Abstract
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have been proposed to make users more comfortable in their network usage. These techniques, in turn, usually rely on very basic security mechanisms, e.g., confidentiality protection, for their realization. But these mechanisms are also used for other security related reasons.
In this paper, we make some new observations on how security can degrade privacy. For example, using security as a component of an advanced privacy enhancing technique may not have the effect we expect; i.e., too careless application of security may defeat the assumed privacy gains. In particular, introducing new identifiers may make it easier to track users. This effect is especially harmful to mobile users. Even in cases when privacy is not the main driver for the use of security, we believe that identifiers require special attention in some circumstances.
We propose a mechanism, which we call to allow the communicating parties to continuously change the identifiers they use, without any signalling and without adverse affects on realibility or security.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aboba, B., Beadles, M.: The Network Access Identifier. RFC 2486, IETF (January 1999)
Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). Internet Draft draft-arkko-pppext-eap-aka-15.txt (Work In Progress), IETF (December 2004)
Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Receiver Untraceability. J. of Cryptology 1, 65–75 (1988)
Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC 3775, IETF (June 2004)
Haverinen, H., Salowey, J.: Extensible Authentication Protocol Method for GSM Subscriber Identity Modules (EAP-SIM). Internet Draft draft-haverinen-pppext-eap-sim-16.txt (Work In Progress), IETF (December 2004)
Josefsson, S., Palekar, A., Simon, D., Zorn, G.: Protected EAP Protocol (PEAP). Internet Draft draft-josefsson-pppext-eap-tls-eap-07.txt (Work In Progress), IETF (October 2003)
Kaufman, C. (ed.): Internet Key Exchange (IKEv2) Protocol. Internet Draft draft-ietf-ipsec-ikev2-14.txt (Work In Progress), IETF (May 2004)
Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol RFC 2401, IETF (November 1998)
Koodli, R., Devarapalli, V., Flinck, H., Perkins, C.: Solutions for IP Address Location Privacy in the presence of IP Mobility. Internet Drafy draft-koodli-mip6-location-privacy-solutions-00.txt (Work in Progress), IETF (February 2005)
Narten, T., Draves, R.: Privacy Extensions for Stateless Address Autoconfiguration in IPv6 RFC 3041, IETF (January 2001)
Nikander, P.: Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 2467, pp. 12–26. Springer, Heidelberg (2002)
European Telecommunications Standards Institute. Digital cellular telecommunication system (Phase 2); Security related network functions. GSM Technical Specification GSM 03.20 (ETS 300 534) (August 1997)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Arkko, J., Nikander, P., Näslund, M. (2007). Enhancing Privacy with Shared Pseudo Random Sequences. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2005. Lecture Notes in Computer Science, vol 4631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77156-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-77156-2_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77155-5
Online ISBN: 978-3-540-77156-2
eBook Packages: Computer ScienceComputer Science (R0)