Abstract
In today’s 3rd Generation mobile communications, some privacy concerns of mobile phone users are still not dealt with. Most prominent of these is the fact that mobile network operators learn both the identity and location of each device at any given time in order to be able to provide seamless services like telephony and internet access. In addition, the same information can leak to independent eavesdroppers using special equipment. The purpose of this paper is to investigate the possibility of a privacy preserving alternative. Our findings show that we can achieve anonymous internet access for mobile devices, and can build conditional privacy preserving persistent connections to service providers on top of it. As an alternative to mobile telephony, user-to-user mobile internet telephony providing improved but not optimal levels of privacy can be achieved under realistic assumptions, the limitations being due to traffic analysis attacks.
Funded by the Norwegian Research Council’s VERDIKT programme project 183195.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
3GPP TS 33.102: Security Architecture, Ver. 11.5.0 (2013), www.3gpp.org/ftp/Specs/html-info/33102.htm
Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of ACM 24(2), 84–88 (1981)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
The European Parliament and Council: Directive 2006/24/EC. L 105, pp. 54–63 (2006)
Fox, D.: Der IMSI-Catcher. Datenschutz und Datensicherheit 26(4) (2002)
Lindell, Y.: Anonymous Authentication. Journal of Privacy and Confidentiality 2(2), 35–63 (2010), repository.cmu.edu/jpc/vol2/iss2/4
Nguyen, L., Safavi-Naini, R.: Dynamic k-Times Anonymous Authentication. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 318–333. Springer, Heidelberg (2005)
Spiegel Online: Did Deutsche Telekom Spy on Journalists and Board Members? (2008), www.spiegel.de/international/business/0,1518,555363,00.html
Steine, A.: Privacy-Preserving Cryptographic Protocols. PhD Thesis, Norwegian University of Science and Technology (2012)
The Tor Project, www.torproject.org/index.html.en
Wachsmann, C., Chen, L., Dietrich, K., Löhr, H., Sadeghi, A.-R., Winter, J.: Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 84–98. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gjøsteen, K., Petrides, G., Steine, A. (2013). Towards Privacy Preserving Mobile Internet Communications – How Close Can We Get?. In: Boyd, C., Simpson, L. (eds) Information Security and Privacy. ACISP 2013. Lecture Notes in Computer Science, vol 7959. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39059-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-39059-3_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39058-6
Online ISBN: 978-3-642-39059-3
eBook Packages: Computer ScienceComputer Science (R0)