Article thumbnail

Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks

By Peter Reichl, Dogan Kesdogan, Klaus Jungho/oortchen and Marko Schuba


. The information about the location of a mobile user belongs to the most sensitive data within mobile communication networks. One possibility to protect it especially against curious insiders with access to the network consists of storing the actual information in so-called "home trusted devices" and using temporary pseudonyms for user registration in the network databases. This paper presents a detailed OPNET simulation and evaluation of the signalling cost of this approach compared to standard GSM. 1 Introduction In contrast to previous mobile communication networks, GSM offers a much higher level of security to its users and the network operator, e.g. by authentication and speech encryption procedures as well as the use of temporary identities protecting the user's privacy. Despite these features, there are some security weaknesses in the GSM standard, e.g. the issue of protecting location information about the user (as it is contained within the GSM signalling information). The t..

Year: 1998
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • http://www-i4.informatik.rwth-... (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.