1996
DOI: 10.1007/978-1-5041-2919-0_4
|View full text |Cite
|
Sign up to set email alerts
|

Location Management Strategies Increasing Privacy in Mobile Communication

Abstract: Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our objective is to increase the network's trustworthiness by providing means to prevent generation of moving tracks: The protection should be shifted into a subscriber's domain where the administration of the location information of his mobile station is handled as far as possible. Outside his domain, the subscriber should be able to act an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

1998
1998
2020
2020

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…In a traditional direction of research, pseudonyms are used to protect against attackers that try linking several pseudonyms in order to construct movement profiles and comprehensive user traces. In early work, Kesdogan et al [33] proposed to use multiple short-lived, thus changing pseudonyms in mobile GSM networks. Beresford et al [4] combined the use of changing pseudonyms with an geographic abstraction of mixnets, to form so called mix-zones.…”
Section: Location Privacy Protectionmentioning
confidence: 99%
“…In a traditional direction of research, pseudonyms are used to protect against attackers that try linking several pseudonyms in order to construct movement profiles and comprehensive user traces. In early work, Kesdogan et al [33] proposed to use multiple short-lived, thus changing pseudonyms in mobile GSM networks. Beresford et al [4] combined the use of changing pseudonyms with an geographic abstraction of mixnets, to form so called mix-zones.…”
Section: Location Privacy Protectionmentioning
confidence: 99%
“…In the following years, several types of pseudonyms and applications have been identified. Kesdogan et al [22] proposed to use changing pseudonyms in mobile GSM networks. Concerning the provided degree of linkability, pseudonyms can be classified into transaction pseudonyms, role pseudonyms, relationship pseudonyms, rolerelationship pseudonyms and person pseudonyms.…”
Section: Related Workmentioning
confidence: 99%
“…This has developed into an active research field, with anonymous communications solutions developed for web browsing [12], messaging [3] and even GSM mobile telephony [8]. The related field of statistical disclosure control uses anonymity to protect the privacy of personal information stored in databases [14], and in the transport arena, Grutser and Grunwald used anonymity techniques to protect the location privacy of vehicle drivers [6].…”
Section: Related Workmentioning
confidence: 99%