Get access

ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks

Authors

  • Sanaa Taha,

    1. Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada
    2. Faculty of Computers and Information, Cairo University, Cairo, Egypt
    Search for more papers by this author
  • Xuemin (Sherman) Shen

    Corresponding author
    • Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada
    Search for more papers by this author

  • Part of this paper is published in the 2011 IEEE Global Communication Conference [1].

Xuemin (Sherman) Shen, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada.

E-mail: xshen@bbcr.uwaterloo.ca

ABSTRACT

The integration of mobile IPv6 heterogeneous networks enhances networking performance; however, it also breaks mobile node's anonymity and location privacy. In this paper, we propose an anonymous and location privacy preserving (ALPP) scheme that consists of two complementary subschemes: anonymous home binding update and anonymous return routability. In addition, anonymous mutual authentication and key establishment schemes have been proposed to work in conjunction with ALPP to authenticate a mobile node to its foreign gateway and create a shared key between them. ALPP adds anonymity and location privacy services to mobile IPv6 signaling to achieve mobile senders and receivers' privacy. Unlike existing schemes, ALPP alleviates the trade-off between the networking performance and the achieved privacy level. Combining onion routing and anonymizer in ALPP scheme increases the achieved location privacy level where no entity in the network except the mobile node itself can identify this node's location. Using entropy model, we show that ALPP achieves higher degree of anonymity than the mix-based scheme. The anonymous home binding update and anonymous return routability subschemes require less computation overheads and thwart both internal and external adversaries. Simulation results demonstrate that our schemes have low control packets routing delays and are suitable for the seamless handover. Copyright © 2012 John Wiley & Sons, Ltd.

Get access to the full text of this article

Ancillary