New Mobile Terminated Protocol for User Privacy Protection in Mobile Communication Environments

이동통신 환경에서 사용자 프라이버시 보호를 위한 새로운 이동 착호프로토콜

  • Published : 2006.12.30

Abstract

In related to mobile communication environment. Kesdogan and Pfitzmann[1,2,3] proposed solutions using temporary pseudonym identification, called TP(Temporary Pseudonym) to solve the problems concerning current locations of mobile users and exposure of their movements in the privacy aspect. After that, we proposed more improved method protecting mobile users from active attacks of network providers in [4]. But it is the case that mobile users are located in only home domain. As a more extended method. we propose new mobile terminated protocol protecting user privacy in case of moving from the home domain to the remote domain and analyze its security.

References

  1. A. Pfitzmann, B. Pfitzmann, and M. Waidner, 'ISDNMIXes Untraceable Communication with Very Small Bandwidth Overhead,' 7th IFIP International Conference on Informatin Security(IFIP/SEC'91), 1991
  2. D. Kesdogan, H. Federrath, A. Jericow, and A. Pfizmann, 'Location Management Strategies increasing Privacy in Mobile Communication Systems,' 12th IFIP International Conference on Informatin Security (IFIP/SEC'96), 1996
  3. D. Kesdogan, P. Reichl, and K. Junghartchen, 'Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks,' ESOROCS '98, LNCS vol. 1485, pp. 295-312, 1998
  4. S. S. Kim, S. S. Yeo, H. J. Park, and S. K. Kim, 'A New Scheme for the Location Information Protection in Mobile Communication Environments,' MMM-ACNS '2005, LNCS vol. 3685, pp. 436-441, 2005
  5. B. Askwith, M. Merabti, Q. Shi, and K. Whiteley, 'Achieving User Privacy in Mobile Networks,' 13th Annual Computer Security Applications Conference, 1997
  6. ETSI, 'GSM Recommendations: GSM 01.02-12.21,' Feb 1993, Release 1992
  7. D. J. Farber and K. C. Larson, 'Network Security Via Dynamic Process Renaming,' Proc. of Fourth Data Communications Symposium, pp. 8-18, 1975
  8. A. Pfitzmann, B. Pfitzmann, and M. Waidner, 'ISDNMiXes Untraceable Communication with Very Small Bandwidth Overhead,' 7th IFIP International Conference on Informatin Security(IFIP/SEC'91), 1991
  9. H. Federrath, A. Jericow, and A. Pfitzmann, 'MIXes in Mobile Communication Systems: Location Management with Privacy:' Proc. of the Workshop on Information Hiding, 1997
  10. V. Benjumea, J. Lopez, J. A. Montenegro, and J. M. Troya, 'A First Approach to Provide Anonymity in Attribute Certificates,' Proc. of the PKC2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, LNCS vol. 2047, pp. 12-28,2004