Privacy, Control and Internet Mobility

  • Tuomas Aura
  • Alf Zugenmaier
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3957)


This position paper explores privacy issues created by mobile and wireless Internet access. We consider the information about the user’s identity, location, and the serviced accessed that is necessarily or unnecessarily revealed observers, including the access network, intermediaries within the Internet, and the peer endpoints. In particular, we are interested in data that can be collected from packet headers and signaling messages and exploited to control the user’s access to communications resources and online services. We also suggest some solutions to reduce the amount of information that is leaked.


Mobile Node Access Network Mobile Host Home Agent Mobile IPv6 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aura, T.: Cryptographically generated addresses (CGA). In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 29–43. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1(1), 65–75 (1988)MathSciNetCrossRefMATHGoogle Scholar
  3. 3.
    Escudero-Pasqual, A.: Privacy in the next generation Internet: data protection in the context of the European Union. PhD thesis, Royal Institute of Technology, Stockholm, Sweden (December 2002)Google Scholar
  4. 4.
    Digital cellular telecommunication system (phase 2); Security related network functions. ETSI TS 100 929, European Telecommunications Standards Institute (November 1999)Google Scholar
  5. 5.
    Federrath, H., Jerichow, A., Pfitzmann, A.: MIXes in mobile communication systems: Location management with privacy. In: Proc. Information Hiding Workshop, Cambridge, UK (1996)Google Scholar
  6. 6.
    Gruteser, M., Hoh, B.: On the anonymity of periodic location samples. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 179–192. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Hinden, R.M., Deering, S.E.: IP version 6 addressing architecture. RFC 3513, IETF Network Working Group (April 2003)Google Scholar
  8. 8.
    Johnson, D.B., Perkins, C., Arkko, J.: Mobility support in IPv6. RFC 3775, IETF Mobile IP Working Group (June 2004)Google Scholar
  9. 9.
    Kent, S., Atkinson, R.: Security architecture for the Internet Protocol. RFC 2401, IETF Network Working Group (November 1998)Google Scholar
  10. 10.
    Kesdogan, D., Federrath, H., Jerichow, A., Pfitzmann, A.: Location management strategies increasing privacy in mobile communication. In: Proc. 12th International Information Security Conference, Samos, Greece, 21-24, 1996, pp. 39–48. Chapman & Hall, Boca Raton (1996)Google Scholar
  11. 11.
    Narten, T., Draves, R.: Privacy extensions for stateless address autoconfiguration in IPv6. RFC 3041, IETF Network Working Group (January 2001)Google Scholar
  12. 12.
    Nikander, P., Ylitalo, J., Wall, J.: Integrating security, mobility, and multi-homing in a HIP way. In: Proc. Network and Distributed Systems Security Symposium (NDSS 2003), San Diego, CA, USA, February 2003, pp. 87–99 (2003)Google Scholar
  13. 13.
    Perkins, C.: IP mobility support. RFC 2002, IETF (October 1996)Google Scholar
  14. 14.
    Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session initiation protocol. RFC 3261, IETF (June 2002)Google Scholar
  15. 15.
    Serjantov, A.: On the Anonymity of Anonymity Systems. PhD thesis, University of Cambridge, Cambridge, United Kingdom (March 2004)Google Scholar
  16. 16.
    Srisuresh, P., Holdrege, M.: Ip network address translator (NAT) terminology and considerations. RFC 2663, IETF (August 1999)Google Scholar
  17. 17.
    Zugenmaier, A.: Anonymity for Users of Mobile Devices through Location Addressing. PhD thesis, University of Freiburg (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Tuomas Aura
    • 1
  • Alf Zugenmaier
    • 1
  1. 1.Microsoft ResearchCambridgeUnited Kingdom

Personalised recommendations