Privacy management for secure mobility

Janne Lindqvist, Laura Takkinen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Anonymous Internet access has been researched extensively and many proposals exist for enhancing the privacy of users. However, there are vast amounts of legacy authentication systems that do not take the privacy of the users into consideration. Many networks use, for example, MAC address or IP address based authentication, despite of their limited security properties. These authentication systems hinder the possibility to use e.g. pseurandom MAC addresses for privacy protection. In this paper, we propose a privacy management system for layers below the transport layer in the IP stack. Our implementation allows the users to decide their privacy parameters depending on their current situation. The implementation uses the Host Identity Protocol to provide authenticated and secure seamless handovers for mobile nodes. The approach is also applicable to an IP stack without the Host Identity Protocol.

Original languageEnglish (US)
Title of host publicationProceedings of the 5th ACM Workshop on Privacy in Electronic Society, WPES 2006, Co-located with the 13th ACM Conference on Computer and Communications Security, CCS 2006
Pages63-66
Number of pages4
DOIs
StatePublished - Dec 1 2006
Externally publishedYes
Event5th ACM Workshop on Privacy in Electronic Society, WPES 2006, Co-located with the 13th ACM Conference on Computer and Communications Security, CCS 2006 - Alexandria, VA, United States
Duration: Oct 30 2006Oct 30 2006

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other5th ACM Workshop on Privacy in Electronic Society, WPES 2006, Co-located with the 13th ACM Conference on Computer and Communications Security, CCS 2006
CountryUnited States
CityAlexandria, VA
Period10/30/0610/30/06

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Keywords

  • authentication
  • host identity protocol
  • mobility
  • privacy

Fingerprint Dive into the research topics of 'Privacy management for secure mobility'. Together they form a unique fingerprint.

Cite this