NXG01-5: Privacy through Virtual Hording

The wireless digital lifestyle comes to the expense of less privacy and security. This environment is prone to be monitored by rogue users, eager to learn from our lifestyle habits and use them for their own profit. The IP protocol provides very few mechanisms, in order to safeguard user privacy and impair efficient data-mining of user habits. This paper will address an identity architecture that makes use of both data (L2) and network (L3) layer identifiers in order to provide a pseudonimization function, based on virtual hoarding concepts. Our proposal is especially interesting when able to exploit the broadcast and promiscuous nature of wireless communications that usually is regarded as a security concern. A prototype implementation has been developed and tested.

[1]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[2]  Matt Ganis,et al.  SOCKS Protocol Version 5 , 1996, RFC.

[3]  Brian Neil Levine,et al.  A protocol for anonymous communication over the Internet , 2000, CCS.

[4]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[5]  Pekka Nikander,et al.  Host Identity Protocol , 2005 .

[6]  Steven McCanne,et al.  The BSD Packet Filter: A New Architecture for User-level Packet Capture , 1993, USENIX Winter.

[7]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[8]  T. Dierks,et al.  The TLS protocol , 1999 .

[9]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[10]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..