Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers

Research Article

Self-organized Anonymous Authentication in Mobile Ad Hoc Networks

Download
453 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-05284-2_21,
        author={Julien Freudiger and Maxim Raya and Jean-Pierre Hubaux},
        title={Self-organized Anonymous Authentication in Mobile Ad Hoc Networks},
        proceedings={Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2012},
        month={5},
        keywords={},
        doi={10.1007/978-3-642-05284-2_21}
    }
    
  • Julien Freudiger
    Maxim Raya
    Jean-Pierre Hubaux
    Year: 2012
    Self-organized Anonymous Authentication in Mobile Ad Hoc Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-05284-2_21
Julien Freudiger1,*, Maxim Raya1,*, Jean-Pierre Hubaux1,*
  • 1: EPFL
*Contact email: Julien.Freudiger@epfl.ch, Maxim.Raya@epfl.ch, Jean-Pierre.Hubaux@epfl.ch

Abstract

Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm . In this work, we focus on the problem of self-organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self-organized anonymous authentication in mobile networks.