Privacy for mobile networks via network virtualization
Glidden, Todd P.
MetadataShow full item record
Today mobile devices have become powerful and ubiquitous. The conveniences afforded by these devices do not come without a cost, however. The use of mobile devices and mobile networks poses a significant risk to privacy. Four privacy requirements for mobile networks are identified: content privacy, identity privacy, location privacy, and authentication. This work focuses on content privacy. Two threats to content privacy are identified: the casual observer and the attacker. This work seeks to provide content privacy protection against the identified threats in mobile networks used by first responders. TwiddleNet, a mobile network designed for the data dissemination requirements of first responders, was used as a platform for implementation. A network virtualization technique was used in order to provide content privacy protection. This allows TwiddleNet users to share content on a per-group basis among virtual networks of user groups. It was found that this virtualization technique successfully provided content privacy protection from the threat of a casual observer, but not from an attacker. Providing adequate protections from the attacker threat requires more sophisticated measures and is left to future work.
13th International Command and Control Research and Technology Symposium (ICCRTS), June 17-19, 2008, Seattle, WAApproved for public release, distribution unlimited
Showing items related by title, author, creator and subject.
Koh, Jin Hou (Monterey, California. Naval Postgraduate School, 2004-12);As the popularity of Internet soars, the content on the Internet is increasingly accessed by mobile devices that are usually small in form factor and limited in resources, in terms of processing capability, bandwidth and ...
Evaluation of secure 802.1X port-based network access authentication over 802.11 wireless local area networks Ozturk, Huseyin Selcuk (Monterey, California. Naval Postgraduate School, 2003-03);Since wireless technology has been used in Local Area Networks (LAN), our networks are easier to build and are more scalable and mobile than legacy structures. While providing these functionalities, Wireless LAN (WLAN)'s ...
Wang, Yizhong (Monterey, California: Naval Postgraduate School, 2018-03);A wireless Internet of Things (IoT) network is used for military operations due to its low cost and ease of deployment; however, one of the primary challenges with IoT networks is their lack of cohesive security and privacy ...