Skip to main content

A New Scheme for the Location Information Protection in Mobile Communication Environments

  • Conference paper
  • 844 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3685))

Abstract

We propose a new scheme, protecting information about the location of a user against attacks from inside the mobile communication, especially the network providers. There have already been some proposals about how to protect location information in mobile communication environments. Among them, Kesdogan et al.[2,3] proposed a new method, using so-called temporary pseudonyms and also described protection method against passive and an active attacks. However, the protection method against an active attack is not clear. Moreover, there is an additional load in that it should append a reachability manager[1,6] to the proposed system. In this paper, we introduce a new scheme improving the method of Kesdogan et al. and analyze its security and effectiveness.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A.: Security in Public Mobile Communication Networks. In: Proc. IFIP/TC6 Personal Wireless Communications, Prague, pp. 105–116 (1995)

    Google Scholar 

  2. Kesdogan, D., Federrath, H., Jerocow, A., Pfitzmann, A.: Location Management Strategies increasing Privacy in Mobile Communication Systems. In: Proc. of the 12th IFIP International Information Security Conference SEC 1996. Chapman & Hall, Boca Raton (1996)

    Google Scholar 

  3. Kesdogan, D., Reichl, P., Junghartchen, K.: Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 295–312. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Farber, D., Larson, K.C.: Network Security via Dynamic Process Renaming. In: Proc. of the 4th Data Communications Symposion, Quebec, Canada (1975)

    Google Scholar 

  5. Chaum, D.: Untraceable Electronic Mail, Return Address and Digital Pseudonyms. Communications of the ACM 24(2), 65–75 (1981)

    Article  Google Scholar 

  6. ETSI, GSM Recommendations: GSM 01.02-12.21 (1993)

    Google Scholar 

  7. Reichenbach, M., Damker, H., Federrath, H., Rannenberg, K.: Individual Management of Personal Reachability in Mobile Communication. In: Proc. of the IFIP TC11 SEC 1997. 13th International Information Security Conference, pp. 14–16 (1997)

    Google Scholar 

  8. Beresford, R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)

    Article  Google Scholar 

  9. Barkhuus, L., Dey, A.K.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: Proc. of the IFIP TC13 INTERACT 2003, 9th International Conference on Human-Computer Interaction, pp. 709–712 (2003)

    Google Scholar 

  10. Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. In: Proc. of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots, pp. 46–55 (2003)

    Google Scholar 

  11. Benjumea, V., Lopez, J., Montenegro, J.A., Troya, J.M.: A First Approach to Provide Anonymity in Attribute Certificates. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 402–415. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, S.S., Yeo, S.S., Park, H.J., Kim, S.K. (2005). A New Scheme for the Location Information Protection in Mobile Communication Environments. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_36

Download citation

  • DOI: https://doi.org/10.1007/11560326_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29113-8

  • Online ISBN: 978-3-540-31998-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics