Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.7.867

Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments  

Kim, Soon-Seok (한라대학교 정보통신공학부)
Lee, Chang-Hun (한경대학교 컴퓨터공학과)
Abstract
In thls Paper, we Propose a new scheme, protecting information about the location of a mobile user against attacks from inside users of the mobile communication, especially the network providers. There have already been some proposals about how to protect location information of user in mobile communication environments〔1-5〕. Among them, Kesdogan et al.〔2, 3〕 proposed a new method, using so-called temporary pseudonyms and also described protection method against a passive and an active attack of network providers. However, the description of protection method against the active attack between the two is not clear. Moreover, there is an additional load that it should append a reachability manager〔1, 6〕 to the proposed system. Therefore, we propose a new scheme improving the above method of Kesdogan et al. and analyze its security and effectiveness.
Keywords
Temporary Pseudonym Identity; Location Untraceability Service; Anonymity; Privacy Protection; Mobile Communication Environments;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Farber and K. C. Larson, 'Network Security via Dynamic Process Renaming,' Proc. The 4th Data Communication Symposion, Quebec Canada, Oct., 1975
2 M. Reichenbach, H. Damker, H. Federrath and K. Rannenberg, 'Individual Management of Personal Reachability in Mobile Communication,' Proc. of the IFIP TC11 SEC 97, 13th International Information Security Conference, pp. 14-16, 1997
3 D. Chaum, 'Untraceable Electronic Mail, Return Address and Digital Pseudonyms,' Communications of the ACM, Vol. 24, No. 2, pp. 65-75, 1981
4 ETSI, GSM Recommendations : GSM 01.02-12.21, Feb., 1993
5 D. Kesdogan, P. Reichl and K. Junghartchen, 'Distributed Temporary Pseudonyms : A New Approach for Protecting Location Information in Mobile Communication Networks,' ESOROCS'98, LNCS Vol. 1485, pp. 295-312, 1998   DOI   ScienceOn
6 H. Federrath, A. Jerichow, D. Kesdogan and A. Pfitzmann, 'Security in Public Mobile Communication Networks,' Proc. IFIP/TC6 Personal Wireless Communications, Prague, pp. 105-116, 1995
7 D. Kesdogan, H. Federrath, A. Jerocow and A. Pfitzmann, 'Location Management Strategies increasing Privacy in Mobile Communication Systems,' Proc. The 12th IFIP International Information Security Conference SEC96, Chapman & Hall, 1996