Skip to main content
Log in

Privacy Enhanced Mobile Authentication

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we investigate location- and identity privacy issues related to the access procedures. The investigation includes subscriber identity management, mobility management at the link layer and the security setup (authentication and key agreement) procedures. The paper also presents a Privacy Enhanced Mobile Authentication and Key Agreement (PEMAKA) protocol that illustrates the concepts and demonstrates that future mobile systems can provide both improved access security and enhanced subscriber privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. GPP TS 33.102: 3G Security; Security Architecture (Release 6), 3GPP, Sophia Antipolis, France, 2005.

  2. Køien G.M., (2004). “An Introduction to Access Security in UMTS”. IEEE Wireless Communication magazine, 11(1): 8–18

    Article  Google Scholar 

  3. K. Nyberg and V. Niemi, “UMTS Security”, ISBN 0-470-84794-8, New York Wiley, 2003.

  4. Boman K., Horn G., Howard P., Niemi V., (2002). “UMTS Security”. Electronics & Communications Engineering Journal, 14(5): 191–204

    Article  Google Scholar 

  5. G.M. Køien, and V.A. Oleshchuk, Location Privacy for Cellular Systems; Analysis and Solution, PET 2005, Berlin, Springer LNCS 3856, Cavtat, Croatia, 2005.

  6. GPP TS 33.234: 3G Security; Wireless Local Area Network (WLAN) Interworking Security (Release 6), 3GPP, Sophia Antipolis, France, 2005.

  7. D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, CRYPTO 2001, LNCS 2139, Berlin, Springer, 2001.

  8. Lauter K., (2004). “The Advantages of Elliptic Curve Cryptography for Wireless Security”. IEEE Wireless Communication magnetic, 11(1): 62–67

    Article  Google Scholar 

  9. Diffie W., Hellman M.E., (1976). “New Directions in Cryptography”. IEEE Transactions on Information Theory, 22, 644–654

    Article  MATH  MathSciNet  Google Scholar 

  10. A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, Baco Baton, CRC Press, ISBN 0-8493-8523-7, Fifth Printing, August 2001.

  11. Køien G.M., Oleshchuk V.A., “Spatio-Temporal Exposure Control; An investigation of spatial home control and location privacy issues”. IEEE PIMRC 2003, pp. 2760–2764, Beijing, China, 2003.

  12. M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication”, DEC SRC, No.39, 1990.

  13. G.M. Køien, “Privacy Enhanced Cellular Access Security”, Proceedings of ACM WiSe 2005, Cologne, Germany, 2005.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. M. Køien.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Køien, G.M. Privacy Enhanced Mobile Authentication. Wireless Pers Commun 40, 443–455 (2007). https://doi.org/10.1007/s11277-006-9202-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-006-9202-y

Keywords

Navigation