Privacy Protection: p-Sensitive k-Anonymity Property
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
IPv6 stateless address autoconfiguration: balancing between security, privacy and usability
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
DNS Update Extension to IPv6 Secure Addressing
WAINA '13 Proceedings of the 2013 27th International Conference on Advanced Information Networking and Applications Workshops
Hi-index | 0.00 |
Privacy is a very important element in every one's everyday life. Most users would not like to have their data exposed to other people on the Internet. The initial approach used for attacking a user's privacy and security is done by scanning the nodes on a network. This gives an attacker the ability to obtain the IP addresses in use by this node so that this information can then be used to initiate further attacks against this node, such as tracking them via their IP address across the networks, and then, later correlating the user's activities with his IP address. The first attempt by the Internet Engineering Task Force (IETF) to protect a user's privacy was defined in the Privacy Extension RFC [13]. Unfortunately this RFC has some deficiencies which makes its use vulnerable to privacy related attacks. To address this problem, and solve the deficiencies that exist with the use of this RFC, we introduce our new algorithm, which not only maintains a node's lifetime, but also provides a user with a method for randomized Interface ID (IID) generations.