Practical privacy enhancing technologies for mobile systems

 |  Login

Show simple item record

dc.contributor Aalto-yliopisto fi
dc.contributor Aalto University en
dc.contributor.author Lindqvist, Janne
dc.date.accessioned 2012-08-23T05:20:32Z
dc.date.available 2012-08-23T05:20:32Z
dc.date.issued 2009
dc.identifier.isbn 978-951-22-9903-4
dc.identifier.isbn 978-951-22-9902-7476 (printed) #8195;
dc.identifier.issn 1795-4584
dc.identifier.uri https://aaltodoc.aalto.fi/handle/123456789/4624
dc.description.abstract Mobile computers and handheld devices can be used today to connect to services available on the Internet. One of the predominant technologies in this respect for wireless Internet connection is the IEEE 802.11 family of WLAN standards. In many countries, WLAN access can be considered ubiquitous; there is a hotspot available almost anywhere. Unfortunately, the convenience provided by wireless Internet access has many privacy tradeoffs that are not obvious to mobile computer users. In this thesis, we investigate the lack of privacy of mobile computer users, and propose practical enhancements to increase the privacy of these users. We show how explicit information related to the users' identity leaks on all layers of the protocol stack. Even before an IP address is configured, the mobile computer may have already leaked their affiliation and other details to the local network as the WLAN interface openly broadcasts the networks that the user has visited. Free services that require authentication or provide personalization, such as online social networks, instant messengers, or web stores, all leak the user's identity. All this information, and much more, is available to a local passive observer using a mobile computer. In addition to a systematic analysis of privacy leaks, we have proposed four complementary privacy protection mechanisms. The main design guidelines for the mechanisms have been deployability and the introduction of minimal changes to user experience. More specifically, we mitigate privacy problems introduced by the standard WLAN access point discovery by designing a privacy-preserving access-point discovery protocol, show how a mobility management protocol can be used to protect privacy, and how leaks on all layers of the stack can be reduced by network location awareness and protocol stack virtualization. These practical technologies can be used in designing a privacy-preserving mobile system or can be retrofitted to current systems. en
dc.format.extent Verkkokirja (476 KB, 56 s.)
dc.format.mimetype application/pdf
dc.language.iso en en
dc.publisher Teknillinen korkeakoulu en
dc.relation.ispartofseries TKK dissertations, 168 en
dc.relation.haspart [Publication 1]: Janne Lindqvist and Laura Takkinen. 2006. Privacy management for secure mobility. In: Ari Juels and Marianne Winslett (editors). Proceedings of the 5th ACM Workshop on Privacy in the Electronic Society (WPES 2006). Alexandria, Virginia, USA. 30 October 2006. en
dc.relation.haspart [Publication 2]: Tuomas Aura, Janne Lindqvist, Michael Roe, and Anish Mohammed. 2008. Chattering laptops. In: Nikita Borisov and Ian Goldberg (editors). Proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS 2008). Leuven, Belgium. 23-25 July 2008. Springer. Lecture Notes in Computer Science, volume 5134, pages 167-186. © 2008 by authors. en
dc.relation.haspart [Publication 3]: Janne Lindqvist and Juha-Matti Tapio. 2008. Protecting privacy with protocol stack virtualization. In: Vijay Atluri and Marianne Winslett (editors). Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society (WPES 2008). Alexandria, Virginia, USA. 27 October 2008. en
dc.relation.haspart [Publication 4]: Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, and Michael Roe. 2009. Privacy-preserving 802.11 access-point discovery. Cambridge, United Kingdom. Microsoft Research Technical Report, MSR-TR-2009-7. An abridged version of this article is available in: David Basin, Srdjan Capkun, and Wenke Lee (editors). Proceedings of the Second ACM Conference on Wireless Network Security (WiSec 2009). Zürich, Switzerland. 16-18 March 2009, pages 123-130. © 2009 by authors. en
dc.subject.other Computer science en
dc.title Practical privacy enhancing technologies for mobile systems en
dc.type G5 Artikkeliväitöskirja fi
dc.contributor.department Tietotekniikan laitos fi
dc.subject.keyword privacy en
dc.subject.keyword mobile systems en
dc.subject.keyword IEEE 802.11 en
dc.subject.keyword anonymity en
dc.subject.keyword wireless networks en
dc.identifier.urn URN:ISBN:978-951-22-9903-4
dc.type.dcmitype text en
dc.type.ontasot Väitöskirja (artikkeli) fi
dc.type.ontasot Doctoral dissertation (article-based) en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search archive


Advanced Search

article-iconSubmit a publication

Browse

My Account