ABSTRACT
Protection of user privacy will gain increasing importance in future mobile systems. To meet the users' privacy needs the approach to reveal different amounts of personal data under several different pseudonyms is promising. This approach can still be undermined with application knowledge as well as with information originating from the communication process itself. Here, mobility management plays a central role as it reflects the user's behavior. Thus, the approach of multiple pseudonyms can only be successful if the communication system is designed for it. In this paper, the respective threats resulting from IP-based mobility management are analyzed. As existing proposals do not protect against these threats, a new approach to mobility management protecting multiple pseudonyms is outlined.
- Schneier, B. Applied Cryptography -- Protocols, Algorithms, and Source Code in C (2nd edition). 2. Edition, John Wiley & Sons, Inc., 1996, ISBN: 0-471-12845-7. Google ScholarDigital Library
- Hauser, C. A New Approach for Privacy-Preserving Communication by Combining Virtual Identities with Mobility Management. European Symposium on Research in Computer Security (ESORICS 2002) -- Poster Session, Zurich, 2002.Google Scholar
- Hauser, C. Mobility Management Meets Privacy -- the Failure of Existing Proposals and a New, Future-Proof Approach (Extended Version). Technical Report 49, Institute of Communication Networks and Computer Engineering, University of Stuttgart, August 2004, www.ikr.uni-stuttgart.de/~hauser/IB49.pdf.Google Scholar
- Hohl, F., Kubach, U., Leonhardi, A., Rothermel, K., Schwehm, M. Next Century Challenges: Nexus -- An Open Global Infrastructure for Spatial-Aware Applications. In Proceedings of ACM MobiCom '99, pp. 249--255, Seattle, USA, August 1999. Google ScholarDigital Library
- The DAIDALOS Project--Designing Advanced Network Interfaces for the Delivery and Administration of Location Independent, Optimised Personal Services. http://www.ist-daidalos.org.Google Scholar
- www.ietf.org/html.charters/hip-charter.html.Google Scholar
Index Terms
- Mobility management meets privacy: the failure of existing proposals and a new, future-proof approach
Recommendations
A mobility management model based on users' mobility profiles for IPv6 networks
Fourth-generation (4G) mobile systems provide access to a wide range of services and enable mobile users to communicate regardless of their geographical location and their roaming characteristics. Due to the growing number of mobile users, global ...
Analysis of IEEE 802.21 media independent handover with mobility management protocols for handover optimization
The accessibility of different wireless access technologies has become an essential aspect of mobile communications. Integrating heterogeneous wireless networks should guarantee the best quality of service (QoS) and cooperation among all layers. ...
A novel location management in IP-based cellular networks
Mobile IP provides a simple and scalable global mobility solution that supports users to access the internet at anytime and anywhere. However, as the number or the velocity of the Mobile IP users grows, so will the signalling overhead associated with ...
Comments