Mobile Privacy in Wireless Networks-Revisited
- 14 March 2008
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Wireless Communications
- Vol. 7 (3), 1035-1042
- https://doi.org/10.1109/twc.2008.060802
Abstract
With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protecting mobile privacy in wireless networks, and identify the privacy weakness of the third generation partnership project - authentication and key agreement (3GPP-AKA) by showing a practical attack to it. We then propose a scheme that meets these requirements, and this scheme does not introduce security vulnerability to the underlying authentication scheme. Another feature of the proposed scheme is that on each use of wireless channel, it uses a one-time alias to conceal the real identity of the mobile station with respect to both eavesdroppers and visited (honest or false) location registers. Moreover, the proposed scheme achieves this goal of identity concealment without sacrificing authentication efficiency.Keywords
This publication has 15 references indexed in Scilit:
- Security analysis and enhancements of 3GPP authentication and key agreement protocolIEEE Transactions on Wireless Communications, 2005
- A new delegation-based authentication protocol for use in portable communication systemsIEEE Transactions on Wireless Communications, 2005
- The quest for personal control over mobile location privacyIEEE Communications Magazine, 2004
- Preserving privacy in a network of mobile computersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Location management methods for third generation mobile systemsIEEE Communications Magazine, 1997
- Untraceability in mobile networksPublished by Association for Computing Machinery (ACM) ,1995
- On Travelling IncognitoPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1994
- Authentication of mobile usersIEEE Network, 1994
- Privacy and authentication on a portable communications systemIEEE Journal on Selected Areas in Communications, 1993
- The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1988