Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication
Conclusion
This chapter has analysed a variety of protocols on the application layer, the transport layer, the Internet layer and host-to-network layer with respect to privacy-relevant properties. In particular (unique) identifiers, personal data being disclosed and linkability characteristics providing identifiability and profiling have been elaborated regarding each of the protocols. Moreover, it has been discussed whether it is possible during the usage of these protocols to avoid or circumvent protocol-inherent information disclosure.
The analysis results in the observation that many protocols bear the risk of privacy threats which often are hard to counter. Typically identifying information usable for profiling is disclosed when making use of the protocols, yet this is not generally known by the mass of users. The scope of this chapter is limited to separate analysis per protocol, but it is clear that a cross-protocol or cross-layer analysis would yield even more privacy risks.
schulte | 13 / 30 |