Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks

Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus "sniff on", each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm self- organized location privacy. In this work, we focus on the problem of self- organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self- organized anonymous authentication in mobile networks.

Published in:
Conference on Security and Privacy in Communication Networks (Securecomm), 350-372
Presented at:
SECURECOMM, Athens, September 14-18, 2009

 Record created 2009-06-26, last modified 2018-03-18

FreudigerRH2009Securecomm_1 - Download fulltextPPTX
FreudigerRH09 - Download fulltextPDF
External link:
Download fulltextURL
Rate this document:

Rate this document:
(Not yet reviewed)