Location Privacy for Cellular Systems; Analysis and Solution

  • Geir M. Køien
  • Vladimir A. Oleshchuk
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3856)


Mobility is an inherent characteristic of cellular systems, and subscriber location is an essential attribute at the access link level. The system must know both user identity and location in order to forward calls/data to the user. The system is required to protect user identity and location data from eavesdropping. The system should also provide location/identity privacy with respect to the system entities. This paper presents a privacy preserving 3-way authentication and key agreement (PP3WAKA) protocol that archives this goal.


Location Privacy Home Server Security Context Radio Network Controller Identity Privacy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    3G TS 03.20: Security related network functions, 3GPP, Sophia Antipolis, France (2001)Google Scholar
  2. 2.
    3G TS 33.102: 3G Security; Security architetcure (Release 6), 3GPP, Sophia Antipolis, France (2004)Google Scholar
  3. 3.
    Køien, G.M.: Principles for Cellular Access Security. In: Proceedings of the Ninth Nordic Workshop on Secure IT Systems, Espoo, Finland, pp. 65–72 (November 2004)Google Scholar
  4. 4.
    Køien, G.M.: An Introduction to Access Security in UMTS. IEEE Wireless Communications Mag. 11(1), 8–18 (2004)CrossRefGoogle Scholar
  5. 5.
    Rose, G., Køien, G.M.: Access Security in CDMA2000, Including a Comparison with UMTS Access Security. IEEE Wireless Communications Mag. 11(1), 19–25 (2004)CrossRefGoogle Scholar
  6. 6.
    Nyberg, K., Niemi, V.: UMTS Security. Wiley, Chichester (2003)Google Scholar
  7. 7.
    Køien, G.M., Oleshchuk, V.A.: Privacy-Preserving Spatially Aware Authentication Protocols: Analysis and Solutions. In: Proceedings of NORDSEC 2003, Gjøvik, Norway, pp. 161–173 (2003)Google Scholar
  8. 8.
    Køien, G.M., Oleshchuk, V.A.: Spatio-Temporal Exposure Control; An investigation of spatial home control and location privacy issues. In: Proceedings of the 14th Annual IEEE Symposium on Personal Indoor Mobile Radio Communications (PIMRC), Beijing, China, pp. 2760–2764 (September 2003)Google Scholar
  9. 9.
    Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, RFC 2401. IETF (November 1998)Google Scholar
  10. 10.
    Køien, G.M.: Rethinking Cellular Access Security. In: Proceedings of the Second IASTED Intl. Conf. on Comm. and Computer Networks, Cambridge, MA, USA, pp. 212–218 (November 2004)Google Scholar
  11. 11.
    3G TS 33.234: 3G Security; Wireless Local Area Network (WLAN) Interworking Security (Release 6), 3GPP, Sophia Antipolis, France (2004)Google Scholar
  12. 12.
    Køien, G.M., Haslestad, T.: Security Aspects of 3G-WLAN Interworking. IEEE Communications Mag. 41(11), 82–88 (2003)CrossRefGoogle Scholar
  13. 13.
    Hofheinz, D., Müller-Quade, J., Steinwandt, R.: Initiator-Resilient Universally Composable Key Exchange. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 61–84. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  14. 14.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography (5th printing). CRC Press, Boca Raton (2001)MATHGoogle Scholar
  15. 15.
    Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  16. 16.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  17. 17.
    Lauter, K.: The Advantages of Elliptic Curve Cryptography for Wireless Security. IEEE Wireless Communications Mag. 11(1), 62–67 (2004)CrossRefGoogle Scholar
  18. 18.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  19. 19.
    Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  20. 20.
    Du, W., Atallah, M.J.: Secure Multy-Party Computation Problems and Their Applications: A Review and Open Problems. In: NSPW 2001, pp. 13–21, September 10-13 (2002)Google Scholar
  21. 21.
    Du, W., Zhan, Z.: A Practical Approach to Solve Secure Multi-Party Computational Problems. In: Proceedings of New Security Paradigms Workshop, Sepember 23-26 (2002)Google Scholar
  22. 22.
    Goldreich, O., Micali, S., Wigderson, A.: How to Play Any Mental Game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 218–229 (1998)Google Scholar
  23. 23.
    Beaver, D.: Commodity-Based Cryptography. In: Proceedings of the 29th Annual ACM Symposium on the Theory of Computing (1997)Google Scholar
  24. 24.
    Naccache, D., Stern, J.: A New Cryptosystem Based on Higher Residues. In: Proceedings of the 5th ACM Conference on Computer and Communication Security, pp. 59–66 (1998)Google Scholar
  25. 25.
    Okamoto, T., Uchiyama, S.: An Efficient Public-Key Cryptosystem as Secure as Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 308–318. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  26. 26.
    Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  27. 27.
    Yao, A.C.: Protocols for Secure Computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science (1982)Google Scholar
  28. 28.
    Goldwasser, S.: Multi-party computations: Past and present. In: Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing, Santa Barbara, CA. USA, August 21-24 (1997)Google Scholar
  29. 29.
    3G TS 23.271: Functional stage 2 description of Location Services (LCS), 3GPP, Sophia Antipolis, France (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Geir M. Køien
    • 1
    • 2
  • Vladimir A. Oleshchuk
    • 1
  1. 1.Agder University CollegeGrimstadNorway
  2. 2.Telenor R&DFornebuNorway

Personalised recommendations