Browse > Article

New Mobile Terminated Protocol for User Privacy Protection in Mobile Communication Environments  

Kim, Soon-Seok (한라대학교 컴퓨터공학과)
Abstract
In related to mobile communication environment. Kesdogan and Pfitzmann[1,2,3] proposed solutions using temporary pseudonym identification, called TP(Temporary Pseudonym) to solve the problems concerning current locations of mobile users and exposure of their movements in the privacy aspect. After that, we proposed more improved method protecting mobile users from active attacks of network providers in [4]. But it is the case that mobile users are located in only home domain. As a more extended method. we propose new mobile terminated protocol protecting user privacy in case of moving from the home domain to the remote domain and analyze its security.
Keywords
temporary pseudonym identity; location untraceability service; anonymity; privacy protection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Pfitzmann, B. Pfitzmann, and M. Waidner, 'ISDNMIXes Untraceable Communication with Very Small Bandwidth Overhead,' 7th IFIP International Conference on Informatin Security(IFIP/SEC'91), 1991
2 D. Kesdogan, H. Federrath, A. Jericow, and A. Pfizmann, 'Location Management Strategies increasing Privacy in Mobile Communication Systems,' 12th IFIP International Conference on Informatin Security (IFIP/SEC'96), 1996
3 D. J. Farber and K. C. Larson, 'Network Security Via Dynamic Process Renaming,' Proc. of Fourth Data Communications Symposium, pp. 8-18, 1975
4 D. Kesdogan, P. Reichl, and K. Junghartchen, 'Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks,' ESOROCS '98, LNCS vol. 1485, pp. 295-312, 1998
5 H. Federrath, A. Jericow, and A. Pfitzmann, 'MIXes in Mobile Communication Systems: Location Management with Privacy:' Proc. of the Workshop on Information Hiding, 1997
6 A. Pfitzmann, B. Pfitzmann, and M. Waidner, 'ISDNMiXes Untraceable Communication with Very Small Bandwidth Overhead,' 7th IFIP International Conference on Informatin Security(IFIP/SEC'91), 1991
7 V. Benjumea, J. Lopez, J. A. Montenegro, and J. M. Troya, 'A First Approach to Provide Anonymity in Attribute Certificates,' Proc. of the PKC2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, LNCS vol. 2047, pp. 12-28,2004
8 ETSI, 'GSM Recommendations: GSM 01.02-12.21,' Feb 1993, Release 1992
9 S. S. Kim, S. S. Yeo, H. J. Park, and S. K. Kim, 'A New Scheme for the Location Information Protection in Mobile Communication Environments,' MMM-ACNS '2005, LNCS vol. 3685, pp. 436-441, 2005
10 B. Askwith, M. Merabti, Q. Shi, and K. Whiteley, 'Achieving User Privacy in Mobile Networks,' 13th Annual Computer Security Applications Conference, 1997