Abstract
We propose a new scheme, protecting information about the location of a user against attacks from inside the mobile communication, especially the network providers. There have already been some proposals about how to protect location information in mobile communication environments. Among them, Kesdogan et al.[2,3] proposed a new method, using so-called temporary pseudonyms and also described protection method against passive and an active attacks. However, the protection method against an active attack is not clear. Moreover, there is an additional load in that it should append a reachability manager[1,6] to the proposed system. In this paper, we introduce a new scheme improving the method of Kesdogan et al. and analyze its security and effectiveness.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A.: Security in Public Mobile Communication Networks. In: Proc. IFIP/TC6 Personal Wireless Communications, Prague, pp. 105–116 (1995)
Kesdogan, D., Federrath, H., Jerocow, A., Pfitzmann, A.: Location Management Strategies increasing Privacy in Mobile Communication Systems. In: Proc. of the 12th IFIP International Information Security Conference SEC 1996. Chapman & Hall, Boca Raton (1996)
Kesdogan, D., Reichl, P., Junghartchen, K.: Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 295–312. Springer, Heidelberg (1998)
Farber, D., Larson, K.C.: Network Security via Dynamic Process Renaming. In: Proc. of the 4th Data Communications Symposion, Quebec, Canada (1975)
Chaum, D.: Untraceable Electronic Mail, Return Address and Digital Pseudonyms. Communications of the ACM 24(2), 65–75 (1981)
ETSI, GSM Recommendations: GSM 01.02-12.21 (1993)
Reichenbach, M., Damker, H., Federrath, H., Rannenberg, K.: Individual Management of Personal Reachability in Mobile Communication. In: Proc. of the IFIP TC11 SEC 1997. 13th International Information Security Conference, pp. 14–16 (1997)
Beresford, R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)
Barkhuus, L., Dey, A.K.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: Proc. of the IFIP TC13 INTERACT 2003, 9th International Conference on Human-Computer Interaction, pp. 709–712 (2003)
Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. In: Proc. of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots, pp. 46–55 (2003)
Benjumea, V., Lopez, J., Montenegro, J.A., Troya, J.M.: A First Approach to Provide Anonymity in Attribute Certificates. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 402–415. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, S.S., Yeo, S.S., Park, H.J., Kim, S.K. (2005). A New Scheme for the Location Information Protection in Mobile Communication Environments. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_36
Download citation
DOI: https://doi.org/10.1007/11560326_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29113-8
Online ISBN: 978-3-540-31998-6
eBook Packages: Computer ScienceComputer Science (R0)