Abstract
In this paper, we investigate location- and identity privacy issues related to the access procedures. The investigation includes subscriber identity management, mobility management at the link layer and the security setup (authentication and key agreement) procedures. The paper also presents a Privacy Enhanced Mobile Authentication and Key Agreement (PEMAKA) protocol that illustrates the concepts and demonstrates that future mobile systems can provide both improved access security and enhanced subscriber privacy.
Similar content being viewed by others
References
GPP TS 33.102: 3G Security; Security Architecture (Release 6), 3GPP, Sophia Antipolis, France, 2005.
Køien G.M., (2004). “An Introduction to Access Security in UMTS”. IEEE Wireless Communication magazine, 11(1): 8–18
K. Nyberg and V. Niemi, “UMTS Security”, ISBN 0-470-84794-8, New York Wiley, 2003.
Boman K., Horn G., Howard P., Niemi V., (2002). “UMTS Security”. Electronics & Communications Engineering Journal, 14(5): 191–204
G.M. Køien, and V.A. Oleshchuk, Location Privacy for Cellular Systems; Analysis and Solution, PET 2005, Berlin, Springer LNCS 3856, Cavtat, Croatia, 2005.
GPP TS 33.234: 3G Security; Wireless Local Area Network (WLAN) Interworking Security (Release 6), 3GPP, Sophia Antipolis, France, 2005.
D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, CRYPTO 2001, LNCS 2139, Berlin, Springer, 2001.
Lauter K., (2004). “The Advantages of Elliptic Curve Cryptography for Wireless Security”. IEEE Wireless Communication magnetic, 11(1): 62–67
Diffie W., Hellman M.E., (1976). “New Directions in Cryptography”. IEEE Transactions on Information Theory, 22, 644–654
A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, Baco Baton, CRC Press, ISBN 0-8493-8523-7, Fifth Printing, August 2001.
Køien G.M., Oleshchuk V.A., “Spatio-Temporal Exposure Control; An investigation of spatial home control and location privacy issues”. IEEE PIMRC 2003, pp. 2760–2764, Beijing, China, 2003.
M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication”, DEC SRC, No.39, 1990.
G.M. Køien, “Privacy Enhanced Cellular Access Security”, Proceedings of ACM WiSe 2005, Cologne, Germany, 2005.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Køien, G.M. Privacy Enhanced Mobile Authentication. Wireless Pers Commun 40, 443–455 (2007). https://doi.org/10.1007/s11277-006-9202-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-006-9202-y