Location Privacy for Cellular Systems; Analysis and Solution

Mobility is an inherent characteristic of cellular systems, and subscriber location is an essential attribute at the access link level. The system must know both user identity and location in order to forward calls/data to the user. The system is required to protect user identity and location data from eavesdropping. The system should also provide location/identity privacy with respect to the system entities. This paper presents a privacy preserving 3-way authentication and key agreement (PP3WAKA) protocol that archives this goal.

[1]  Shafi Goldwasser,et al.  Multi party computations: past and present , 1997, PODC '97.

[2]  Kaisa Nyberg,et al.  Advances in Cryptology — EUROCRYPT'98 , 1998 .

[3]  Jacques Stern,et al.  Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.

[4]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[5]  Niklaus Wirth,et al.  Algorithms and Data Structures , 1989, Lecture Notes in Computer Science.

[6]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[7]  Dieter Gollmann,et al.  Computer Security – ESORICS 2003 , 2003, Lecture Notes in Computer Science.

[8]  Jörn Müller-Quade,et al.  Initiator-Resilient Universally Composable Key Exchange , 2003, ESORICS.

[9]  Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.

[10]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[11]  Donald Beaver,et al.  Commodity-based cryptography (extended abstract) , 1997, STOC '97.

[12]  Aggelos Kiayias,et al.  Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.

[13]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[14]  Geir M. Køien,et al.  Access security in CDMA2000, including a comparison with UMTS access security , 2004, IEEE Wireless Communications.

[15]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[16]  Wenliang Du,et al.  Secure Multi-party Computational Geometry , 2001, WADS.

[17]  Geir M. Køien,et al.  Security aspects of 3G-WLAN interworking , 2003, IEEE Commun. Mag..

[18]  G.M. Koien,et al.  An introduction to access security in UMTS , 2004, IEEE Wireless Communications.

[19]  Vladiinir A. Oleshchuk Spatio-Temporal Exposure Control An investigation of spatial home control and location privacy preserving issues , 2003 .

[20]  Jeffrey Shallit,et al.  Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.

[21]  Jacques Stern,et al.  A new public key cryptosystem based on higher residues , 1998, CCS '98.

[22]  K. Lauter,et al.  The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.

[23]  Tatsuaki Okamoto,et al.  A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.

[24]  Wenliang Du,et al.  Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.

[25]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[26]  Wenliang Du,et al.  A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.