Shadow attacks on users' anonymity in pervasive computing environments