Abstract
One of the major security aspects in mobile communication networks concerns information about the localization of the (mobile) network user. This information may be protected by establishing a trusted third party that is responsible for creating suitable pseudonyms for the user identity. Distributing the maintenance of pseudonyms among n independent trusted parties allows to increase further the security of location information. In this paper, a method is proposed that guarantees security as long as at least one of the n parties may definitely be trusted whereas the other parties may turn out to be corrupt. The pseudonym collision probability is derived analytically before a detailed OPNET simulation evaluates the cost of the new approach compared to standard GSM.
The work of Dogan Kesdogan was supported by the Gottlieb Daimler- and Karl Benz-Foundation
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Brass, V.; Fuhrmann, W. F.: Traffic Engineering Experience from Operating Cellular Networks. IEEE Communication Magazine, August 1997, 66–71.
Chaum, D.: Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. Communications of the ACM (24) 2, 1981, 84–88.
Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology vol.1 no. 1, 1988, 65–75.
Dauber, F.-J.: QoS Parameters of Bus Traffic with respect to Time-Tables and Subsequent Variability. Ph.D. Thesis (in German). Aachen University of Technology, July 1986.
Institute Eurecom, Delta Partners: A GSM OPNET Model (incl. documentation) Ç 1994–95.
Farber, D. J.; Larson, K. C: Network Security via Dynamic Process Renaming. Proceedings of the 4th Data Communications Symposion, Quebec (Canada), October 1975, 8/13–8/18.
Federrath, H.; Jerichow, A.; Kesdogan, D.; Pfitzmann, A.: Security in Public Mobile Communication Networks. Proc. of the IFIP TC 6 International Workshop on Personal Wireless Communications. Augustinus (Aachen) 1995, 105–116
Federrath, H.; Jerichow, A.; Pfitzmann, A.: MIXes in Mobile Communication Systems: Location Management with Privacy. Proceedings of the Workshop on Information Hiding, Cambridge (UK), May 1997.
Federrath, H.: Trusted Mobility Management in Telecommunication Networks. Ph.D. Thesis. TU Dresden 1997 (in German).
Fuhrmann, W.; Brass, V.: Performance Aspects of the GSM Radio Subsystem. Proceedings of the IEEE, vol. 82 no. 9, 1994, 1449–1466.
Guérin, Roch A.: Channel Occupancy Time Distribution in a Cellular Radio System. IEEE Transactions on Vehicular Technology, vol. VT-35 no. 3, 1987, 89–99.
JunghÄrtchen, K.: Simulative Investigation of Methods for Protecting Location Information in Mobile Networks. Diploma Thesis (in German). Aachen University of Technology, November 1997.
Karger, P.A.: Non-Discretionary Access Control for Decentralized Computing Systems. M.Sc. Thesis, Techn. Report MIT/LCS/TR-179, MIT 1975.
Kesdogan, D.; Fouletier, X.: Secure Location Information Management in Cellular Radio Systems. Proceedings of the IEEE Wireless Communication Systems Symposion WCSS’95, Long Island, 1995, 35–46.
Kesdogan, D.; Egner, J.; Büschkes, R.: Stop-And-Go-MIXes Providing Probabilistic Anonymity in an Open System. Workshop on Information Hiding. Oregon, April 1998 (to be published in Springer LNCS).
Kesdogan, D.; Federrath, H.; Jerichow, A.; Pfitzmann, A.: Location Management Strategies increasing Privacy in Mobile Communication Systems. Proceedings of the 12th IFIP International Information Security Conference SEC’96, May 1996 (Chapman & Hall).
King, P.J.B.: Computer and Communication Systems Performance Modelling. Prentice Hall 1990.
Lyberopoulos, G.L.; Markoulidakis, J.G.; Polymeros, D.F. et al.: Intelligent Paging Strategies for Third Generation Mobile Telecommunication Systems. IEEE Transactions on Vehicular Technology, vol. 44 no. 3, August 1995, 543–553.
Mouly, M.; Pautet, M.B.: The GSM System for Mobile Communication. Published by the authors, 4, rue Elisée Reclus, F-91120 Palaiseau, France.
Reichl, P.; Kesdogan, D.; JunghÄrtchen, K.; Schuba, M.: Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. Proceedings of the 10th International Conference for Computer Performance Evaluation TOOLS’98. Palma de Mallorca, September 1998 (to appear in Springer LNCS).
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kesdogan, D., Reichl, P., JunghÄrtchen, K. (1998). Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks. In: Quisquater, JJ., Deswarte, Y., Meadows, C., Gollmann, D. (eds) Computer Security — ESORICS 98. ESORICS 1998. Lecture Notes in Computer Science, vol 1485. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055871
Download citation
DOI: https://doi.org/10.1007/BFb0055871
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65004-1
Online ISBN: 978-3-540-49784-4
eBook Packages: Springer Book Archive