Providing mobile users' anonymity in hybrid networks

8Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

Abstract

We present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices to connect to both WiFi and cellular networks. Unlike existing anonymity schemes, we consider all parties that can intercept communications between the mobile user and a server as potential privacy threats. We formally quantify the privacy exposure and the protection of our system in the presence of malicious neighboring peers, global WiFi eavesdroppers, and omniscient mobile network operators. We show how our system provides an automatic incentive for users to collaborate, since by forwarding packets for other peers users gain anonymity for their own traffic. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Ardagna, C. A., Jajodia, S., Samarati, P., & Stavrou, A. (2010). Providing mobile users’ anonymity in hybrid networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6345 LNCS, pp. 540–557). Springer Verlag. https://doi.org/10.1007/978-3-642-15497-3_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free