Abstract
Mobility is an inherent characteristic of cellular systems, and subscriber location is an essential attribute at the access link level. The system must know both user identity and location in order to forward calls/data to the user. The system is required to protect user identity and location data from eavesdropping. The system should also provide location/identity privacy with respect to the system entities. This paper presents a privacy preserving 3-way authentication and key agreement (PP3WAKA) protocol that archives this goal.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
3G TS 03.20: Security related network functions, 3GPP, Sophia Antipolis, France (2001)
3G TS 33.102: 3G Security; Security architetcure (Release 6), 3GPP, Sophia Antipolis, France (2004)
Køien, G.M.: Principles for Cellular Access Security. In: Proceedings of the Ninth Nordic Workshop on Secure IT Systems, Espoo, Finland, pp. 65–72 (November 2004)
Køien, G.M.: An Introduction to Access Security in UMTS. IEEE Wireless Communications Mag. 11(1), 8–18 (2004)
Rose, G., Køien, G.M.: Access Security in CDMA2000, Including a Comparison with UMTS Access Security. IEEE Wireless Communications Mag. 11(1), 19–25 (2004)
Nyberg, K., Niemi, V.: UMTS Security. Wiley, Chichester (2003)
Køien, G.M., Oleshchuk, V.A.: Privacy-Preserving Spatially Aware Authentication Protocols: Analysis and Solutions. In: Proceedings of NORDSEC 2003, Gjøvik, Norway, pp. 161–173 (2003)
Køien, G.M., Oleshchuk, V.A.: Spatio-Temporal Exposure Control; An investigation of spatial home control and location privacy issues. In: Proceedings of the 14th Annual IEEE Symposium on Personal Indoor Mobile Radio Communications (PIMRC), Beijing, China, pp. 2760–2764 (September 2003)
Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, RFC 2401. IETF (November 1998)
Køien, G.M.: Rethinking Cellular Access Security. In: Proceedings of the Second IASTED Intl. Conf. on Comm. and Computer Networks, Cambridge, MA, USA, pp. 212–218 (November 2004)
3G TS 33.234: 3G Security; Wireless Local Area Network (WLAN) Interworking Security (Release 6), 3GPP, Sophia Antipolis, France (2004)
Køien, G.M., Haslestad, T.: Security Aspects of 3G-WLAN Interworking. IEEE Communications Mag. 41(11), 82–88 (2003)
Hofheinz, D., Müller-Quade, J., Steinwandt, R.: Initiator-Resilient Universally Composable Key Exchange. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 61–84. Springer, Heidelberg (2003)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography (5th printing). CRC Press, Boca Raton (2001)
Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838. Springer, Heidelberg (2000)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Lauter, K.: The Advantages of Elliptic Curve Cryptography for Wireless Security. IEEE Wireless Communications Mag. 11(1), 62–67 (2004)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)
Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)
Du, W., Atallah, M.J.: Secure Multy-Party Computation Problems and Their Applications: A Review and Open Problems. In: NSPW 2001, pp. 13–21, September 10-13 (2002)
Du, W., Zhan, Z.: A Practical Approach to Solve Secure Multi-Party Computational Problems. In: Proceedings of New Security Paradigms Workshop, Sepember 23-26 (2002)
Goldreich, O., Micali, S., Wigderson, A.: How to Play Any Mental Game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 218–229 (1998)
Beaver, D.: Commodity-Based Cryptography. In: Proceedings of the 29th Annual ACM Symposium on the Theory of Computing (1997)
Naccache, D., Stern, J.: A New Cryptosystem Based on Higher Residues. In: Proceedings of the 5th ACM Conference on Computer and Communication Security, pp. 59–66 (1998)
Okamoto, T., Uchiyama, S.: An Efficient Public-Key Cryptosystem as Secure as Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 308–318. Springer, Heidelberg (1998)
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Yao, A.C.: Protocols for Secure Computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science (1982)
Goldwasser, S.: Multi-party computations: Past and present. In: Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing, Santa Barbara, CA. USA, August 21-24 (1997)
3G TS 23.271: Functional stage 2 description of Location Services (LCS), 3GPP, Sophia Antipolis, France (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Køien, G.M., Oleshchuk, V.A. (2006). Location Privacy for Cellular Systems; Analysis and Solution. In: Danezis, G., Martin, D. (eds) Privacy Enhancing Technologies. PET 2005. Lecture Notes in Computer Science, vol 3856. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11767831_4
Download citation
DOI: https://doi.org/10.1007/11767831_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34745-3
Online ISBN: 978-3-540-34746-0
eBook Packages: Computer ScienceComputer Science (R0)