Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Defending Anonymous Communications Against Passive Logging Attacks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Routing in a delay tolerant network
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
The predecessor attack: An analysis of a threat to anonymous communications systems
ACM Transactions on Information and System Security (TISSEC)
Practical routing in delay-tolerant networks
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Compromising Location Privacy inWireless Networks Using Sensors with Limited Information
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Low-resource routing attacks against tor
Proceedings of the 2007 ACM workshop on Privacy in electronic society
How much anonymity does network latency leak?
Proceedings of the 14th ACM conference on Computer and communications security
Passive-Logging Attacks Against Anonymous Communications Systems
ACM Transactions on Information and System Security (TISSEC)
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Sampled traffic analysis by internet-exchange-level adversaries
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Practical traffic analysis: extending and resisting statistical disclosure
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Opportunistic networking: data forwarding in disconnected mobile ad hoc networks
IEEE Communications Magazine
Privacy-enhanced social-network routing
Computer Communications
Hi-index | 0.00 |
Opportunistic Networking holds a great deal of potential for making communications easier and more flexible in pervasive assistive environments. However, security and privacy must be addressed to make these communications acceptable with respect to protecting patient privacy. In this position paper, we propose Privacy-Enhanced Opportunistic Networking (PEON), a system for using opportunistic networking in privacy-preserving way. PEON uses concepts from anonymous communications, rerouting messages through groups of peer nodes to hide the relation between the sources and destinations. By modifying group size, we can trade off between privacy and communication overhead. Further, individual nodes can make a similar trade off by changing the number of intermediate groups. We describe the cryptographic tools needed to facilitate changes in group membership and the design of simulation experiments that we will conduct to evaluate the overhead and effectiveness of our approach.