2005 13th IEEE International Conference on Networks Jointly Held With the 2005 IEEE 7th Malaysia International Conf on Communic
DOI: 10.1109/icon.2005.1635685
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy in Mobile IP

Abstract: Several security issues arise, due to the design of the Mobile IP and its deployment in conjunction with other network protocols. Most of the work on the security of Mobile IP has focused on authentication of the control packet and the confidentiality of the content in the protocol, and there are not many proposals in the area of location privacy. In this paper, we propose a method to provide location privacy for Mobile IP users. We present two protocols that use an overlay network approach, and designed parti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
(12 reference statements)
0
3
0
Order By: Relevance
“…This information can be used for blackmail by malicious user. Wiangsripanawan et al [11] proposed a protocol for location privacy in mobile system using universal reencryption [4] whose security is reducible to Decision Diffie-Hellman assumption. Once quantum computer becomes a reality, universal reencryption can be broken in polynomial time by Shor's algorithm [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This information can be used for blackmail by malicious user. Wiangsripanawan et al [11] proposed a protocol for location privacy in mobile system using universal reencryption [4] whose security is reducible to Decision Diffie-Hellman assumption. Once quantum computer becomes a reality, universal reencryption can be broken in polynomial time by Shor's algorithm [5].…”
Section: Introductionmentioning
confidence: 99%
“…In post quantum cryptography, our scheme can replace universal reencryption scheme used in Wiangsripanawan et al [11] protocol for location privacy in mobile system.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, revealing an MN's HoA means breaking its anonymity, and revealing an MN's CoA means breaking its location privacy. On one hand, some existing anonymity and location privacy schemes require intensive computations; hence, they cannot be used in the timely restricted seamless handover processes. On the other hand, some other schemes achieve low anonymity and location privacy levels.…”
Section: Introductionmentioning
confidence: 99%