Variable and scalable security: protection of location information in mobile IP

作者: A. Fasbender , D. Kesdogan , O. Kubitz

DOI: 10.1109/VETEC.1996.501454

关键词: Computer securityInternet securityComputer networkMobile computingMobile IPTraffic analysisInformation privacyThe InternetComputer scienceInternet ProtocolIP address management

摘要: The amount of mobile and nomadic computing is expected to increase dramatically in the near future. Hand hand with this ubiquitous security privacy problems show up, which have not been dealt sufficiently up now. main are traffic analysis easy access location information, for example popular Internet just by looking at address headers messages. need supporting networks discussed. We present nondisclosure method (NDM) as a way provide user variable scalable privacy. exemplarily demonstrate applicability NDM an existing network presenting upward compatible protocol extension (IP), secure IP protocol. Its design goal untraceability connections environments.

参考文章(8)
John Ioannidis, Gerald Q. Maguire Jr., The Design and Implementation of a Mobile Internetworking Architecture usenix winter technical conference. pp. 491- 502 ,(1993)
D.B. Johnson, Scalable and robust internetwork routing for mobile hosts international conference on distributed computing systems. pp. 2- 11 ,(1994) , 10.1109/ICDCS.1994.302384
David L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms Communications of The ACM. ,vol. 24, pp. 84- 90 ,(1981) , 10.1145/358549.358563
Andreas Pfitzmann, Hannes Federrath, Dogan Kesdogan, Anja Jerichow, Security in Public Mobile Communication Networks ,(1995)
Dogan Kesdogan, Olaf Kubitz, Andreas Fasbender, Analysis of Security and Privacy in Mobile-IP ,(1996)
R. Atkinson, Security Architecture for the Internet Protocol Security Architecture for the Internet Protocol. ,vol. 1825, pp. 1- 101 ,(1995)
Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner, ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead Kommunikation in verteilten Systemen. pp. 451- 463 ,(1991) , 10.1007/978-3-642-76462-2_32
David J. Farber, Kenneth C. Larson, NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING. Data Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ. ,(1975)