Skip to main content

Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks

  • Conference paper
  • First Online:
Computer Performance Evaluation (TOOLS 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1469))

Abstract

The information about the location of a mobile user belongs to the most sensitive data within mobile communication networks. One possibility to protect it especially against curious insiders with access to the network consists of storing the actual information in so-called “home trusted devices” and using temporary pseudonyms for user registration in the network databases. This paper presents a detailed OPNET simulation and evaluation of the signalling cost of this approach compared to standard GSM.

The work of Dogan Kesdogan was supported by the Gottlieb Daimler- and Karl Benz-Foundation

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brass, V.; Fuhrmann, W. F.: Traffic Engineering Experience from Operating Cellular Networks. IEEE Communication Magazine, August 1997, 66–71.

    Google Scholar 

  2. Dauber, F.-J.: QoS Parameters of Bus Traffic with respect to Time-Tables and Subsequent Variability. Ph.D. Thesis (in German). Aachen University of Technology, July 1986.

    Google Scholar 

  3. Institute Eurecom, Delta Partners: A GSM OPNET Model (incl. documentation). © 1994–95.

    Google Scholar 

  4. Fuhrmann, W.; Brass, V.: Performance Aspects of the GSM Radio Subsystem. Proceedings of the IEEE, vol. 82 no. 9, 1994, 1449–1466.

    Article  Google Scholar 

  5. Farber, D. J.; Larson, K. C.: Network Security via Dynamic Process Renaming. Proceedings of the 4th Data Communications Symposion, Quebec (Canada), Oct. 1975, 8/13–8/18.

    Google Scholar 

  6. Guérin, Roch A.: Channel Occupancy Time Distribution in a Cellular Radio System. IEEE Transactions on Vehicular Technology, vol. VT-35 no. 3, 1987, 89–99.

    Article  Google Scholar 

  7. Junghärtchen, K.: Simulative Investigation of Methods for Protecting Location Information in Mobile Networks. Diploma Thesis. Aachen University of Technology, November 1997 (in German).

    Google Scholar 

  8. Karger, P. A.: Non-Discretionary Access Control for Decentralized Computing Systems. M.Sc. Thesis, Techn. Report MIT/LCS/TR-179, MIT 1975.

    Google Scholar 

  9. Kesdogan, D.; Fouletier, X.: Secure Location Information Management in Cellular Radio Systems. Proceedings of the IEEE Wireless Communication Systems Symposion WCSS’95, Long Island, 1995, 35–46.

    Google Scholar 

  10. Kesdogan, D.; Federrath, H.; Jerichow, A.; Pfitzmann, A.: Location Management Strategies increasing Privacy in Mobile Communication Systems. Proceedings of the 12th IFIP International Information Security Conference SEC’96, May 1996 (Chapman & Hall).

    Google Scholar 

  11. Kesdogan, D.; Reichl, P.; Junghärtchen, K.: Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. Proceedings of ESORICS’98. Louvain, Sept. 1998 (Springer LNCS).

    Google Scholar 

  12. Lyberopoulos, G. L.; Markoulidakis, J. G.; Polymeros, D. F. et al.: Intelligent Paging Strategies for Third Generation Mobile Telecommunication Systems. IEEE Transactions on Vehicular Technology, vol. 44 no. 3, August 1995, 543–553.

    Article  Google Scholar 

  13. Mouly, M.; Pautet, M. B.: The GSM System for Mobile Communication. Published by the authors, 4, rue Elisée Reclus, F-91120 Palaiseau, France.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Reichl, P., Kesdogan, D., Junghärtchen, K., Schuba, M. (1998). Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. In: Puigjaner, R., Savino, N.N., Serra, B. (eds) Computer Performance Evaluation. TOOLS 1998. Lecture Notes in Computer Science, vol 1469. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-68061-6_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-68061-6_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64949-6

  • Online ISBN: 978-3-540-68061-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics