Abstract
The information about the location of a mobile user belongs to the most sensitive data within mobile communication networks. One possibility to protect it especially against curious insiders with access to the network consists of storing the actual information in so-called “home trusted devices” and using temporary pseudonyms for user registration in the network databases. This paper presents a detailed OPNET simulation and evaluation of the signalling cost of this approach compared to standard GSM.
The work of Dogan Kesdogan was supported by the Gottlieb Daimler- and Karl Benz-Foundation
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brass, V.; Fuhrmann, W. F.: Traffic Engineering Experience from Operating Cellular Networks. IEEE Communication Magazine, August 1997, 66–71.
Dauber, F.-J.: QoS Parameters of Bus Traffic with respect to Time-Tables and Subsequent Variability. Ph.D. Thesis (in German). Aachen University of Technology, July 1986.
Institute Eurecom, Delta Partners: A GSM OPNET Model (incl. documentation). © 1994–95.
Fuhrmann, W.; Brass, V.: Performance Aspects of the GSM Radio Subsystem. Proceedings of the IEEE, vol. 82 no. 9, 1994, 1449–1466.
Farber, D. J.; Larson, K. C.: Network Security via Dynamic Process Renaming. Proceedings of the 4th Data Communications Symposion, Quebec (Canada), Oct. 1975, 8/13–8/18.
Guérin, Roch A.: Channel Occupancy Time Distribution in a Cellular Radio System. IEEE Transactions on Vehicular Technology, vol. VT-35 no. 3, 1987, 89–99.
Junghärtchen, K.: Simulative Investigation of Methods for Protecting Location Information in Mobile Networks. Diploma Thesis. Aachen University of Technology, November 1997 (in German).
Karger, P. A.: Non-Discretionary Access Control for Decentralized Computing Systems. M.Sc. Thesis, Techn. Report MIT/LCS/TR-179, MIT 1975.
Kesdogan, D.; Fouletier, X.: Secure Location Information Management in Cellular Radio Systems. Proceedings of the IEEE Wireless Communication Systems Symposion WCSS’95, Long Island, 1995, 35–46.
Kesdogan, D.; Federrath, H.; Jerichow, A.; Pfitzmann, A.: Location Management Strategies increasing Privacy in Mobile Communication Systems. Proceedings of the 12th IFIP International Information Security Conference SEC’96, May 1996 (Chapman & Hall).
Kesdogan, D.; Reichl, P.; Junghärtchen, K.: Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. Proceedings of ESORICS’98. Louvain, Sept. 1998 (Springer LNCS).
Lyberopoulos, G. L.; Markoulidakis, J. G.; Polymeros, D. F. et al.: Intelligent Paging Strategies for Third Generation Mobile Telecommunication Systems. IEEE Transactions on Vehicular Technology, vol. 44 no. 3, August 1995, 543–553.
Mouly, M.; Pautet, M. B.: The GSM System for Mobile Communication. Published by the authors, 4, rue Elisée Reclus, F-91120 Palaiseau, France.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Reichl, P., Kesdogan, D., Junghärtchen, K., Schuba, M. (1998). Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. In: Puigjaner, R., Savino, N.N., Serra, B. (eds) Computer Performance Evaluation. TOOLS 1998. Lecture Notes in Computer Science, vol 1469. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-68061-6_9
Download citation
DOI: https://doi.org/10.1007/3-540-68061-6_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64949-6
Online ISBN: 978-3-540-68061-1
eBook Packages: Springer Book Archive