Privacy, Control and Internet Mobility

This position paper explores privacy issues created by mobile and wireless Internet access. We consider the information about the user’s identity, location, and the serviced accessed that is necessarily or unnecessarily revealed observers, including the access network, intermediaries within the Internet, and the peer endpoints. In particular, we are interested in data that can be collected from packet headers and signaling messages and exploited to control the user’s access to communications resources and online services. We also suggest some solutions to reduce the amount of information that is leaked.

[1]  Frank Stajano Security in Pervasive Computing , 2003, SPC.

[2]  Marco Gruteser,et al.  On the Anonymity of Periodic Location Samples , 2005, SPC.

[3]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[4]  Stephen E. Deering,et al.  IP Version 6 Addressing Architecture , 1995, RFC.

[5]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[6]  Charles E. Perkins,et al.  IP Mobility Support , 1996, RFC.

[7]  Matt Holdrege,et al.  IP Network Address Translator (NAT) Terminology and Considerations , 1999, RFC.

[8]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[9]  Alf Zugenmaier,et al.  Anonymität für Benutzer mobiler Geräte durch Ortsadressierung = Anonymity for users of mobile devices through location addressing , 2003 .

[10]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[11]  Hannes Federrath,et al.  Location management strategies increasing privacy in mobile communication , 1996, SEC.

[12]  Thomas Narten,et al.  Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2001, RFC.

[13]  Andrei Serjantov,et al.  On the anonymity of anonymity systems , 2004 .

[14]  Pekka Nikander,et al.  Integrating Security, Mobility and Multi-Homing in a HIP Way , 2003, NDSS.

[15]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[16]  Hannes Federrath,et al.  MIXes in Mobile Communication Systems: Location Management with Privacy , 1996, Information Hiding.

[17]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.