You are here: Resources > FIDIS Deliverables > HighTechID > D3.3: Study on Mobile Identity Management > 

D3.3: Study on Mobile Identity Management

Comparison of Anonymous Communication Mechanisms for ad hoc Networks  Study on Mobile Identity Management
REQUIREMENTS FOR ANONYMOUS COMMUNICATION MECHANISMS
 Comparison of Anonymous Communication Mechanisms

 

Requirements for Anonymous Communication Mechanisms

In order to answer these questions, some requirements that an anonymity mechanism should follow have to be considered suitable for ad hoc networks. These requirements are: 

  1. Performance: meaning the number of messages needed to establish a secure anonymous tunnel. If the number of messages is too high, then the amount of battery power used to establish a tunnel is also high. Therefore, a good anonymity mechanism should minimise the amount of messages used to establish a secure tunnel. The total number of public key operations needed is also important, as these are expensive operations in terms of computational resources needed. 

  2. Scalability: meaning if a given anonymity mechanism works well under different network topologies and number of nodes. The size of an ad hoc network can vary from few nodes only to thousands of nodes. Therefore, a good anonymity protocol should work under different network conditions and topologies, independent of network number of network nodes.

  3. Security: meaning if the protocol is secure enough against known attacks. The level of anonymity is also included in the quality of security provided by one mechanism. The attacker models proposed in Crowds are used in the comparison (the adversaries). Security against malicious nodes is especially important when dealing with P2P networks. 

  4. Robustness to topology changes. Ad hoc networks can be very highly dynamical network environments and an anonymity mechanism has to handle with these changes in the network topology without compromising security and anonymity properties. The agility and flexibility of a mechanism to recover from topology changes are included here. This point is strongly linked with the performance issues, because a good anonymity mechanism shall recover from a topology change with the least number of transmitted messages as possible, in order to save battery power.

  5. Independence of infrastructure or central servers, such as a Internet based PKI, is a basic characteristic of ad hoc networks, because ad hoc networks and their services shall still exist even on the absence on a deployed infrastructure.

 

Comparison of Anonymous Communication Mechanisms for ad hoc Networks  fidis-wp3-del3.3.study_on_mobile_identity_management.final_04.sxw  Comparison of Anonymous Communication Mechanisms
26 / 36