Internet and mobile communications have had a profound effect on today’s society. New services are constantly being deployed, in which an increasing amount of personal data is being processed in return for personally tailored services. Further, the use of electronic surveillance is increasing. There is the risk that honest citizens will have their privacy invaded for “the greater good”. We argue that it is of uttermost importance to retain the individuals’ control over their personal spheres. One approach for enhancing the users’ privacy is to deploy technical measures for safeguarding privacy, so-called Privacy-Enhancing Technologies (PETs). This thesis examines a set of PETs for enabling anonymous communication, so-called anonymous overlay networks,which eliminate the processing of personal data altogether by allowing the users act anonymously when communicating in a networked environment. This thesis focuses mainly on mobile networks. These are of great interest because on the one hand they lay the groundwork for new innovative applications, but on the other hand they pose numerous novel challenges to privacy. This thesis describes the implementation and performance evaluation of mCrowds – an anonymous overlay network for mobile Internet that enables anonymous browsing. It also describes the ongoing investigation on how to design anonymous overlay networks in order to make them suitable for mobile ad hoc networks, a required building block for ambient intelligence.
[1]
Robert Tappan Morris,et al.
Tarzan: a peer-to-peer anonymizing network layer
,
2002,
CCS '02.
[2]
Aravind Srinivasan,et al.
P/sup 5/ : a protocol for scalable anonymous communication
,
2002,
Proceedings 2002 IEEE Symposium on Security and Privacy.
[3]
Emin Gün Sirer,et al.
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
,
2003
.
[4]
Aravind Srinivasan,et al.
P/sup 5/ : a protocol for scalable anonymous communication
,
2002,
Proceedings 2002 IEEE Symposium on Security and Privacy.
[5]
B. Bhattacharjee,et al.
A Protocol for Scalable Anonymous Communication
,
1999
.
[6]
Wilson Vicente Ruggiero,et al.
A Trust-Based Security Architecture for Small and Medium-Sized Mobile Ad Hoc Networks
,
2004
.
[7]
Bernhard Plattner,et al.
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection
,
2002,
WPES '02.
[8]
David Chaum,et al.
Untraceable electronic mail, return addresses, and digital pseudonyms
,
1981,
CACM.
[9]
Michael K. Reiter,et al.
Crowds: anonymity for Web transactions
,
1998,
TSEC.
[10]
Brian Neil Levine,et al.
A protocol for anonymous communication over the Internet
,
2000,
CCS.
[11]
David Chaum,et al.
The dining cryptographers problem: Unconditional sender and recipient untraceability
,
1988,
Journal of Cryptology.