Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks
Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus "sniff on", each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm self- organized location privacy. In this work, we focus on the problem of self- organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self- organized anonymous authentication in mobile networks.
FreudigerRH09.pdf
openaccess
362.68 KB
Adobe PDF
af1537c686ab698459db14b286b994e2
FreudigerRH2009Securecomm_1.pptx
openaccess
2.25 MB
Microsoft Powerpoint XML
a0e8a561b700ced39d41dcaa817cb43c