3,414 Hits in 3.3 sec

Practical Solution for Location Privacy in Mobile IPv6 [chapter]

SuGil Choi, Kwangjo Kim, ByeongGon Kim
2004 Lecture Notes in Computer Science  
So, in this paper, we identify required level of location privacy, and propose new protocol for providing the identified level of location privacy.  ...  Mobile IP (MIP) enables the Mobile Node (MN) to move around without loosing their transport-layer connectivity by using resources in the foreign domain network.  ...  The organization of this paper is as follows: In Section 2, we explain Mobile IP and location privacy providing systems.  ... 
doi:10.1007/978-3-540-24591-9_6 fatcat:7jy4db2qqvhtnj3ucuky7lgo44

Virtual ID: A Technique for Mobility, Multi-Homing, and Location Privacy in Next Generation Wireless Networks

Chakchai So-In, Raj Jain, Subharthi Paul, Jianli Pan
2010 2010 7th IEEE Consumer Communications and Networking Conference  
This concept applies the ID/Locator split idea into a Mobile IPv6 environment. Virtual ID and its extensions provide many features that would be desired in the NGWN.  ...  However, IP-based networks face several known issues, such as mobility, multihoming, location privacy, path preference, etc.  ...  Proxy-assisted User Location Privacy Example Fig. 3 shows an example of Proxy-assisted Mobile IPv6 and Virtual ID providing user location privacy.  ... 
doi:10.1109/ccnc.2010.5421690 dblp:conf/ccnc/So-InJPP10 fatcat:nhyh4zygbbbgfjnpm6lp7ecymi

HIP location privacy framework

Alfredo Matos, Justino Santos, Susana Sargento, Rui Aguiar, João Girão, Marco Liebsch
2006 Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture - MobiArch '06  
In this document we propose an architecture that provides location privacy, based on HIP.  ...  Privacy and security are key aspects in future network architectures.  ...  In Section 6 we present the deployment of the location privacy framework in an IPv6 scenario, along with a prototype for privacy and performance assessment.  ... 
doi:10.1145/1186699.1186716 fatcat:3qcoqjzfnzhmzejperhl2z3c2e

IPv6: Nowhere to Run, Nowhere to Hide

S Groat, M Dunlop, R Marchany, J Tront
2011 2011 44th Hawaii International Conference on System Sciences  
In order to prevent this privacy breach, we offer solutions that disassociate the IPv6 address from its user.  ...  Static IID assignment provides third parties (whether malicious or not) with the ability to track a node's physical location, correlate network traffic with a specific user, and collect details about a  ...  Therefore, address privacy must be addressed in all connections of a mobile device to assure complete privacy.  ... 
doi:10.1109/hicss.2011.258 dblp:conf/hicss/GroatDMT11 fatcat:db3bctje7zfuzdnvids6g46c6e

Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change

Jong-Hyouk Lee, Giwon Lee, Sangheon Pack
2015 International Journal of Distributed Sensor Networks  
In this paper, we introduce the use of pseudonyms in IPv6 ITS communications for preserving location privacy.  ...  IPv6 developed as a next generation Internet protocol will provide us with safer and more efficient driving environments as well as convenient and infotainment features in cooperative intelligent transportation  ...  To address location privacy in cooperative ITS, the use of pseudonyms has been chosen as a baseline approach for preserving location privacy.  ... 
doi:10.1155/2015/189389 fatcat:htqmfqdi7rdg7dhwje3b72xwaq

Privacy, Control and Internet Mobility [chapter]

Tuomas Aura, Alf Zugenmaier
2006 Lecture Notes in Computer Science  
This position paper explores privacy issues created by mobile and wireless Internet access.  ...  In particular, we are interested in data that can be collected from packet headers and signaling messages and exploited to control the users access to communications resources and online services.  ...  The privacy of mobile users has previously received quite a lot of attention. See, e.g, [4] for identity protection and [5, 6, 10] for location privacy.  ... 
doi:10.1007/11861386_14 fatcat:klymr2di65hxrpnb7zjeqw2vla

Virtual ID: ID/locator split in a mobile IP environment for mobility, multihoming and location privacy for the next generation wireless networks

Chakchai So In, Raj Jain, Subharthi Paul, Jianli Pan
2010 International Journal of Internet Protocol Technology  
In this paper, we develop the concept of a virtual identity (ID), as an explicit ID/locator extension of mobile IPv6 and explore its applicability to address the issues of mobility, multihoming, and location  ...  privacy in the context of next generation wireless networks.  ...  Proxy-assisted user location privacy example Figure 4 shows an example of proxy-assisted mobile IPv6 and virtual ID providing location privacy (especially with route optimisation).  ... 
doi:10.1504/ijipt.2010.035385 fatcat:ayvhaxwozzefldzwwizutz4kga

Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6

Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Wan Haslina Hassan, Touraj Khodadadi
2015 Jurnal Teknologi  
In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6.  ...  Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity.  ...  Acknowledgement This research is in affiliation with Ministry of Higher Education, Universiti Teknologi Malaysia, Malaysia-Japan International Institute of Technology (MJIIT) and Communication System and  ... 
doi:10.11113/jt.v72.3935 fatcat:fzauzxs7tfgdhh5dwqboxtisku

Editorial: Special Issue on "Advances in Mobile IPv6 and Network-Based Localized Mobility Management"

Ilsun You, Yuh-Shyan Chen
2011 Wireless personal communications  
Mobile IPv6 (MIPv6) has been recognized as a standard protocol that handles the mobility management and provides the seamless mobile communications.  ...  They cover the recent technologies for wireless mobile communications. The issue starts with four papers addressing Proxy Mobile IPv6 (PMIPv6), which is a recent approach for IP mobility management.  ...  The paper "A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs" introduces a privacy-preserving location assurance protocol that avoids illegal movement tracking of vehicles  ... 
doi:10.1007/s11277-011-0421-5 fatcat:tpctv7o3uzftddqw7ycqan4mm4

Cyberspace Security for Future Internet

Dafang Zhang, Guojun Wang, Xin Wang, Zhengyu Li, Wenjia Li
2018 Security and Communication Networks  
Besides, location-based services (LBSs) become more and more popular in mobile Internet, such as map directions, restaurant recommendations, and taxi reservations.  ...  In Small Object Networks with IPv6, the process of Duplicate Address Detection is subject to many attacks. In view of this, a new algorithm to optimize the security in IPv6-DAD is presented.  ...  Besides, location-based services (LBSs) become more and more popular in mobile Internet, such as map directions, restaurant recommendations, and taxi reservations.  ... 
doi:10.1155/2018/5313980 fatcat:wp4ufx76offbpmrkaozaq4jvje

End-to-End Privacy for Identity & Location with IP

Saleem N. Bhatti, Gregor Haywood, Ryo Yanagida
2021 2021 IEEE 29th International Conference on Network Protocols (ICNP)  
We show that Identity Privacy and Location Privacy can be provided by changing only the addressing model, whilst still remaining compatible with IPv6.  ...  Using the ILNP Locator values with dynamic bindings, it is possible to use multiple IPv6 routing prefixes as network Locator (L64) values to provide (topological) location privacy.  ...  There exists a description of how location privacy and identity privacy could be added to LISP Mobile Node (LISP-MN), an adaptation of LISP to support mobility, via a proxy service and NAT-like functions  ... 
doi:10.1109/icnp52444.2021.9651909 fatcat:uybyj5wknfgddecrkmacwngglm

Anonymity and Untraceability Assessment of Authentication Protocols in Proxy Mobile IPv6

Mojtaba Alizadeh, Sabariah Baharun, Mazdak Zamani, Touraj Khodadadi, Mahdi Darvishi, Somayyeh Gholizadeh, Hossein Ahmadi
2015 Jurnal Teknologi  
The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead  ...  In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node.  ...  Acknowledgement This research is in affiliation with Ministry of Higher Education, Universiti Teknologi Malaysia, Malaysia-Japan International Institute of Technology (MJIIT) and Communication System and  ... 
doi:10.11113/jt.v72.3936 fatcat:uctjngzw6jfwnpropld5ndgvsy

A Simple Privacy Extension for Mobile IPv6 [chapter]

Claude Castelluccia, Francis Dupont, Gabriel Montenegro
2005 IFIP International Federation for Information Processing  
In Mobile IPv6, each packet sent and received by a mobile node contains its home address.  ...  We show that HMIPv6 can also benefit from the proposed privacy extension.  ...  Indeed when using HMIPv6 with the proposed privacy extension, we can: -Hide the location (care-of address) of a mobile node from its Home Agent (this is not provided by a VPN), -Hide the location (care-of  ... 
doi:10.1007/0-387-23150-1_21 fatcat:7c6znpyicnaezf6ux3cghyvcqq

Preventing Privacy Attacks and Cybercrime in the Mobile Internet [chapter]

Simone Fischer-Huebner, Alberto Escudero Pascual, Helena Lindskog
2002 IFIP Advances in Information and Communication Technology  
of location privacy in mobile Internet and proposed extensions to the mix-net based Freedom Network, we will present how some technical improvements in IPv6 over IPv4 also introduce privacy risks.  ...  This panel session will discuss: • Privacy risks and cybercrime threats in the Mobile Internet • Legal approaches for protecting privacy in the Mobile Internet, such as the proposed EU Directive COM (2000  ... 
doi:10.1007/978-0-387-35609-9_18 fatcat:ew6eq6njibb4pp3xl4s42e22iu

EUI-64 Considered Harmful [article]

Erik C. Rye, Jeremy Martin, Robert Beverly
2019 arXiv   pre-print
This position paper considers the privacy and security implications of EUI-64-based IPv6 addresses.  ...  We characterize the origins and behaviors of these EUI-64 IPv6 addresses, and advocate for changes in provider IPv6 addressing policies.  ...  In this case, it is unlikely that there is a single device traveling to disparate locations.  ... 
arXiv:1902.08968v1 fatcat:7beg7hl4qjgplefgbj3bgzbwte
« Previous Showing results 1 — 15 out of 3,414 results