Communication privacy

Research output: Contribution to book/Conference proceedings/Anthology/ReportChapter in book/Anthology/ReportContributedpeer-review

Contributors

  • Andreas Pfitzmann - , TUD Dresden University of Technology (Author)
  • Andreas Juschka - , TUD Dresden University of Technology (Author)
  • Anne Katrin Stange - , TUD Dresden University of Technology (Author)
  • Sandra Steinbrecher - , TUD Dresden University of Technology (Author)
  • Stefan Köpsell - , Chair of Privacy and Data Security, TUD Dresden University of Technology (Author)

Abstract

Many people have a fallacious feeling of being anonymous when surfing the Internet. But, ordinary Internet communication on the network layer is by default not anonymous because of the usage of identifying characteristics like Internet Protocol (IP) or Media Access-Control (MAC) addresses. So, if no additional measures are taken, an adversary can easily observe which participants of a network communicate with each other. But, anonymity on the network layer of communication systems can be achieved by the use of anonymizing techniques. Based on anonymous communication on the network layer, necessary identification and authenticity of users can still be implemented on a higher layer, e.g., with privacy-enhancing identity management [8].

Details

Original languageEnglish
Title of host publicationDigital Privacy
PublisherCRC Press
Pages19-46
Number of pages28
ISBN (electronic)9781420052183
ISBN (print)9781420052176
Publication statusPublished - 1 Jan 2007
Peer-reviewedYes

External IDs

ORCID /0000-0002-0466-562X/work/142246150