SPECIAL ISSUE PAPER ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks Sanaa Taha 1,2 and Xuemin (Sherman) Shen 1 * 1 Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada 2 Faculty of Computers and Information, Cairo University, Cairo, Egypt ABSTRACT The integration of mobile IPv6 heterogeneous networks enhances networking performance; however, it also breaks mobile nodes anonymity and location privacy. In this paper, we propose an anonymous and location privacy preserving (ALPP) scheme that consists of two complementary subschemes: anonymous home binding update and anonymous return routability. In addition, anonymous mutual authentication and key establishment schemes have been proposed to work in conjunction with ALPP to authenticate a mobile node to its foreign gateway and create a shared key between them. ALPP adds anonymity and location privacy services to mobile IPv6 signaling to achieve mobile senders and receiversprivacy. Unlike existing schemes, ALPP alleviates the trade-off between the networking performance and the achieved privacy level. Combining onion routing and anonymizer in ALPP scheme increases the achieved location privacy level where no entity in the network except the mobile node itself can identify this nodes location. Using entropy model, we show that ALPP achieves higher degree of anonymity than the mix-based scheme. The anonymous home binding update and anonymous return routability subschemes require less computation overheads and thwart both internal and external adversaries. Simulation results demonstrate that our schemes have low control packets routing delays and are suitable for the seamless handover. Copyright © 2012 John Wiley & Sons, Ltd. KEYWORDS anonymity; location privacy; mobile IPv6 security; heterogeneous networking privacy; next-generation networks *Correspondence Xuemin (Sherman) Shen, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada. E-mail: xshen@bbcr.uwaterloo.ca Part of this paper is published in the 2011 IEEE Global Communication Conference [1]. 1. INTRODUCTION The revolution of next-generation networks enables mobile nodes (MNs) that are equipped with multiple network interfaces to perform seamless handovers across heteroge- neous networks [2,3]. A seamless handover [4,5] is a vertical handover process in which an MN roams among different types of networks, such as cellular networks and Wireless Local Area Networks (WLANs), without inter- rupting this nodes active Internet protocol (IP) session. When using this timely restricted handover process, both MN and service provider have some benets, including low cost, wide coverage, and high bandwidth. Therefore, many applications such as infotainment and video-stream downloading explore seamless handovers to increase networking performance. Different network layers, including data link, IP, and transport layers, engage in this seamless handover process. However, the integration of these heterogeneous networks is mainly accomplished in the IP layer. The mobile IP is the most famous mobility management protocol that is responsible for managing users mobility across heteroge- neous networks. Therefore, as all share the usage of the mobile IP, these heterogeneous networks are also called all-IPnetworks [6]. We consider the mobile IPv6 protocol [7] because, unlike mobile IPv4 protocol, it introduces the route optimization procedure. This procedure contributes in decreasing networking routing delays and hence permits the mobile IPv6 to achieve seamless handover process for roaming MNs. Previous studies have attempted to secure the mobile IPv6 networks by focusing on the authentication and integrity problems [811]. Moreover, much research work has been done on anonymity and location privacy problems [1,12,13]. The anonymity of a network is the ability to hide a specic item among a group of similar items. The location privacy is the ability to prevent tracking user mobility by using any kind of geolocation schemes. As mentioned in [14] and [15], location privacy threats vary from a simple interfering personal activities, SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2013; 6:401419 Published online 9 October 2012 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.625 Copyright © 2012 John Wiley & Sons, Ltd. 401