By Topic

A Method Providing Identity Privacy to Mobile Users During Authentication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)

The increasing development of mobile networks raises new security requirements and concerns. In addition to the basic need of authentification, confidentiality and key distribution services, a new problem involving privacy is the unauthorized tracking of users migration. In other words, accessing any information related to the mobile user's location data without his consent, is a serious violation of his privacy. Moreover, if no care is taken, the disclosure of the mobile user real identity may appear during the authentication process. The basic solution to this problem is the usc of aliases which insure non-traceability by hiding the user's real identity and also his relationship with domain authorities. In this paper we provide a classification of the different degrees of non-traceability and present a new efficient method for the computation of aliases. This technique can be used during authentification of mobile users and thus avoids the drawbacks of existing solutions such as GSM and CDPD.

Published in:

Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on

Date of Conference:

8-9 Dec. 1994