Research Article
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks
@INPROCEEDINGS{10.1007/978-3-642-05284-2_21, author={Julien Freudiger and Maxim Raya and Jean-Pierre Hubaux}, title={Self-organized Anonymous Authentication in Mobile Ad Hoc Networks}, proceedings={Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, proceedings_a={SECURECOMM}, year={2012}, month={5}, keywords={}, doi={10.1007/978-3-642-05284-2_21} }
- Julien Freudiger
Maxim Raya
Jean-Pierre Hubaux
Year: 2012
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks
SECURECOMM
Springer
DOI: 10.1007/978-3-642-05284-2_21
Abstract
Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm . In this work, we focus on the problem of self-organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self-organized anonymous authentication in mobile networks.