skip to main content
research-article

Providing Users’ Anonymity in Mobile Hybrid Networks

Published:01 May 2013Publication History
Skip Abstract Section

Abstract

We present a novel hybrid communication protocol that guarantees mobile users’ anonymity against a wide-range of adversaries by exploiting the capability of handheld devices to connect to both WiFi and cellular networks. Unlike existing anonymity schemes, we consider all parties that can intercept communications between a mobile user and a server as potential privacy threats. We formally quantify the privacy exposure and the protection of our system in the presence of malicious neighboring peers, global WiFi eavesdroppers, and omniscient mobile network operators, which possibly collude to breach user’s anonymity or disrupt the communication. We also describe how a micropayment scheme that suits our mobile scenario can provide incentives for peers to collaborate in the protocol. Finally, we evaluate the network overhead and attack resiliency of our protocol using a prototype implementation deployed in Emulab and Orbit, and our probabilistic model.

References

  1. Aiache, H., Haettel, F., Lebrun, L., and Tavernier, C. 2008. Improving security and performance of an ad hoc network through a multipath routing strategy. J. Comput. Virol. 4, 4, 267--278.Google ScholarGoogle ScholarCross RefCross Ref
  2. Allan, A. and Warden, P. 2011. Got an iPhone or 3G iPad? Apple is recording your moves. http://radar.oreilly.com/2011/04/apple-location-tracking.html (accessed 2/13).Google ScholarGoogle Scholar
  3. Androulaki, E., Raykova, M., Srivatsan, S., Stavrou, A., and Bellovin, S. M. 2008. PAR: Payment for anonymous routing. In Proceedings of the 8th Privacy Enhancing Technologies Symposium (PET’08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Anisetti, M., Ardagna, C. A., Bellandi, V., Damiani, E., and Reale, S. 2011. Map-based location and tracking in multipath outdoor mobile networks. IEEE Trans. Wirel. Comm. 10, 3, 814--824. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ardagna, C. A., Stavrou, A., Jajodia, S., Samarati, P., and Martin, R. 2008. A multi-path approach for k-anonymity in mobile hybrid networks. In Proceedings of the International Workshop on Privacy in Location-Based Applications (PILBA’08).Google ScholarGoogle Scholar
  6. Ardagna, C. A., Jajodia, S., Samarati, P., and Stavrou, A. 2009. Privacy preservation over untrusted mobile networks. In Privacy in Location-Based Applications: Research Issues and Emerging Trends, C. Bettini, S. Jajodia, P. Samarati, and S. Wang Eds., Lecture Notes of Computer Science, Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ardagna, C. A., Jajodia, S., Samarati, P., and Stavrou, A. 2010. Providing mobile users’ anonymity in hybrid networks. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ardagna, C. A., Cremonini, M., De Capitani di Vimercati, S., and Samarati, P. 2011a. An obfuscation-based approach for protecting location privacy. IEEE Trans. Depend. Secure Comput. 8, 1, 13--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ardagna, C. A., De Capitani di Vimercati, S., and Samarati, P. 2011b. Personal privacy in mobile networks. In Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation, M. Poblet Ed., Springer Science+Business Media B.V.Google ScholarGoogle Scholar
  10. Bettini, C., Jajodia, S., Samarati, P., and Wang S., Eds. 2009. Privacy in Location-Based Applications: Research Issues and Emerging Trends, Lecture Notes of Computer Science, vol. 5599, Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Bianchi, G. 2000. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Select. Areas Comm. 18, 3, 535--547. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Black, J., Halevi, S., Krawczyk, H., Krovetz, T., and Rogaway, P. 1999. UMAC: Fast and secure message authentication. In Proceedings of the 19th Annual International Cryptology Conference (CRYPTO’99). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Capkun, S., Hubaux, J.-P., and Jakobsson, M. 2004. Secure and privacy-preserving communication in hybrid Ad Hoc networks. Tech. rep. IC/2004/10, EPFL-IC, Lausanne, Switzerland.Google ScholarGoogle Scholar
  14. Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM 24, 2, 84--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Chen, S. and Wu, M. 2010. Anonymous multipath routing protocol based on secret sharing in mobile Ad Hoc networks. In Proceedings of the International Conference on Measuring Technology and Mechatronics Automation (ICMTMA’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Cheng, J. 2011. Pandora sends user GPS, sex, birthdate, other data to ad servers. http://arstechnica.com /gadgets/news/2011/04/pandora-transmits-gps-gender-birthdate-other-data-to-ad-servers.ars (accessed 2/13).Google ScholarGoogle Scholar
  17. Choia, H., McDaniel, P., and La Porta, T. F. 2007. Privacy preserving communication in MANETs. In Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’07).Google ScholarGoogle ScholarCross RefCross Ref
  18. Chow, C.-Y., Mokbel, M. F., and Liu, X. 2011. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica 15, 351--380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., and Samarati, P. 2007. k-Anonymity. In Secure Data Management in Decentralized Systems, T. Yu and S. Jajodia Eds., Springer-Verlag.Google ScholarGoogle Scholar
  20. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., and Samarati, P. 2009. Theory of privacy and anonymity. In Algorithms and Theory of Computation Handbook 2nd Ed., M. Atallah and M. Blanton Eds., CRC Press.Google ScholarGoogle Scholar
  21. Dingledine, R., Mathewson, N., and Syverson, P. 2004. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Dong, Y., Chim, T. W., Li, V. O. K., Yiu, S. M., and Hui, C. K. 2009. ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Netw. 7, 8, 1536--1550. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Douceur, J. R. 2002. The Sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Emulab. Network emulation testbed home. http://www.emulab.net/.Google ScholarGoogle Scholar
  25. Gedik, B. and Liu, L. 2008. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mobile Comput. 7, 1, 1--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Gruteser, M. and Grunwald, D. 2003. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services (MobiSys’03). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Gustafsson, F. and Gunnarsson, F. 2005. Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements. IEEE Signal Process. Magazine. 41--53.Google ScholarGoogle ScholarCross RefCross Ref
  28. Hong, X., Kwon, T. J., Gerla, M., Gu, D. L., and Pei, G. 2001. A mobility framework for ad hoc wireless networks. In Proceedings of the 2nd International Conference on Mobile Data Management (MDM’01). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Jakobsson, M., Hubaux, J.-P., and Buttyán, L. 2003. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In Proceedings of the 7th International Financial Cryptography Conference (FC’03).Google ScholarGoogle Scholar
  30. Kong, J. and Hong, X. 2003. ANODR: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’03). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Krovetz, T. 2006. UMAC: Message authentication code using universal hashing. RFC 4418 (Informational). http://www.ietf.org/rfc/rfc4418.txt.Google ScholarGoogle Scholar
  32. Levine, B. N., Reiter, M. K., Wang, C., and Wright, M. 2004. Timing attacks in low-latency mix systems (Extended Abstract). In Proceedings of the 8th International Financial Cryptography Conference (FC’04).Google ScholarGoogle Scholar
  33. Li, X., Wang, X., Zheng, N., Wan, Z., and Gu, M. 2009. Enhanced location privacy protection of base station in wireless sensor networks. In Proceedings of the 5th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Lin, X., Sun, X., Ho, P.-H., and Shen, X. 2007. GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Vehic. Tech. 56, 6, 3442--3456.Google ScholarGoogle ScholarCross RefCross Ref
  35. Magkos, E., Kotzanilolaou, P., Sioutas, S., and Oikonomou, K. 2010. A distributed privacy-preserving scheme for location-based queries. In Proceedings of the 4th IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Micali, S. and Rivest, R. L. 2002. Micropayments revisited. In Proceedings of the Cryptographer’s Track at the RSA Conference on Topics in Cryptology (CT-RSA’02). Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. NetStumbler.com. http://www.netstumbler.com/.Google ScholarGoogle Scholar
  38. I2P Anonymous Network. http://www.i2p2.de/.Google ScholarGoogle Scholar
  39. IEEE 802.11TM Wireless Local Area Networks. http://www.ieee802.org/11/.Google ScholarGoogle Scholar
  40. Wireless Orbit. http://www.wirelessorbit.com/.Google ScholarGoogle Scholar
  41. Rahmati, A., Shepard, C., Nicoara, A., Zhong, L., and Singh, P. J. 2010. Mobile TCP usage characteristics and the feasibility of network migration without infrastructure support. In Proceedings of the 16th Annual International Conference on Mobile Computing and Networking (MobiCom’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Reiter, M. K. and Rubin, A. D. 1998. Crowds: Anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1, 1, 66--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Ren, K. and Lou, W. 2008. A sophisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks. In Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS’08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Rennhard, M. and Plattner, B. 2002. Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES’02). Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Rios, R. and Lopez, J. 2011. Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. Comput. J. 54, 11, 1603--1615. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Saha, A. K. and Johnson, D. B. 2004. Modeling mobility for vehicular ad-hoc networks. In Proceedings of the 1st ACM Workshop on Vehicular Ad Hoc Networks (VANET’04). Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Samarati, P. 2001. Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. 13, 6, 1010--1027. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Sampigethaya, K., Li, M., Huang, L., and Poovendran, R. 2007. AMOEBA: Robust location privacy scheme for VANET. IEEE J. Sel. Areas Comm. 25, 8, 1569--1589. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., and Triandopoulos, N. 2011. AnonySense: A system for anonymous opportunistic sensing. Perv. Mobile Comput. 7, 1, 16--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Sun, G., Chen, J., Guo, W., and Ray Liu, K. J. 2005. Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs. IEEE Signal Process. Mag. 12--23.Google ScholarGoogle Scholar
  51. Takahashi, D., Hong, X., and Xiao, Y. 2010. On-demand anonymous routing with distance vector protecting traffic privacy in wireless multi-hop networks. In Proceedings of the 4th International Conference on Mobile Ad-hoc and Sensor Networks (MSN’08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Wireshark. http://www.wireshark.org/.Google ScholarGoogle Scholar
  53. Wright, M., Adler, M., Neil Levine, B., and Shields, C. 2004. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Sec. 7, 4, 489--522. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Zhang, Y., Liu, W., Lou, W., and Fang, Y. 2006. MASK: Anonymous on-demand routing in mobile ad hoc networks. IEEE Trans. Wirel. Comm. 5, 9, 2376--2385. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Providing Users’ Anonymity in Mobile Hybrid Networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Internet Technology
          ACM Transactions on Internet Technology  Volume 12, Issue 3
          May 2013
          94 pages
          ISSN:1533-5399
          EISSN:1557-6051
          DOI:10.1145/2461321
          Issue’s Table of Contents

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 May 2013
          • Accepted: 1 January 2013
          • Revised: 1 September 2012
          • Received: 1 October 2011
          Published in toit Volume 12, Issue 3

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader