Achieving user privacy in mobile networks

  • Authors:
  • B. Askwith;M. Merabti;Qi Shi;K. Whiteley

  • Affiliations:
  • -;-;-;-

  • Venue:
  • ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
  • Year:
  • 1997

Quantified Score

Hi-index 0.00

Visualization

Abstract

Third generation mobile networks aim to offer 'any service, anywhere, at any time'. Users require privacy within these systems in order to feel confident of their use. Privacy requirements (in mobile networks) are: content, location and identification privacy, and authentication. Differing from previous approaches to privacy, the network itself is considered to be an untrusted party. The paper proposes a scheme that allows the user to register with the network and remain anonymous (both location and identification). Digital mixes are used to create anonymity and authentication is achieved through a token based scheme. Finally the aspect of information leaking to authorised third parties is discussed and billing requirements are detailed which involve the use of 'coin' like tokens traded for services.