Mobile Terminated Protocol to Remote Domain Considering User Location Untraceability Service

  • 발행 : 2007.09.30

초록

In previous papers [1] and [2], we proposed two improved methods protecting mobile users from active attacks[3,4] of network providers in mobile communication environment. But they were the case that mobile users were located in only home domain. In [5], we proposed protocol extending the method of [1] in case of roaming from the home domain to the remote domain. The purpose of this paper is to propose new mobile terminated protocol extending the method of [2] and analyze its security.

키워드

참고문헌

  1. S. S. Kim, S. S. Yeo, H. J. Park, and S. K. Kim, 'A New Scheme for the Location Information Protection in Mobile Communication Environments,' Proc. of the MMM-ACNS 2005: 3th International Workshop on Mathmatical Methods, Models, and Architectures for Computer Network Security, LNCS, Vol. 3685, pp. 436-441, 2005
  2. S. S. Kim and S. K. Kim, 'A Study on Location Untraceability Service and Payment Protocol Using Temporary Pseudonym in Mobile Communication Environments,' Journal of Korea Information Science Society(KISS):System & Theory, Vol. 30, No. 2, pp 78-92, 2003
  3. D. Kesdogan, H. Federrath, A. Jericow, and A. Pfizmann, 'Location Management Strategies increasing Privacy in Mobile Communication Systems,' Proc. of the 12th IFIP International Conference on Informatin Security(IFIP/SEC'96), 1996
  4. D. Kesdogan, P. Reichl, and K. Junghartchen, 'Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks,' ESOROCS '98, LNCS vol. 1485, pp. 295-312, 1998
  5. S. S. Kim, 'New Mobile Terminated Protocol for User Privacy Protection in Mobile Communication Environments,' Journal of the Korean Institute of Maritime Information & Communication Sciences(KIMICS), Vol. 10, No. 12, pp 2193-2201, 2006
  6. ETSI, 'GSM Recommendations: GSM 01.02-12.21,' Feb. 1993, Release 1992
  7. A. Pfitzmann, B. Pfitzmann, and M. Waidner, 'ISDN-MIXes Untraceable Communication with Very Small Bandwidth Overhead,' Proc. of the 7th IFIP International Conference on Informatin Security(IFIP/SEC'91), 1991
  8. H. Federrath, A. Jericow, and A. Pfitzmann, 'MIXes in Mobile Communication Systems: Location Management with Privacy,' Proc. of the Workshop on Information Hiding, 1997