Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-76929-3_22
|View full text |Cite
|
Sign up to set email alerts
|

One-Time Receiver Address in IPv6 for Protecting Unlinkability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…IPv6 addressing model specifically supports assigning multiple IP addresses to a single interface [46]. Thus researchers have gone beyond address hopping to assign each connection (or a set of closely related connections) a unique address [31][32][33][34][35] to enhance privacy. Our model also uses per-connection addresses, and a detailed comparison is given later in this subsection.…”
Section: Using Ipv6 Address Space To Enhance Security and Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…IPv6 addressing model specifically supports assigning multiple IP addresses to a single interface [46]. Thus researchers have gone beyond address hopping to assign each connection (or a set of closely related connections) a unique address [31][32][33][34][35] to enhance privacy. Our model also uses per-connection addresses, and a detailed comparison is given later in this subsection.…”
Section: Using Ipv6 Address Space To Enhance Security and Privacymentioning
confidence: 99%
“…First, mapping an address to a device or a connection and the related routing are difficult. Early work is stateful, the mapping needs to be recorded [31,33,34]. More recent work achieve stateless mapping by encrypting the host identity into the one-time pseudo-random address.…”
Section: Using Ipv6 Address Space To Enhance Security and Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…However, the mapping between the pseudonym and the IPv6 address is obtained by the attacker, the privacy of the user will be revealed. To solve this problem, Sakurai et al [18] propose to use a hash chain to generate a one-time receiving address, which has high security. Even if the hash address of the user is revealed, attackers still cannot know the true identity of the user.…”
Section: A Various Identity Anonymity Of Usersmentioning
confidence: 99%
“…Sakurai et al [11] propose a mechanism that allows two nodes to communicate privately by switching through a list of previously negotiated IPv6 interface identifiers. The objective of their technique is to provide relationship anonymity against eavesdroppers.…”
Section: Related Workmentioning
confidence: 99%