Abstract
Mobility and anonymity are two essential properties desirable in IP-based networks. In this paper, we aim to address the issue on how to achieve mobility and anonymity concurrently. At a glance, these two properties seem to be contradictory. This is partly due to the fact that there exists no single definition that clearly defines these notions. We approach this problem by firstly define these properties formally and address the problem of achieving these properties at the same time. Then, we proceed with a concrete construction based on an existing IP-based network, which is Tor. Without losing generality, our method can be applied to any other existing network, such as Morphmix or Tarzan. We highlight the difficulty of achieving mobility and anonymity concurrently although it seems trivial to merge these two properties altogether. Finally, we evaluate our proposed construction based on the definition that we have developed. Our work can be seen as the first attempt towards formalizing the notions of mobility, anonymity and location privacy.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Freedom Network, http://www.freedom.net/
Onion Router History, http://www.onion-router.net/history.html
Chaum, D.: Untraceable Electronic Mail, Return Address, and Digital Pseudonyms. Comm. of ACM 24(2), 84–88 (1981)
Choi, S., Kim, K., Kim, B.: Practical Solution for Location Privacy in Mobile IPv6. In: Chae, K.-J., Yung, M. (eds.) Information Security Applications. LNCS, vol. 2908, pp. 69–83. Springer, Heidelberg (2004)
Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards Measuring Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, Springer, Heidelberg (2003)
Droms, R.: Dynamic Host Configuration Protocol, RFC 2131 (1997)
Escudero-Pascual, A., Hdenfalk, M., Heselius, P.: Flying Freedom: Location Privacy in Mobile Internetworking. In: INET2001, CD-proceedings. (2001)
Fasbender, A., Kesdogan, D., Kubitz, O.: Analysis of Security and Privacy in Mobile IP. In: 4th International Conference on Telecommunication Systems Modeling and Analysis (1996)
Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: CCS 2002, USA (2002)
Goldberg, I.: A Pseudonymous Communications Infrastructure for the Internet. PhD thesis, UC Berkeley (2000)
Johnson, D., Perkins, C., Arkko, J.: IP Mobility Support for IPv6, RFC 3775 (2004)
Jones, A.: Anonymous Communication on the Internet (September 2004), http://www10.cs.rose-hulman.edu/Papers/Jones.pdf
Koodi, R.: IP Address Location Privacy and Mobile IPv6: Problem Statement RFC 4882 (May 2007)
Koponen, T., Gurtov, A., Nikander, P.: Application Mobility with HIP. In: Proc. ICT 2005 (2005)
Marc Rennhard, B.P.: Practical Anonymity for the Masses with Morphmix. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, Springer, Heidelberg (2004)
Montenegro, G.: Reverse Tunneling for Mobile IP, RFC 2344 (May 1998)
Perkins, C.: IP Mobility Support for IPv4, RFC 3344 (2002)
Reed, M., Syverson, P., Goldschlag, D.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications 16(4), 482–494 (1998)
Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur. 1(1), 66–92 (1998)
Roger Dingledine, P.S., Mathewson, N.: Tor: The Second-Generation Onion Router. In: Proc. of the 13th USENIX Security Symposium (2004)
Salkintzis, A.K. (ed.): Mobile Internet: enabling technologies and services. CRC Press, Boca Raton (2004)
Valko, A.G.: Cellular IP: a new approach to Internet host mobility. SIGCOMM Comput. Commun. Rev. 29(1), 50–65 (1999)
Wiangsripanawan, R., Susilo, W., Safavi-Naini, R.: Achieving Mobility and Anonymity in IP Based Networks (full version). Available upon request from the first author
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wiangsripanawan, R., Susilo, W., Safavi-Naini, R. (2007). Achieving Mobility and Anonymity in IP-Based Networks. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds) Cryptology and Network Security. CANS 2007. Lecture Notes in Computer Science, vol 4856. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76969-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-76969-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76968-2
Online ISBN: 978-3-540-76969-9
eBook Packages: Computer ScienceComputer Science (R0)