MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix Zones

  • Mirja NitschkeEmail author
  • Philipp Holler
  • Lukas Hartmann
  • Doğan Kesdoğan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11252)


Mobile device tracking has become ever so pervasive in our world of location-based services and prying eyes. While users can somewhat restrict the flow of information towards the services they consciously use, this is not as easily possible for the mobile network they are connected to. Here, they can be tracked with relative ease by whoever controls the access points they connect to, or even by anyone that is able to monitor the air interface. Trends towards smaller cells and dynamic access point ownership within the scope of 5G only exacerbate this issue. In this paper, we present a new mix zone approach, called MixMesh, based on device-to-device communication, intended to hinder mobile network tracking through enabling secure and privacy-friendly pseudonym changes, aligned with the requirements resulting from the aforementioned trends. Our evaluation shows that our MixMesh approach is able to deliver better anonymity at an unchanged level of service quality compared to existing mix zone techniques, all the while being configurable to a desired level of anonymity in order to adapt to different scenarios.


Anonymisation Pseudonyms Mix zone Mesh network Device-to-device Privacy 


  1. 1.
    3GPP: Overview of 3GPP Release 12 V0.2.0 (2015–09). Technical report, 3GPP (2015)Google Scholar
  2. 2.
    Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)CrossRefGoogle Scholar
  3. 3.
    Freudiger, J., Raya, M., Félegyházi, M., Papadimitratos, P., Hubaux, J.P.: Mix-zones for location privacy in vehicular networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS) (2007)Google Scholar
  4. 4.
    Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference, vol. 2, pp. 1187–1192. IEEE (2005)Google Scholar
  5. 5.
    Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society - WPES 2006, p. 19. ACM Press, New York (2006)Google Scholar
  6. 6.
    Lin, X., Andrews, J., Ghosh, A., Ratasuk, R.: An overview of 3GPP device-to-device proximity services. IEEE Commun. Mag. 52(4), 40–48 (2014)CrossRefGoogle Scholar
  7. 7.
    Palanisamy, B., Liu, L.: MobiMix: protecting location privacy with mix-zones over road networks. In: 2011 IEEE 27th International Conference on Data Engineering, pp. 494–505. IEEE (2011)Google Scholar
  8. 8.
    Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: providing location privacy for VANET. Technical report, Department of Electrical Engineering, University of Washington, Seattle (2005)Google Scholar
  9. 9.
    Song, J.H., Wong, V.W.S., Leung, V.C.M.: Wireless location privacy protection in vehicular ad-hoc networks. Mob. Netw. Appl. 15(1), 160–171 (2010)CrossRefGoogle Scholar
  10. 10.
    Tehrani, M.N., Uysal, M., Yanikomeroglu, H.: Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Commun. Mag. 52, 86–92 (2014)CrossRefGoogle Scholar
  11. 11.
    Zhang, A., Lin, X.: Security-aware and privacy-preserving D2D communications in 5G. IEEE Netw. 31(4), 70–77 (2017)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.IT Security ManagementUniversity of RegensburgRegensburgGermany

Personalised recommendations