Anonymous Communication in Ubiquitous Computing Environments

作者: Min-Ho Park , Ju-Hyung Son , Seung-Woo Seo

DOI: 10.1007/S11277-009-9884-Z

关键词:

摘要: Wireless networks such as WLANs which have already been commonplace will play an important role in providing the last mile access for ubiquitous computing environments. However, wireless technologies are accompanied with some security vulnerabilities that stem from broadcasting medium. Although most of can be solved by existing countermeasures, there still exists vulnerability a message header. In networks, header part each message, including source and destination addresses, is transmitted plain-text format. This hole adversaries collecting revealed information traffic analysis attack breach privacy transmitter receiver. this paper, we focus on describing solution to problem, namely, undesirable loss privacy. Our main idea integrate address conventional Message Authentication Code (MAC) replace both fields MAC integrated code called Address-embedded (AMAC). Through detailed performance our scheme, show AMAC scheme guarantee network while provable level less overhead.

参考文章(13)
Michael K. Reiter, Aviel D. Rubin, Crowds: anonymity for Web transactions ACM Transactions on Information and System Security. ,vol. 1, pp. 66- 92 ,(1998) , 10.1145/290163.290168
Min-Ho Park, Seung-Woo Seo, A Pseudonym Assignment for the Last Mile Wireless Access to 4G Networks global communications conference. pp. 1- 6 ,(2007) , 10.1109/GLOCOMW.2007.4437782
Marco Gruteser, Dirk Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis Mobile Networks and Applications. ,vol. 10, pp. 315- 325 ,(2005) , 10.1007/S11036-005-6425-1
Clay Shields, Brian Neil Levine, A protocol for anonymous communication over the Internet computer and communications security. pp. 33- 42 ,(2000) , 10.1145/352600.352607
Ronggong Song, Larry Korba, George Yee, AnonDSR Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05. pp. 33- 42 ,(2005) , 10.1145/1102219.1102226
David L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms Communications of The ACM. ,vol. 24, pp. 84- 90 ,(1981) , 10.1145/358549.358563
F. Armknecht, J. Girao, A. Matos, R. L. Aguiar, Who Said That? Privacy at Link Layer ieee international conference computer and communications. pp. 2521- 2525 ,(2007) , 10.1109/INFCOM.2007.313
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall, Improving wireless privacy with an identifier-free link layer protocol Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08. pp. 40- 53 ,(2008) , 10.1145/1378600.1378607
Tao Jiang, Helen J. Wang, Yih-Chun Hu, Preserving location privacy in wireless lans Proceedings of the 5th international conference on Mobile systems, applications and services - MobiSys '07. pp. 246- 257 ,(2007) , 10.1145/1247660.1247689
A. Matos, R.L. Aguiar, J. Girao, F. Armnecht, Toward dependable networking: secure location and privacy at the link layer IEEE Wireless Communications. ,vol. 15, pp. 30- 36 ,(2008) , 10.1109/MWC.2008.4653129