On Travelling Incognito
- 1 December 1994
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 205-211
- https://doi.org/10.1109/wmcsa.1994.29
Abstract
User mobility is rapidly becoming an important and popular feature in today's networks. This is especially evident in wireless/cellular environments. While useful and desirable, user mobility raises a number of important security-related issues and concerns. One of them is the issue of tracking mobile user's movements and current whereabouts. Ideally, no entity other than the user himself and a responsible authority in the user's home domain should know either the real identity or the current location of the mobile user. At present, environments supporting user mobility either do not address the problem at all or base their solutions on the specific hardware capabilities of the user's personal device, e.g., a cellular telephone. This paper discusses a wide range of issues related to anonymity in mobile envlronments, reviews current state-of-the-art approaches and proposes several potential solutions. Solutions vary in complexity, degree of protection and assumptions about the underlying environment.Keywords
This publication has 5 references indexed in Scilit:
- Authentication of mobile usersIEEE Network, 1994
- Privacy and authentication on a portable communications systemIEEE Journal on Selected Areas in Communications, 1993
- Overview of the GSM system and protocol architectureIEEE Communications Magazine, 1993
- Security without identification: transaction systems to make big brother obsoleteCommunications of the ACM, 1985
- New directions in cryptographyIEEE Transactions on Information Theory, 1976