Browse > Article

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments  

김순석 (중앙대학교 컴퓨터공학과)
김성권 (중앙대학교 컴퓨터공학과)
Abstract
In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.
Keywords
temporary pseudonym identity; location untraceability service; anonymity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Pfitzmann and M. Waidner, 'Networks without User Observability,' Computers & Security, vol. 6, no. 2, pp. 158-166, 1987   DOI   ScienceOn
2 H. Federrath, A. Jericow, and A. Pfitzmann, 'MIXes in Mobile Communication Systems: Location Management with Privacy,' Proc. of the Workshop on Information Hiding, 1997
3 D. Chaum, 'Untraceable Electronic Mail, Return Address and Digital Pseudonyms,' Communications of the ACM, vol. 24, no. 2, pp. 65-75, 1981
4 Y. B. Lin, C. H. R. Rao, and M. F. Chang, 'Mobile Prepaid Phone Services,' IEEE Personal Communications Magazine, vol 7, no. 3, pp. 6-14, 2000   DOI
5 ETSI, 'GSM Recommendations: GSM 01.02-12.21,' Feb 1993, Release 1992
6 T. P. Pederson, 'Electronic Payments of Small Accounts,' Security Protocols, LNCS vol. 1361, pp. 59-68, 1997
7 M. Reichenbach, H. Damker, H. Federrath, and K. Rannenberg, 'Individual Management of Personal Reachability in Mobile Communication,' Proc. of the IFIP TC11 SEC 97, 13th International Information Security Conference, pp. 14-16, 1997
8 L. Buttyan and J. Hubaux, 'Accountable and Anonymous Access to Services in Mobile Communication Systems,' IEEE Symposium on Reliable Distributed Systems, pp. 384-389, 1999   DOI
9 B. Patel and J. Crowcroft, 'Ticket Based Service Access for the Mobile User,' Mobicom '97, pp. 223-233, 1997   DOI
10 G. Horn and B. Preneel, 'Authentication and Payment in Future Mobile Systems,' ESORICS '98, LNCS, vol. 1485, pp. 277-293, 1998   DOI   ScienceOn
11 D. Kesdogan, P. Reichl, and K. Junghartchen, 'Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks,' ESOROCS '98, LNCS vol. 1485, pp. 295-312, 1998   DOI   ScienceOn
12 J. Zhou and K. Y. Lam, 'Undeniable Billing in Mobile Communication,' Mobicom '98, pp. 284-290, 1998   DOI
13 H. Federrath, A. Jerichow, D. Kesdogan, and A. Pfitzmann, 'Security in Public Mobile Communication Networks,' Proc. of the IFIP TC6 International Workshop on Personal Wireless Communications, pp. 105-116, 1995
14 B. Askwith, M. Merabti, Q. Shi, and K. Whiteley, 'Achieving User Privacy in Mobile Networks,' 13th Annual Computer Security Applications Conference, 1997   DOI
15 A. Pfitzmann, B. Pfitzmann, and M. Waidner, 'ISDN-MIXes Untraceable Communication with Very Small Bandwidth Overhead,' 7th IFIP International Conference on Informatin Security(IFIP/SEC'91), 1991
16 D. Kesdogan, H. Federrath, A. Jericow, and A. Pfizmann, 'Location Management Strategies increasing Privacy in Mobile Communication Systems,' 12th IFIP International Conference on Informatin Security(IFIP/SEC'96), 1996
17 D. J. Farber and K. C. Larson, 'Network Security Via Dynamic Process Renaming,' Proc. of Fourth Data Communications Symposium, pp. 8-18, 1975