ABSTRACT
The emerging need for peer to peer communication in multi-user environments as well as the breakthrough of ubiquitous computing have contributed to the evolution of Personal Networking towards multiple network collaboration, namely the Personal Networks Federations. Nevertheless, in these environments new threat issues arise, calling for appropriate countermeasures. In this paper, the authors propose a framework for privacy protection in personal networking, based on the idea of creating a trust management mechanism that will meet the need for protecting privacy and safeguarding sensitive and personal information, while satisfying the need for validating and authorizing users that have access to personal resources.
- I. G. Niemegeers and S. Heemstra de Groot, "From Personal Area Networks to Personal Networks: A user oriented approach," Journal on Wireless and Personal Communications, v. 22, pp. 175--186, 2002. Google ScholarDigital Library
- A. Lo, M. Jacobsson, V. Prasad, and I. G. Niemegeers, "Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks," presented at the Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, San Jose California, July 2006.Google Scholar
- U. Javaid, D.-E. Meddour, T. Rasheed, and T. Ahmed, "A Profile-Based Network Layer Architecture for Personal Ubiquitous Environments," presented at the VTC2007 Vehicular Technology Conference, 2007-Spring, Dublin, Ireland.Google Scholar
- I. G. Niemegeers and S. M. Heemstra De Groot, "FEDNETS: Context-Aware Ad-hoc Network Federations," Wireless Personal Communcations, Springer, 2005, vol. 33, n. 3--4, pp. 305--318. Google ScholarDigital Library
- National Security Agency, (n.d). "Defense in depth: a practical strategy for achieving information assurance in today's highly networked environments", Retrieved March 12, 2008, from http://www.nsa.gov/snac/support/defenseindepth.pdf.Google Scholar
- M. Bauer, "Practical threat analysis and risk management," Linux Journal {Online}, available: http://www.linuxjournal.com/article/5567, last accessed March 14th, 2008. Google ScholarDigital Library
- C. Politis, K. Nyberg, S. Mirzadeh, K. Masmoudi, H. Afifi, J. Floroiu, N. R. Prasad, "Personal Network Security Architecture", International Wireless Summit 2005, Wireless Personal Multimedia Communications '05, September 18--22, Aalborg, Denmark, 2005.Google Scholar
- H. Reiser and G. Vogt, "Threat analysis and security architecture of mobile agent based management systems," Network Operations and Management Symposium, 2000. NOMS 2000. 2000 IEEE/IFIP 10--14 April 2000, pp. 979--980.Google Scholar
- B. Gleeson, A. Lin, J. Heinaren, G. Armitage, and A. Malis, "A Framework for IP Based Virtual Private Networks", {Online} Retrieved March 14th, 2008 from: http://www.rennes.enst-bretagne.fr/~toutain/exam/3A9900D.pdf. Google ScholarDigital Library
- Ch. Patrikakis, M. Masikos, O. Zouraraki, "Distributed Denial of Service Attacks", Internet Protocol Journal, Cisco Systems, vol. 7, December 2004, pp 13--35.Google Scholar
- K. Scarfone, P. Mell, "Guide to Intrusion Detection and Prevention Systems (IDPS)", Recommendations of the U.S. National Institute of Standards and Technology, Information Technology Laboratory, National Institute of Standards and Technology, US Department of Commerce, February 2007.Google Scholar
- D. M. Kyriazanos, W. Louati, M. G. Genet, D. Zeghlache, M. Argyropoulos, and Ch. Z. Patrikakis, "An Architecture for Secure Wide-Area Service Discovery in Personal Peer-to-Peer Networks," presented at IST Mobile & Wireless Communications Summit, Mykonos, Greece, June 2006Google Scholar
- M. Kinateder, K. Rothermel, "Architecture and Algorithms for a Distributed Reputation System," presented at the First International Conference on Trust Management, Heraklion, Greece, May 2003. Google ScholarDigital Library
- M. Bauer, R. L. Olsen, et al., "Context Management Framework for MAGNET Beyond", Workshop on Capturing Context and Context Aware Systems and Platforms, IST Mobile and Wireless Communications summit, Myconos, Greece, June 2005Google Scholar
- Ch. Z. Patrikakis, D. M. Kyriazanos, N. Prasad, "Establishing trust through anonymous and private information exchange over Personal Networks", accepted for publication with minor changes to Springer Wireless Personal Communications, Special Issue on "Information Security and data protection in Future Generation Communication and Networking", 2008.Google Scholar
- IST-MAGNET Beyond IR1.4.1 "Defining Usability of PN Services", August 2006, Retrieved March 14th, 2008 from: http://www.ist-magnet.org/public+deliverables.Google Scholar
- Ch. Z. Patrikakis, I. G. Nikolakopoulos, A. Skoufis, S. Stamokostas, "Safe access to computing resources in personal networking environments", accepted for poster presentation to the ICT-MobileSummit, Stockholm, Sweden, June 2008.Google Scholar
Index Terms
- Privacy and resource protection in personal network federations
Recommendations
Privacy, traceability, and anonymity for content protection
PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business ServicesIn this paper we are concerned with the privacy, traceability and anonymity for content distribution and protection applications. We believe for many content protection applications, privacy friendly anonymous trust is needed. We argue broadcast ...
Privacy protection by typing in ubiquitous computing systems
A novel privacy type system is proposed to protect the privacy of context information in ubiquitous computing systems.The subject reduction property of the proposed type system is formally established to guarantee that a well-typed process can only ...
RFID system with fairness within the framework of security and privacy
ESAS'05: Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor NetworksRadio Frequency Identification (RFID) systems are expected to be widely deployed in automated identification and supply-chain applications. Although RFID systems have several advantages, the technology may also create new threats to user privacy. In ...
Comments