018-01-12

Open Access in DiVA

fulltext(467 kB)389 downloads
File information
File name FULLTEXT01.pdfFile size 467 kBChecksum MD5
de986ce06c0a04e11ca970671fd43eb61df52e0e49b05b71d259ed560214640fd28a9051
Type fulltextMimetype application/pdf

By organisation
Faculty of Economic Sciences, Communication and IT
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 389 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 142 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf