Abstract
Security and privacy in Personal Networks constitute a major challenge for designers and implementers. The deployment of novel services over a collaborative environment where users share their resources and profiles create higher demands on security and privacy requirements. In this paper, the authors address the issue of privacy-enabled, secure personal information exchange among participants of a Personal Networks federation, in order to establish trust. The paper proposes a novel model based on the separation of user ID information from personal preferences and user status information. The proposed model is able to ensure privacy through anonymity over personal data exchange, while it incorporates mechanisms for the detection and confronting of malicious behavior, and resilience against attacks. A proof of concept based on an actual implementation is provided. Further, discussion is presented on the issues that need to be tackled in order to incorporate the proposed model in a standard PN architecture.
Similar content being viewed by others
References
Adams, C., & Farrell, S. (1999). RFC 2510: Internet X.509 Public Key Infrastructure: Certificate Management Protocols.
Anonymizer. http://www.anonymizer.com/. Accessed 5 Oct 2007.
Chen, Z. (2007). A scenario for identity management in Daidalos. CNSR ’07: Fifth Annual Conference on Communication Networks and Services Research, New Brunswick, Canada.
Clarke, I., Sandberg, O., Brandon, W., & Hong, T. W. (2001). Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies. International Workshop on Design Issues in Anonymity and Unobservability. New York: Springer.
Cook, D. J., Youngblood, M., Heierman, E. O., Gopalratnam, K., Rao, S., Litvin, A., & Khawaja, F. (2003). MavHome: An agent-based smart home. PerCom 2003: Pervasive Computing and Communications 2003, Conference, Dallas, Texas.
Dingledine R., Mathewson N. and Syverson P. (2007). Deploying low-latency anonymity: Design challenges and social factors. IEEE Security & Privacy Magazine 5(5): 83–87
Hook, D. (2005). Beginning cryptography with Java. WROX/Wiley.
Intille S.S. (2002). Designing a home of the future. IEEE Pervasive Computing 1(2):76–82
Jacobsson, M., & Niemegeers, I. (2005). Privacy and anonymity in personal networks. IEEE PerCom 2005, 3rd International Conference on Pervasive Computing and Communications, Kauai Island, Hawaii.
Java cryptography and C# cryptography resources, Home of open source libraries of the Legion of the Bouncy Castle. (n. d.). Retrieved October 5, 2007 from http://www.bouncycastle.org.
Javaid, U., Meddour, D., Rasheed, E., & Ahmed, T. (2007). A profile-based network layer architecture for personal ubiquitous environments. VTC2007: Vehicular Technology Conference 2007, Dublin, Ireland.
Jiang W. and Clifton C. (2006). A secure distributed framework for achieving k-anonymity. The International Journal on Very Large Data Bases 15(4):316–333
Kinateder, M., & Rothermel, K. (2003). Architecture and algorithms for a distributed reputation system. First International Conference on Trust Management, Heraklion, Greece.
Kirk, A., & Tuckley, C. (2007). Official Mixmaster Remailer FAQ. http://mixmaster.sourceforge.net/faq.shtml.
Kyriazanos, D., & Argyropoulos, M. (2006). Personal networks: Security risks and solutions. 45th FITCE Congress: Telecom Wars, Athens, Greece.
Kyriazanos D., Argyropoulos M., Sanchez L., Lanza J., Alutoin M., Hoebeke J. and Patrikakis C. (2006). Overview of a personal network prototype. IEC Annual Review of Communications59: 521–534
Kyriazanos, D., Stassinopoulos, G., & Prasad, N. (2006). Ubiquitous access control and policy management in personal networks. Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, San Jose, California.
Levy E. (2004). Criminals become tech savvy. IEEE Security and Privacy Magazine2(2): 65–68
Lo, A., Jacobsson, M., Prasad, V., & Niemegeers, I. G. (2006). Personal networks: An overlay network of wireless personal area networks and 3G networks. Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, San Jose, California.
Niemegeers I.G. and Heemstrade Groot S. (2002). From personal area networks to personal networks: A user oriented approach. Journal on Wireless and Personal Communications22:175–186
Niemegeers I.G. and Heemstrade Groot S.M. (2005). FEDNETS: Context-aware ad-hoc network federations. Springer Wireless Personal Communcations Journal33(3–4): 305–318
Persson, P., & Younghee, J. (2005). Nokia sensor: From research to product. DUX ’05: Designing for User Experiences Conference, San Francisco, California.
PGP 6.5.1 documentation, Introduction to Cryptography. (n. d.). Retrieved September 10, 2007 from http://www.pgpi.org/doc/pgpintro.
Politis, C., Nyberg, K., Mirzadeh, S., Masmoudi, K., Afifi, H., Floroiu, J., & Prasad, N. R. (2005). Personal network security architecture. International Wireless Summit, Wireless Personal Multimedia Communications ’05, Aalborg, Denmark.
Seigneur, J.-M., Farrell, S., Jensen, C., Gray, E., & Chen, Y. (2003). Towards security auto-configuration for smart appliances. Smart Objects Conference, Grenoble, France.
Stango, A., Kyriazanos, D., & Prasad, N. (2007). An architecture for securing context in federation personal networks. WPMC ’07, Jaipur, India.
Sterbenz, L. (2000). Performance of the AES candidate algorithms in Java. Third AES Conference, New York.
W3C SOAP Specifications. (2007). Retrieved October 5, 2007 from http://www.w3.org/TR/soap/.
Zero-Knowledge Systems. http://www.zks.net/. Accessed 5 Oct 2007.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Patrikakis, C.Z., Kyriazanos, D.M. & Prasad, N.R. Establishing Trust Through Anonymous and Private Information Exchange Over Personal Networks. Wireless Pers Commun 51, 121–135 (2009). https://doi.org/10.1007/s11277-008-9606-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-008-9606-y