Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
Anonymous mobility management for third generation mobile networks
Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Achieving user privacy in mobile networks
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
IEEE Communications Magazine
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Real-time mixes: a bandwidth-efficient anonymity protocol
IEEE Journal on Selected Areas in Communications
Privacy and authentication on a portable communications system
IEEE Journal on Selected Areas in Communications
Authentication of mobile users
IEEE Network: The Magazine of Global Internetworking
IEEE Network: The Magazine of Global Internetworking
P2P commercial digital content exchange
Electronic Commerce Research and Applications
A Provable Billing Protocol on the Current UMTS
Wireless Personal Communications: An International Journal
Hi-index | 0.24 |
This paper presents a mobile network privacy architecture (MNPA) that enables the provision of very strong user privacy against external and internal threats within mobile networks. The MNPA extends the mobile networking model with two new components. The first, privacy routing capability, enables untraceable communications between hosts. The second, privacy token issuing authority, is a third party application that manages the flow of MNPA user authorisation tokens in the system. The operations of these two components are detailed. We follow this by demonstrating how these components can be used to implement protocols for privacy enhanced network operations. New secure methods for location registration, remote host communication and billing are presented. We finish with a discussion of issues of collusion and trust within the architecture and look briefly at public key infrastructure requirements.