Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.3: Study on Mobile Identity Management
In spite of the fact that further analysis is still needed to reach a definitive conclusion on the comparison of anonymity mechanisms for ad hoc networks, it seems that none of these mechanisms is fully compliant with ad hoc network requirements. Therefore, the initial conclusion is that anonymity in ad hoc networks cannot be fully achieved with the current proposals and mechanisms for P2P anonymous communication protocols. Therefore, a new anonymous communication mechanism compliant with the requirements of ad hoc network environments needs to be designed.
However, the evaluation of future possible mechanisms shall not only consider the aspects regarding the conformance with ad hoc networks, but, of course, shall also include an evaluation of the anonymity provided regarding different qualitative and quantitative properties, such as the level of anonymity, the fairness (distribution of the protocol burden among devices), the confidentiality provided, etc. Moreover, different and complementary methods can be used for evaluating some of these parameters. For instance, the level of anonymity evaluation can be obtained using the levels proposed in Hordes in conjunction with the Freiburg Privacy Diamond proposal that is based in the attackers’ knowledge and has location privacy concerns.
28 / 36 |