A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Practical Solution for Location Privacy in Mobile IPv6
[chapter]
2004
Lecture Notes in Computer Science
So, in this paper, we identify required level of location privacy, and propose new protocol for providing the identified level of location privacy. ...
Mobile IP (MIP) enables the Mobile Node (MN) to move around without loosing their transport-layer connectivity by using resources in the foreign domain network. ...
The organization of this paper is as follows: In Section 2, we explain Mobile IP and location privacy providing systems. ...
doi:10.1007/978-3-540-24591-9_6
fatcat:7jy4db2qqvhtnj3ucuky7lgo44
Virtual ID: A Technique for Mobility, Multi-Homing, and Location Privacy in Next Generation Wireless Networks
2010
2010 7th IEEE Consumer Communications and Networking Conference
This concept applies the ID/Locator split idea into a Mobile IPv6 environment. Virtual ID and its extensions provide many features that would be desired in the NGWN. ...
However, IP-based networks face several known issues, such as mobility, multihoming, location privacy, path preference, etc. ...
Proxy-assisted User Location Privacy Example Fig. 3 shows an example of Proxy-assisted Mobile IPv6 and Virtual ID providing user location privacy. ...
doi:10.1109/ccnc.2010.5421690
dblp:conf/ccnc/So-InJPP10
fatcat:nhyh4zygbbbgfjnpm6lp7ecymi
HIP location privacy framework
2006
Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture - MobiArch '06
In this document we propose an architecture that provides location privacy, based on HIP. ...
Privacy and security are key aspects in future network architectures. ...
In Section 6 we present the deployment of the location privacy framework in an IPv6 scenario, along with a prototype for privacy and performance assessment. ...
doi:10.1145/1186699.1186716
fatcat:3qcoqjzfnzhmzejperhl2z3c2e
IPv6: Nowhere to Run, Nowhere to Hide
2011
2011 44th Hawaii International Conference on System Sciences
In order to prevent this privacy breach, we offer solutions that disassociate the IPv6 address from its user. ...
Static IID assignment provides third parties (whether malicious or not) with the ability to track a node's physical location, correlate network traffic with a specific user, and collect details about a ...
Therefore, address privacy must be addressed in all connections of a mobile device to assure complete privacy. ...
doi:10.1109/hicss.2011.258
dblp:conf/hicss/GroatDMT11
fatcat:db3bctje7zfuzdnvids6g46c6e
Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change
2015
International Journal of Distributed Sensor Networks
In this paper, we introduce the use of pseudonyms in IPv6 ITS communications for preserving location privacy. ...
IPv6 developed as a next generation Internet protocol will provide us with safer and more efficient driving environments as well as convenient and infotainment features in cooperative intelligent transportation ...
To address location privacy in cooperative ITS, the use of pseudonyms has been chosen as a baseline approach for preserving location privacy. ...
doi:10.1155/2015/189389
fatcat:htqmfqdi7rdg7dhwje3b72xwaq
Privacy, Control and Internet Mobility
[chapter]
2006
Lecture Notes in Computer Science
This position paper explores privacy issues created by mobile and wireless Internet access. ...
In particular, we are interested in data that can be collected from packet headers and signaling messages and exploited to control the users access to communications resources and online services. ...
The privacy of mobile users has previously received quite a lot of attention. See, e.g, [4] for identity protection and [5, 6, 10] for location privacy. ...
doi:10.1007/11861386_14
fatcat:klymr2di65hxrpnb7zjeqw2vla
Virtual ID: ID/locator split in a mobile IP environment for mobility, multihoming and location privacy for the next generation wireless networks
2010
International Journal of Internet Protocol Technology
In this paper, we develop the concept of a virtual identity (ID), as an explicit ID/locator extension of mobile IPv6 and explore its applicability to address the issues of mobility, multihoming, and location ...
privacy in the context of next generation wireless networks. ...
Proxy-assisted user location privacy example Figure 4 shows an example of proxy-assisted mobile IPv6 and virtual ID providing location privacy (especially with route optimisation). ...
doi:10.1504/ijipt.2010.035385
fatcat:ayvhaxwozzefldzwwizutz4kga
Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6
2015
Jurnal Teknologi
In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. ...
Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. ...
Acknowledgement This research is in affiliation with Ministry of Higher Education, Universiti Teknologi Malaysia, Malaysia-Japan International Institute of Technology (MJIIT) and Communication System and ...
doi:10.11113/jt.v72.3935
fatcat:fzauzxs7tfgdhh5dwqboxtisku
Editorial: Special Issue on "Advances in Mobile IPv6 and Network-Based Localized Mobility Management"
2011
Wireless personal communications
Mobile IPv6 (MIPv6) has been recognized as a standard protocol that handles the mobility management and provides the seamless mobile communications. ...
They cover the recent technologies for wireless mobile communications. The issue starts with four papers addressing Proxy Mobile IPv6 (PMIPv6), which is a recent approach for IP mobility management. ...
The paper "A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs" introduces a privacy-preserving location assurance protocol that avoids illegal movement tracking of vehicles ...
doi:10.1007/s11277-011-0421-5
fatcat:tpctv7o3uzftddqw7ycqan4mm4
Cyberspace Security for Future Internet
2018
Security and Communication Networks
Besides, location-based services (LBSs) become more and more popular in mobile Internet, such as map directions, restaurant recommendations, and taxi reservations. ...
In Small Object Networks with IPv6, the process of Duplicate Address Detection is subject to many attacks. In view of this, a new algorithm to optimize the security in IPv6-DAD is presented. ...
Besides, location-based services (LBSs) become more and more popular in mobile Internet, such as map directions, restaurant recommendations, and taxi reservations. ...
doi:10.1155/2018/5313980
fatcat:wp4ufx76offbpmrkaozaq4jvje
End-to-End Privacy for Identity & Location with IP
2021
2021 IEEE 29th International Conference on Network Protocols (ICNP)
We show that Identity Privacy and Location Privacy can be provided by changing only the addressing model, whilst still remaining compatible with IPv6. ...
Using the ILNP Locator values with dynamic bindings, it is possible to use multiple IPv6 routing prefixes as network Locator (L64) values to provide (topological) location privacy. ...
There exists a description of how location privacy and identity privacy could be added to LISP Mobile Node (LISP-MN), an adaptation of LISP to support mobility, via a proxy service and NAT-like functions ...
doi:10.1109/icnp52444.2021.9651909
fatcat:uybyj5wknfgddecrkmacwngglm
Anonymity and Untraceability Assessment of Authentication Protocols in Proxy Mobile IPv6
2015
Jurnal Teknologi
The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead ...
In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. ...
Acknowledgement This research is in affiliation with Ministry of Higher Education, Universiti Teknologi Malaysia, Malaysia-Japan International Institute of Technology (MJIIT) and Communication System and ...
doi:10.11113/jt.v72.3936
fatcat:uctjngzw6jfwnpropld5ndgvsy
A Simple Privacy Extension for Mobile IPv6
[chapter]
2005
IFIP International Federation for Information Processing
In Mobile IPv6, each packet sent and received by a mobile node contains its home address. ...
We show that HMIPv6 can also benefit from the proposed privacy extension. ...
Indeed when using HMIPv6 with the proposed privacy extension, we can: -Hide the location (care-of address) of a mobile node from its Home Agent (this is not provided by a VPN), -Hide the location (care-of ...
doi:10.1007/0-387-23150-1_21
fatcat:7c6znpyicnaezf6ux3cghyvcqq
Preventing Privacy Attacks and Cybercrime in the Mobile Internet
[chapter]
2002
IFIP Advances in Information and Communication Technology
of location privacy in mobile Internet and proposed extensions to the mix-net based Freedom Network, we will present how some technical improvements in IPv6 over IPv4 also introduce privacy risks. ...
This panel session will discuss: • Privacy risks and cybercrime threats in the Mobile Internet • Legal approaches for protecting privacy in the Mobile Internet, such as the proposed EU Directive COM (2000 ...
doi:10.1007/978-0-387-35609-9_18
fatcat:ew6eq6njibb4pp3xl4s42e22iu
EUI-64 Considered Harmful
[article]
2019
arXiv
pre-print
This position paper considers the privacy and security implications of EUI-64-based IPv6 addresses. ...
We characterize the origins and behaviors of these EUI-64 IPv6 addresses, and advocate for changes in provider IPv6 addressing policies. ...
In this case, it is unlikely that there is a single device traveling to disparate locations. ...
arXiv:1902.08968v1
fatcat:7beg7hl4qjgplefgbj3bgzbwte
« Previous
Showing results 1 — 15 out of 3,414 results