Javascript must be enabled to continue!
Moby: A Blackout-Resistant Anonymity Network for Mobile Devices
View through CrossRef
Internet blackouts are challenging environments for anonymity and censorship resistance. Existing popular anonymity networks (e.g., Freenet, I2P, Tor) rely on Internet connectivity to function, making them impracticable during such blackouts. In such a setting, mobile ad-hoc networks can provide connectivity, but prior communication protocols for ad-hoc networks are not designed for anonymity and attack resilience. We address this need by designing, implementing, and evaluating Moby, a blackout-resistant anonymity network for mobile devices. Moby provides end-to-end encryption, forward secrecy and sender-receiver anonymity. It features a bi-modal design of operation, using Internet connectivity when available and ad-hoc networks during blackouts. During periods of Internet connectivity, Moby functions as a regular messaging application and bootstraps information that is later used in the absence of Internet connectivity to achieve secure anonymous communications. Moby incorporates a model of trust based on users’ contact lists, and a trust establishment protocol that mitigates flooding attacks. We perform an empirically informed simulation-based study based on cellphone traces of 268,596 users over the span of a week for a large cellular provider to determine Moby’s feasibility and present our findings. Last, we implement and evaluate the Moby client as an Android app.
Privacy Enhancing Technologies Symposium Advisory Board
Title: Moby: A Blackout-Resistant Anonymity Network for Mobile Devices
Description:
Internet blackouts are challenging environments for anonymity and censorship resistance.
Existing popular anonymity networks (e.
g.
, Freenet, I2P, Tor) rely on Internet connectivity to function, making them impracticable during such blackouts.
In such a setting, mobile ad-hoc networks can provide connectivity, but prior communication protocols for ad-hoc networks are not designed for anonymity and attack resilience.
We address this need by designing, implementing, and evaluating Moby, a blackout-resistant anonymity network for mobile devices.
Moby provides end-to-end encryption, forward secrecy and sender-receiver anonymity.
It features a bi-modal design of operation, using Internet connectivity when available and ad-hoc networks during blackouts.
During periods of Internet connectivity, Moby functions as a regular messaging application and bootstraps information that is later used in the absence of Internet connectivity to achieve secure anonymous communications.
Moby incorporates a model of trust based on users’ contact lists, and a trust establishment protocol that mitigates flooding attacks.
We perform an empirically informed simulation-based study based on cellphone traces of 268,596 users over the span of a week for a large cellular provider to determine Moby’s feasibility and present our findings.
Last, we implement and evaluate the Moby client as an Android app.
Related Results
ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
PurposeMobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m‐learning ...
Challenging Management of Postoperative Empyema: A Case Report with Literature Review
Challenging Management of Postoperative Empyema: A Case Report with Literature Review
Abstract
Introduction: Pleural empyema is the collection of pus within the pleural cavity, typically arising as a complication of pneumonia, chest trauma, thoracic surgery, or bact...
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Mobile Communication Studies
Mobile Communication Studies
Mobile media are recognized as the fastest-growing media category. Although mobile media users were already enjoying mobile devices in their everyday lives, prior to the millennium...
Transportation mobility management
Transportation mobility management
Today, the world has observed a remarkable growth in the use of transportation mobile communications for road safety. While a user in a vehicle moves to a new communication cell, a...
Securing Mobile Data Computing in Healthcare
Securing Mobile Data Computing in Healthcare
Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile. This is inline with the need of ubiquitous computing in e...
STRATEGI MANAJEMEN KRISIS HUMAS PLN UID JABAR DALAM MENANGANI BLACKOUT JARINGAN JAWA BAGIAN TENGAH
STRATEGI MANAJEMEN KRISIS HUMAS PLN UID JABAR DALAM MENANGANI BLACKOUT JARINGAN JAWA BAGIAN TENGAH
Perusahaan Listrik Negara (PLN) sebagai satu-satunya perusahaan yang memasok listrik di Indonesia terus berupaya membangun untuk mewujudkan dapat mengalirkan energi listrik ke selu...

