Javascript must be enabled to continue!
Moby: A Blackout-Resistant Anonymity Network for Mobile Devices
View through CrossRef
Internet blackouts are challenging environments for anonymity and censorship resistance. Existing popular anonymity networks (e.g., Freenet, I2P, Tor) rely on Internet connectivity to function, making them impracticable during such blackouts. In such a setting, mobile ad-hoc networks can provide connectivity, but prior communication protocols for ad-hoc networks are not designed for anonymity and attack resilience. We address this need by designing, implementing, and evaluating Moby, a blackout-resistant anonymity network for mobile devices. Moby provides end-to-end encryption, forward secrecy and sender-receiver anonymity. It features a bi-modal design of operation, using Internet connectivity when available and ad-hoc networks during blackouts. During periods of Internet connectivity, Moby functions as a regular messaging application and bootstraps information that is later used in the absence of Internet connectivity to achieve secure anonymous communications. Moby incorporates a model of trust based on users’ contact lists, and a trust establishment protocol that mitigates flooding attacks. We perform an empirically informed simulation-based study based on cellphone traces of 268,596 users over the span of a week for a large cellular provider to determine Moby’s feasibility and present our findings. Last, we implement and evaluate the Moby client as an Android app.
Privacy Enhancing Technologies Symposium Advisory Board
Title: Moby: A Blackout-Resistant Anonymity Network for Mobile Devices
Description:
Internet blackouts are challenging environments for anonymity and censorship resistance.
Existing popular anonymity networks (e.
g.
, Freenet, I2P, Tor) rely on Internet connectivity to function, making them impracticable during such blackouts.
In such a setting, mobile ad-hoc networks can provide connectivity, but prior communication protocols for ad-hoc networks are not designed for anonymity and attack resilience.
We address this need by designing, implementing, and evaluating Moby, a blackout-resistant anonymity network for mobile devices.
Moby provides end-to-end encryption, forward secrecy and sender-receiver anonymity.
It features a bi-modal design of operation, using Internet connectivity when available and ad-hoc networks during blackouts.
During periods of Internet connectivity, Moby functions as a regular messaging application and bootstraps information that is later used in the absence of Internet connectivity to achieve secure anonymous communications.
Moby incorporates a model of trust based on users’ contact lists, and a trust establishment protocol that mitigates flooding attacks.
We perform an empirically informed simulation-based study based on cellphone traces of 268,596 users over the span of a week for a large cellular provider to determine Moby’s feasibility and present our findings.
Last, we implement and evaluate the Moby client as an Android app.
Related Results
Securing Mobile Data Computing in Healthcare
Securing Mobile Data Computing in Healthcare
Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile. This is inline with the need of ubiquitous computing in e...
Parent's Perception Regarding the Effects of Excessive Use of Mobile Phone on Children's Health: A Sociological Study in City Dera Ghazi Khan
Parent's Perception Regarding the Effects of Excessive Use of Mobile Phone on Children's Health: A Sociological Study in City Dera Ghazi Khan
The use of mobile phones among children has major effects on their health. Excessive and unrestricted use of mobile phones can contribute to various physical and psychological prob...
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
Mobile money refers to performing monetary transactions using telecommunications networks. This activity is intended to be referred to as "mobile money." The rapid use of mobile m...
Everyday Life in the "Tourist Zone"
Everyday Life in the "Tourist Zone"
This article makes a case for the everyday while on tour and argues that the ability to continue with everyday routines and social relationships, while at the same time moving thro...
STRATEGI MANAJEMEN KRISIS HUMAS PLN UID JABAR DALAM MENANGANI BLACKOUT JARINGAN JAWA BAGIAN TENGAH
STRATEGI MANAJEMEN KRISIS HUMAS PLN UID JABAR DALAM MENANGANI BLACKOUT JARINGAN JAWA BAGIAN TENGAH
Perusahaan Listrik Negara (PLN) sebagai satu-satunya perusahaan yang memasok listrik di Indonesia terus berupaya membangun untuk mewujudkan dapat mengalirkan energi listrik ke selu...
Scaling Analysis of Passive Heat Exchanger Under Station Blackout Accident
Scaling Analysis of Passive Heat Exchanger Under Station Blackout Accident
Station blackout accidents increasingly become the focus of research in the field of nuclear safety after Japan’s Fukushima nuclear plant accident in March 2011. Core decay heat un...
Network Mobility
Network Mobility
Network mobility (NEMO) management is concerned about the mobility management of an entire wireless mobile network to provide uninterrupted network connectivity to many mobile devi...
Network Mobility
Network Mobility
Network mobility (NEMO) management is concerned about the mobility management of an entire wireless mobile network to provide uninterrupted network connectivity to many mobile devi...

