Simulative performance evaluation of the temporary pseudonym method for protecting location information in gsm networks

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The information about the location of a mobile user belongs to the most sensitive data within mobile communication networks. One possibility to protect it especially against curious insiders with access to the network consists of storing the actual information in so-called "home trusted devices" and using temporary pseudonyms for user registration in the network databases. This paper presents a detailed OPNET simulation and evaluation of the signalling cost of this approach compared to standard GSM.

Cite

CITATION STYLE

APA

Reichl, P., Kesdogan, D., Junghärtchen, K., & Schuba, M. (1998). Simulative performance evaluation of the temporary pseudonym method for protecting location information in gsm networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1469, pp. 105–116). Springer Verlag. https://doi.org/10.1007/3-540-68061-6_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free