Untraceable mobility or how to travel incognito

作者: Giuseppe Ateniese , Amir Herzberg , Hugo Krawczyk , Gene Tsudik

DOI: 10.1016/S1389-1286(98)00021-8

关键词: AuthenticationAnonymityComputer scienceWirelessComputer securityWireless networkCellular networkMobility model

摘要: Abstract User mobility is rapidly becoming an important and popular network feature. This especially evident in wireless/cellular networks where user raises a number of security issues concerns. Foremost among them the ability to track mobile users' movements whereabouts. Ideally, no entity other than himself responsible authority user's home domain (if any) should know both real identity current location user. At present, most environments supporting either do not address problem at all or base their solutions on assumptions that are specific today's cellular phone networks. paper discusses related anonymity privacy It reviews state-of-the-art approaches, identifies exposures proposes several low-cost which vary complexity, degree protection about underlying environment.

参考文章(18)
Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann, Location management strategies increasing privacy in mobile communication information security. pp. 39- 48 ,(1996) , 10.1007/978-1-5041-2919-0_4
R. Canetti, H. Krawczyk, M. Bellare, HMAC: Keyed-Hashing for Message Authentication RFC. ,vol. 2104, pp. 1- 11 ,(1997)
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
C. Gulcu, G. Tsudik, Mixing E-mail with Babel network and distributed system security symposium. pp. 2- 16 ,(1996) , 10.1109/NDSS.1996.492350
G. Tsudik, H. Krawczyk, A. Herzberg, On travelling incognito [mobile computing] workshop on mobile computing systems and applications. pp. 205- 211 ,(1994) , 10.1109/MCSA.1994.513485
M. Rahnema, Overview of the GSM system and protocol architecture IEEE Communications Magazine. ,vol. 31, pp. 92- 100 ,(1993) , 10.1109/35.210402
Steven H. Low, Sanjoy Paul, Nicholas F. Maxemchuk, Anonymous credit cards computer and communications security. pp. 108- 117 ,(1994) , 10.1145/191177.191199
Y. Frankel, A. Herzberg, P.A. Karger, H. Krawczyk, C.A. Kunzinger, M. Yung, Security issues in a CDPD wireless network IEEE Personal Communications. ,vol. 2, pp. 16- 27 ,(1995) , 10.1109/98.403454
Michael K. Reiter, Aviel D. Rubin, Anonymous Web transactions with Crowds Communications of The ACM. ,vol. 42, pp. 32- 48 ,(1999) , 10.1145/293411.293778
David Chaum, Security without identification: transaction systems to make big brother obsolete Communications of the ACM. ,vol. 28, pp. 1030- 1044 ,(1985) , 10.1145/4372.4373