ABSTRACT
Privacy and security are key aspects in future network architectures. The Host Identity Protocol (HIP) is a new proposal which decouples identifiers from locators and may eventually replace conventional addressing and network transport. In this document we propose an architecture that provides location privacy, based on HIP. We further validate our work by implementation and support the feasibility of our protocol by experimentation.
- R. Moskowitz, "Host Identity Protocol." Internet Draft (Work in Progress), July 2006.Google Scholar
- R. Moskowitz, "Host Identity Protocol Architecture." RFC 4423 (Proposed Standard), may 2006.Google Scholar
- D. Clark et al., "Fara: reorganizing addressing architecture," 2003.Google Scholar
- W. Haddad, "Privacy for Mobile and Multi-homed Nodes: MoMiPriv Problem Statement." Internet Draft (Work in Progress), February 2005.Google Scholar
- W. Haddad, "Privacy for Mobile and Multi-homed Nodes: Formalizing the Threat Model." Internet Draft (Work in Progress), February 2005.Google Scholar
- D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6." RFC 3775 (Proposed Standard), June 2004.Google Scholar
- T. Okagawa et al., "Ip packet routing mechanism based on mobility management in a ip based network," 8th International Conference on Intelligence in next generation networks, 2003.Google Scholar
- S. Schmidt et al., "Turfnet: An Architecture for dynamically composable networks," Proceedings in 1st IFIP TC6 WG6.6 Workshop on Autonomic Communication (WAC 2004), 2004.Google Scholar
- I. Stoica et al., "Internet indirection infrastructure," Proceedings in ACM SIGCOMM Conference (SIGCOMM'02), pp. 73--88, August 2002. Google ScholarDigital Library
- J. Ylitalo and P. Nikander, "Blind: A complete identity protection framework for end-points," Security Protocols, Twelfth International Workshop, 2004.Google Scholar
- R. Dingledine et al., "TOR: The second-generation onion router," Proceedings of 13th USENIX Security Symposyum, 2004. Google ScholarDigital Library
- H. Soliman et al., "Hierarchical Mobile IPv6 Mobility Management (HMIPv6)." RFC 4140 (Proposed Standard), June 2004.Google Scholar
- P. Jokela, R. Moskowitz, and P. Nikander, "Using ESP transport format with HIP." Internet Draft (Work in Progress), June 2006.Google Scholar
- P. Nikander et al., "End-Host Mobility and Multi-Homing with Host Identity Protocol." Internet Draft (Work in Progress), June 2006.Google Scholar
- J. Laganier and L. Eggert, "Host Identity Protocol (HIP) Rendezvous Extensions." Internet Draft (Work in Progress), June 2006.Google Scholar
- M. Liebsch and L. Eggert, "Host Identity Protocol (HIP) Rendezvous Mechanisms." Internet Draft (Work in Progress), July 2004.Google Scholar
- A. Matos, J. Santos, J. Girao, M. Liebsch, and R. Aguiar, "Host Identity Protocol Location Privacy Extensions." Internet Draft (Work in Progress), March 2006.Google Scholar
- T. Koponen and L. Eggert, "Host Identity Protocol (HIP) Registration Extension." Internet Draft (Work in Progress), June 2006.Google Scholar
- T. Narten et al., "Neighbor Discovery for IP Version 6 (IPv6)." RFC 2461, December 1998. Google ScholarDigital Library
- "Infrastructure for hip, http://infrahip.hiit.fi/., Helsinki Instititute for Information Technology."Google Scholar
Index Terms
- HIP location privacy framework
Recommendations
Location privacy protection with a semi-honest anonymizer in information centric networking
ICN '18: Proceedings of the 5th ACM Conference on Information-Centric NetworkingLocation-based services, which provide services based on locations of consumers' interests, are becoming essential for our daily lives. Since the location of a consumer's interest contains private information, several studies propose location privacy ...
A privacy-enabled architecture for an RFID-based location monitoring system
MobiWAC '09: Proceedings of the 7th ACM international symposium on Mobility management and wireless accessIn large hospitals, location discovery and contact discovery presents possibilities to quickly find someone in an emergency, to narrow the epidemiologic scope of an outbreak, and to reinforce good safety practices. An RFID architecture can make the ...
Location privacy revisited: factors of privacy decisions
CHI EA '13: CHI '13 Extended Abstracts on Human Factors in Computing SystemsThe privacy problems associated with disclosing location information have repeatedly been the subject of research during the past decade. Yet, only the increasing adoption of smartphones today unveils real world implications, since a large number of ...
Comments