MIXes in Mobile Communication Systems: Location Management with Privacy

نویسندگان

  • Hannes Federrath
  • Anja Jerichow
  • Andreas Pfitzmann
چکیده

This paper introduces a new technique for location management in cellular networks. It avoids the recording of moving tracks of mobile subscribers. The described procedures are derived from the well known untraceable MIX network and the distributed storage of location information according to GSM networks. 1 Terminology The served area of a cellular radio network is usually divided into location areas. Location areas are comprised of one or several radio cells. The mark (address) of a location area is the Location Area Identification (LAI). To address a Mobile Station (MS) in the case of an incoming call, the mobile network needs to know the current location area in order to broadcast the connection request. 1 The location management is comprised of the procedures location update and handover. The location update consists of all procedures for location management in the stand-by state of an MS, whereas the handover handles an MS moving during a call. To register the location of an MS, the network operator can maintain a Home Location Register (HLR) at a central place in the network. The HLR keeps track of the actual LAI of the MS. In the case of a (mobile terminated) call the subscriber A calls the Mobile Subscriber Integrated Services Digital Network Number (MSISDN) of the mobile subscriber B. The mobile network reads the current LAI and routes the call to the responsible Base Transceiver Station (BTS). Then the BTS broadcasts a connection request in all cells of the location area (see Fig. 1). 1 The technique " broadcast over the whole served area " is not discussed in this paper! In 3rd generation mobile networks (Universal Mobile Telecommunication System, UMTS and Future Public Land Mobile Telecommunication Network, FPLMTN) the globally covered area does not allow broadcast. However, broadcasts in some parts of the globe require location management again.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing a Model for Evaluating and Prioritizing Effective Factors on Mobile Supply Chain Management Diffusion

Managers should pay more attention to flexible production systems in order to cope with the challenges posed by factors such as global competition, changing customer demands, increasing market penetration, and rapid technological growth. On the other hand, the development of information and communication technology (ICT) provides significant opportunities for a more effective supply chain manag...

متن کامل

Achieving User Privacy in Mobile Networks

Third generation mobile networks aim to offer ‘any service, anywhere, at any time’. User require privacy within these systems in order to feel confident of their use. Privacy requirements {in mobile networks) are: content, location, and identification privacy, and authentication. Differing from previous approaches to privacy, the network itself is considered to be an untrusted party. This paper...

متن کامل

SMS Advertising and Consumer Privacy: Analysis of Factors Affecting Consumer Willingness to send and Receive Information in Permission and Data based SMS advertising

The increasing penetration rate of mobile phone, with specific characteristics of this medium, such as almost everywhere with the audience, has attracted companies' attention to it as an advertising channel. Mobile devices facilitate highly customized marketing communication in terms of person, time location and context so numbers of companies that use this medium for communicating with their c...

متن کامل

From Data Privacy to Location Privacy: Models and Algorithms

This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter describes the essential concepts, the alternative models, and the suite of techniques for providing location privacy in mobile and ubiquitous data management systems. The tutorial consi...

متن کامل

Notifying Civilians in Time - Disaster Warning Systems Based on a Multilaterally Secure, Economic, and Mobile Infastructure

The spread of mobile communication equipment offers new opportunities for disaster management referring to civilians. At the same time, location based services are regarded as privacy invading, and are regulated in many countries by specific legislation. We analyze the requirements of a LBS-based disaster management scenario that enables the timely notification of civilians. In addition, we pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996