Information Technology Reference
In-Depth Information
the reachability manager, where the NP will forge the personal information and call
subject at the intermediate position from the external user. It disguises for a call
request from the external user and is to send the personal information of the caller to
the MS through the reachability manager.
5 Conclusions
In this paper we considered improvements of the TP method and proposed a new
scheme, protecting an illegal attempt from the malicious network provider to find out
location information. We also showed that the proposed scheme is secure against the
active attacks through seven cases. Moreover, our scheme is more efficient than the
previous schemes and is easily applicable in a current mobile network.
Acknowledgement. This work was supported by grant No. R01-2005-000-10568-0
from the Basic Research Program of the Korea Science & Engineering Foundation.
References
1. Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A.: Security in Public Mobile
Communication Networks. Proc. IFIP/TC6 Personal Wireless Communications, Prague
(1995) 105-116
2. Kesdogan, D., Federrath, H., Jerocow, A., Pfitzmann, A.: Location Management Strategies
increasing Privacy in Mobile Communication Systems. Proc. of the 12th IFIP International
Information Security Conference SEC96, Chapman & Hall (1996)
3. Kesdogan, D., Reichl, P., Junghartchen, K.: Distributed Temporary Pseudonyms: A New
Approach for Protecting Location Information in Mobile Communication Networks.
ESOROCS '98, LNCS, Vol. 1485 (1998) 295-312
4. Farber, D., Larson, K.C.: Network Security via Dynamic Process Renaming. Proc. of the
4th Data Communications Symposion, Quebec Canada (1975)
5. Chaum, D.: Untraceable Electronic Mail, Return Address and Digital Pseudonyms.
Communications of the ACM, Vol.24, No.2 (1981) 65-75
6. ETSI, GSM Recommendations: GSM 01.02-12.21 (1993)
7. Reichenbach, M., Damker, H., Federrath, H., Rannenberg, K.: Individual Management of
Personal Reachability in Mobile Communication. Proc. of the IFIP TC11 SEC 97. 13 th
International Information Security Conference (1997) 14-16
8. Beresford, R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive
Computing, Vol.2, No.1 (2003) 46-55
9. Barkhuus, L., Dey, A. K.: Location-based services for mobile telephony: a study of users'
privacy concerns. Proc. of the IFIP TC13 INTERACT 2003, 9th International Conference
on Human-Computer Interaction (2003) 709-712
10. Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through
disposable interface identifiers: a quantitative analysis. Proc. of the 1st ACM international
workshop on Wireless mobile applications and services on WLAN hotspots (2003) 46-55
11. Benjumea, V., Lopez, J., Montenegro, J. A., Troya, J. M.: A First Approach to Provide
Anonymity in Attribute Certificates. Proc. of the PKC2004: 7th International Workshop on
Theory and Practice in Public Key Cryptography, LNCS, Vol.2047 (2004) 12-28
 
Search WWH ::




Custom Search