2013
DOI: 10.1145/2461321.2461322
|View full text |Cite
|
Sign up to set email alerts
|

Providing Users’ Anonymity in Mobile Hybrid Networks

Abstract: We present a novel hybrid communication protocol that guarantees mobile users' anonymity against a widerange of adversaries by exploiting the capability of handheld devices to connect to both WiFi and cellular networks. Unlike existing anonymity schemes, we consider all parties that can intercept communications between a mobile user and a server as potential privacy threats. We formally quantify the privacy exposure and the protection of our system in the presence of malicious neighboring peers, global WiFi ea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…In this case, it is necessary to protect the relationship between a user and the messages (queries) that she sends. Anonymous communication protocols (e.g., [14]) have been proposed for addressing this issue. Specific solutions taking advantage of the peculiarities of cloud systems are also being investigated (e.g., [15]).…”
Section: Privacy Risks In the Cloudmentioning
confidence: 99%
“…In this case, it is necessary to protect the relationship between a user and the messages (queries) that she sends. Anonymous communication protocols (e.g., [14]) have been proposed for addressing this issue. Specific solutions taking advantage of the peculiarities of cloud systems are also being investigated (e.g., [15]).…”
Section: Privacy Risks In the Cloudmentioning
confidence: 99%
“…[7], [21] and [26] are talk about it. BT-Crowds [7] describes a store and forward Crowds which uses the Bluetooth protocol stack and provides enhanced privacy protection.…”
Section: Mobilementioning
confidence: 99%
“…Another example is the work proposed in [98]. This work presents a hybrid communication protocol to ensure mobile users' anonymity against various adversaries.…”
Section: E Communication Privacymentioning
confidence: 99%
“…It can be achieved through different techniques such as obfuscationbased schemes [83]- [85], social-based schemes [86]- [89], dynamic pseudonymity [90]- [93], and key anonymity [94]- [96]. Meanwhile, the information of each individual should be protected while communicating with the other, so communication privacy [97], [98] should be considered vital for every network.…”
mentioning
confidence: 99%