Anonymous Mobility Management for Third Generation Mobile Networks

  • S. Hoff
  • K. Jakobs
  • D. Kesdogan
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)


With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well. Following brief surveys of existing approaches to mobility management, general security considerations for UMTS and confidential storing of location information we introduce the ideas and concepts behind the new ‘anonymous subscriber’ method for UMTS, largely based on extended MIX networks. Finally, an application of this method conveniently employing the X.500 directory service infrastructure is described in some detail.


Mobile networks mobility management security privacy directory service X.500 


  1. Armbruster H. (1995) The Flexibility of ATM: Supporting Future Multimedia and Mobile Communications. IEEE Communications Magazine, February, 76–84.Google Scholar
  2. Bar-Noy A., Kessler I., Sidi M. (1995) Mobile Users: To update or not to Update. Wireless Networks, July, 175–86.Google Scholar
  3. Chadwick D. (1994) Understanding X.500 — The Directory. Chapman & Hall.Google Scholar
  4. Chaum D (1981) Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24 /2, 84–8.CrossRefGoogle Scholar
  5. Farber D.J., Larson K.C. (1975) Network Security Via Dynamic Process Renaming; Fourth Data Communication Symp., Quebec City, Canada, Oct., 8–13–8.Google Scholar
  6. Fasbender A., Hoff S., Pietschmann M. (1995) Mobility Management in Third Generation Mobile Networks. Proc. of the IFIP TC 6 Workshop “Personal Wireless Communications”.Google Scholar
  7. Federrath H., Jerichow A., Kesdogan D., Pfitzmann A. (1995) Security in Public Mobile Communication Networks. Proc. of the IFIP TC 6 International Workshop on Personal Wireless Communications, 105–16.Google Scholar
  8. ISO 9594 (1993) International Organization for Standardization: Information Technology–Open Systems Interconnection–The Directory, Part 1–9.Google Scholar
  9. Jabbari B.: Intelligent Network Concepts in Mobile Communications; IEEE Communications Magazine, February 1992, pp. 64–69.Google Scholar
  10. Karger P.A. (1977) Non-Discretionary Access Control for decentralized Computing Systems. Master Thesis, MIT, Laboratory for Computer Science, Report MIT/LCS/TR-179.Google Scholar
  11. Kesdogan D., Federrath H., Jerichow A. and Pfitzmann A. (1996) Location Management Strategies increasing Privacy in Mobile Communication Systems; accepted for IFIP SEC 96, 12th International Information Security Conference.Google Scholar
  12. Kesdogan D., Fouletier X. (1995) Secure Location Information Management in Cellular Radio Systems. IEEE Wireless Communication Systems Symposium WCSS 95, New York, 35–40.CrossRefGoogle Scholar
  13. Madhow U., Honig M.L., Steiglitz K. (1994) Optimization of Wireless Resources for Personal Communications Mobility Tracking. Proceedings of the IEEE Infocom. June, 577–84.Google Scholar
  14. Pfitzmann A., Pfitzmann B, Waidner M. (1991) ISDN-MIXes: Untraceable Communication with Very Small Bandwidth Overhead. Proc. IFIP/SEC 91, Brighton, 245–58.Google Scholar
  15. Pfitzmann A., Waidner M. (1987) Networks without User Observability. Computers & Security, 6, 158–66.CrossRefGoogle Scholar
  16. Pfitzmann A. (1993) Technischer Datenschutz in öffentlichen Funknetzen. DuD, 17 /8, 451–63.Google Scholar
  17. RACE 1043 (1991) Final Report on Fixed Network aspects in UMTS. Issue 2.0, CEC Deliverable, No.: 43/RNL/FN12/DS/A/067/bl.Google Scholar
  18. RACE D731 (1994) Mobile Communications: General Aspects and Evolution. Issue E, RACE Consensus Management R2083.Google Scholar
  19. RACE D733 (1995) Mobile Communications: Common Network Aspects.Google Scholar
  20. Rahnema M. (1993) Overview of the GSM System and Protocol Architecture. IEEE Communications Magazine, April, 92–100.Google Scholar
  21. Rapeli J. (1995) UMTS: Targets, System Concept, and Standardization in a Global Framework. IEEE Personal Communications Magazine, February, 20–8.Google Scholar
  22. Spaniol O., Fasbender A., Hoff S., Kaltwasser J., Kassubek J. (1995) Impacts of Mobility on Telecommunication and Data Communication Networks. IEEE Personal Communications Magazine, October, 20–33.Google Scholar
  23. Wang J.Z. (1993) A Fully Distributed Location Registration Strategy for Universal Personal Communication Systems. IEEE Journal on Selected Areas in Communications, August, 850–60.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 1996

Authors and Affiliations

  • S. Hoff
    • 1
  • K. Jakobs
    • 1
  • D. Kesdogan
    • 1
  1. 1.Department of Computer ScienceAachen University of TechnologyAachenGermany

Personalised recommendations