Anonymous Mobility Management for Third Generation Mobile Networks
نویسندگان
چکیده
With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well. Following brief surveys of existing approaches to mobility management, general security considerations for UMTS and confidential storing of location information we introduce the ideas and concepts behind the new ‘anonymous subscriber’ method for UMTS, largely based on extended MIX networks. Finally, an application of this method conveniently employing the X.500 directory service infrastructure is described in some detail.
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملCost Analysis of Integrated Terminal Mobility and Personal Mobility Managements in Mobile Communication Networks
Personal mobility (PM) is one of key issues in realizing emerging third generation mobile communication systems such as International Mobile Telecommunication 2000 (IMT2000) and it can be realized through universal personal telecommunication (UPT) service. A PM management scheme is considered in order to manage PM information related to UPT users for incall registration/deregistration, incall r...
متن کاملMobility management techniques for the next generation wireless networks
The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the nex...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996