Computer Security Applications Conference, Annual
Download PDF

Abstract

Third generation mobile networks aim to offer 'any service, anywhere, at any time'. Users require privacy within these systems in order to feel confident of their use. Privacy requirements (in mobile networks) are: content, location and identification privacy, and authentication. Differing from previous approaches to privacy, the network itself is considered to be an untrusted party. The paper proposes a scheme that allows the user to register with the network and remain anonymous (both location and identification). Digital mixes are used to create anonymity and authentication is achieved through a token based scheme. Finally the aspect of information leaking to authorised third parties is discussed and billing requirements are detailed which involve the use of 'coin' like tokens traded for services.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!