Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication
The number of protocols which are currently used in networks such as the Internet is enormous. Below we have selected a small sample of them. The selection was done in a way such that each layer of the Internet Protocol Model is represented by at least one protocol, but focussing on the most relevant Internet related protocols.
For each protocol we first briefly introduce its basic purpose and functionality. Thereafter we look at personal or identifying information, analyse the protocol’s possible threats to privacy and data protection and discuss possibilities to circumvent them. The following criteria for elaborating privacy effects are taken into account:
Identifiers and their uniqueness;
Personal data being disclosed;
Linkability: identifiability and profiling;
Possibility of avoidance or circumvention of information disclosure.
These criteria are the baseline for the analysis of the selected protocols performed in this chapter. Note that in general we do this analysis by looking only at the protocol concerned –not at the protocols involved in lower layers. So when discussing protocols at a certain layer, we assume that all lower layers will not reveal or provide any identifying information. Of course when designing privacy-enhancing technologies and applications one has to consider carefully all layers involved (see also the FIDIS Deliverable D12.3 “A Holistic Privacy Framework for RFID” (Fischer-Hübner, Hedbom 2007)). Nevertheless in some cases we explicitly give advice and examples of how the identifying information or personal data provided at different protocol layers work together resulting in a much powerful threat to privacy compared to the simple sum of the threats arising form each layer.
schulte | 4 / 30 |