Abstract
With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well. Following brief surveys of existing approaches to mobility management, general security considerations for UMTS and confidential storing of location information we introduce the ideas and concepts behind the new ‘anonymous subscriber’ method for UMTS, largely based on extended MIX networks. Finally, an application of this method conveniently employing the X.500 directory service infrastructure is described in some detail.
Chapter PDF
Similar content being viewed by others
References
Armbruster H. (1995) The Flexibility of ATM: Supporting Future Multimedia and Mobile Communications. IEEE Communications Magazine, February, 76–84.
Bar-Noy A., Kessler I., Sidi M. (1995) Mobile Users: To update or not to Update. Wireless Networks, July, 175–86.
Chadwick D. (1994) Understanding X.500 — The Directory. Chapman & Hall.
Chaum D (1981) Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24 /2, 84–8.
Farber D.J., Larson K.C. (1975) Network Security Via Dynamic Process Renaming; Fourth Data Communication Symp., Quebec City, Canada, Oct., 8–13–8.
Fasbender A., Hoff S., Pietschmann M. (1995) Mobility Management in Third Generation Mobile Networks. Proc. of the IFIP TC 6 Workshop “Personal Wireless Communications”.
Federrath H., Jerichow A., Kesdogan D., Pfitzmann A. (1995) Security in Public Mobile Communication Networks. Proc. of the IFIP TC 6 International Workshop on Personal Wireless Communications, 105–16.
ISO 9594 (1993) International Organization for Standardization: Information Technology–Open Systems Interconnection–The Directory, Part 1–9.
Jabbari B.: Intelligent Network Concepts in Mobile Communications; IEEE Communications Magazine, February 1992, pp. 64–69.
Karger P.A. (1977) Non-Discretionary Access Control for decentralized Computing Systems. Master Thesis, MIT, Laboratory for Computer Science, Report MIT/LCS/TR-179.
Kesdogan D., Federrath H., Jerichow A. and Pfitzmann A. (1996) Location Management Strategies increasing Privacy in Mobile Communication Systems; accepted for IFIP SEC 96, 12th International Information Security Conference.
Kesdogan D., Fouletier X. (1995) Secure Location Information Management in Cellular Radio Systems. IEEE Wireless Communication Systems Symposium WCSS 95, New York, 35–40.
Madhow U., Honig M.L., Steiglitz K. (1994) Optimization of Wireless Resources for Personal Communications Mobility Tracking. Proceedings of the IEEE Infocom. June, 577–84.
Pfitzmann A., Pfitzmann B, Waidner M. (1991) ISDN-MIXes: Untraceable Communication with Very Small Bandwidth Overhead. Proc. IFIP/SEC 91, Brighton, 245–58.
Pfitzmann A., Waidner M. (1987) Networks without User Observability. Computers & Security, 6, 158–66.
Pfitzmann A. (1993) Technischer Datenschutz in öffentlichen Funknetzen. DuD, 17 /8, 451–63.
RACE 1043 (1991) Final Report on Fixed Network aspects in UMTS. Issue 2.0, CEC Deliverable, No.: 43/RNL/FN12/DS/A/067/bl.
RACE D731 (1994) Mobile Communications: General Aspects and Evolution. Issue E, RACE Consensus Management R2083.
RACE D733 (1995) Mobile Communications: Common Network Aspects.
Rahnema M. (1993) Overview of the GSM System and Protocol Architecture. IEEE Communications Magazine, April, 92–100.
Rapeli J. (1995) UMTS: Targets, System Concept, and Standardization in a Global Framework. IEEE Personal Communications Magazine, February, 20–8.
Spaniol O., Fasbender A., Hoff S., Kaltwasser J., Kassubek J. (1995) Impacts of Mobility on Telecommunication and Data Communication Networks. IEEE Personal Communications Magazine, October, 20–33.
Wang J.Z. (1993) A Fully Distributed Location Registration Strategy for Universal Personal Communication Systems. IEEE Journal on Selected Areas in Communications, August, 850–60.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Hoff, S., Jakobs, K., Kesdogan, D. (1996). Anonymous Mobility Management for Third Generation Mobile Networks. In: Horster, P. (eds) Communications and Multimedia Security II. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35083-7_7
Download citation
DOI: https://doi.org/10.1007/978-0-387-35083-7_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2931-2
Online ISBN: 978-0-387-35083-7
eBook Packages: Springer Book Archive