Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.3: Study on Mobile Identity Management
In order to answer these questions, some requirements that an anonymity mechanism should follow have to be considered suitable for ad hoc networks. These requirements are:
Performance: meaning the number of messages needed to establish a secure anonymous tunnel. If the number of messages is too high, then the amount of battery power used to establish a tunnel is also high. Therefore, a good anonymity mechanism should minimise the amount of messages used to establish a secure tunnel. The total number of public key operations needed is also important, as these are expensive operations in terms of computational resources needed.
Scalability: meaning if a given anonymity mechanism works well under different network topologies and number of nodes. The size of an ad hoc network can vary from few nodes only to thousands of nodes. Therefore, a good anonymity protocol should work under different network conditions and topologies, independent of network number of network nodes.
Security: meaning if the protocol is secure enough against known attacks. The level of anonymity is also included in the quality of security provided by one mechanism. The attacker models proposed in Crowds are used in the comparison (the adversaries). Security against malicious nodes is especially important when dealing with P2P networks.
Robustness to topology changes. Ad hoc networks can be very highly dynamical network environments and an anonymity mechanism has to handle with these changes in the network topology without compromising security and anonymity properties. The agility and flexibility of a mechanism to recover from topology changes are included here. This point is strongly linked with the performance issues, because a good anonymity mechanism shall recover from a topology change with the least number of transmitted messages as possible, in order to save battery power.
Independence of infrastructure or central servers, such as a Internet based PKI, is a basic characteristic of ad hoc networks, because ad hoc networks and their services shall still exist even on the absence on a deployed infrastructure.
26 / 36 |