Roaming Agreements vis-a`-vis Identity Privacy
Hiten Choudhury1
Section:Review Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 632-635, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.632635
Online published on Mar 31, 2019
Copyright © Hiten Choudhury . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Hiten Choudhury, “Roaming Agreements vis-a`-vis Identity Privacy,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.632-635, 2019.
MLA Style Citation: Hiten Choudhury "Roaming Agreements vis-a`-vis Identity Privacy." International Journal of Computer Sciences and Engineering 7.3 (2019): 632-635.
APA Style Citation: Hiten Choudhury, (2019). Roaming Agreements vis-a`-vis Identity Privacy. International Journal of Computer Sciences and Engineering, 7(3), 632-635.
BibTex Style Citation:
@article{Choudhury_2019,
author = {Hiten Choudhury},
title = {Roaming Agreements vis-a`-vis Identity Privacy},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {632-635},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3893},
doi = {https://doi.org/10.26438/ijcse/v7i3.632635}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.632635}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3893
TI - Roaming Agreements vis-a`-vis Identity Privacy
T2 - International Journal of Computer Sciences and Engineering
AU - Hiten Choudhury
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 632-635
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
429 | 156 downloads | 108 downloads |
Abstract
Recent advancements in cellular networks have led to the demand of ‘any-where’ service - immaterial of the location of the user or the coverage area of the service provider. The increasing demand for providing subscribers with services beyond ones home service area necessitates the service providers to set up elaborate trust relationships and agreements amongst themselves, to ensure secured and reliable service to the genuine subscribers. This process however limits the ease and span of extending the services by a service provider. In addition, it is important that such services are provided without compromising the identity privacy of the subscriber. While identity privacy is an accepted requirement, vulnerability of the same remained across the generations. Newer threat like location tracking and comprehensive profiling - wherein data about movement, usage, etc., of a subscriber is amassed and linked to his/her identity to explore various attacks - has been identified. Much of the aforesaid limitations can be attributed to the trust model adopted by the cellular networks. In this article, we highlight the benefits of a trust model that may contribute towards reducing the complexities of a-priori agreements amongst service providers, for providing service beyond their territories in future mobile networks.
Key-Words / Index Term
Roaming agreements, Authentication, Anonymity, IMSI, Privacy
References
[1] 1. Xenakis C, Merakos L: Security in third generation mobile networks. Computer communications 2004, 27(7):638–650.
[2] 2. Whalen T: Mobile Devices and Location Privacy: Where Do We Go from Here? Security & Privacy, IEEE 2011, 9(6):61–62.
[3] 3. 3GPP: 3G Security;Security architecture. TS 33.102, 3rd Generation Partnership Project (3GPP) 2011, [http://www.3gpp.org/ftp/Specs/html-info/33102.htm].
[4] 4. 3GPP: 3GPP System Architecture Evolution (SAE); Security architecture. TS 33.401, 3rd Generation Partnership Project (3GPP) 2011, [http://www.3gpp.org/ftp/Specs/html-info/33401.htm].
[5] 5. Zhang M, Fang Y: Security analysis and enhancements of 3GPP authentication and key agreement protocol. Wireless Communications, IEEE Transactions on 2005, 4(2):734–742.
[6] 6. Koien G: An introduction to access security in UMTS. Wireless Communications, IEEE 2004, 11:8–18.
[7] 7. Sankaran C: Network access security in next-generation 3GPP systems: A tutorial. Communications Magazine, IEEE 2009, 47(2):84–91.
[8] 8. Meyer U, Wetzel S: A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on Wireless security, ACM 2004:90–97.
[9] 9. Zhang Y, Zheng J, Ma M: Handbook of research on wireless security. Information Science Reference-Imprint of: IGI Publishing 2008.
[10] 10. Choudhury H, Roychoudhury B, Saikia D: End-to-End User Identity Confidentiality for UMTS Net-works. In Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, Volume 2, IEEE 2010:46–50.
[11] 11. Choudhury H, Roychoudhury B, Saikia D: UMTS user identity confidentiality: An end-to-end solution. In Wireless and Optical Communications Networks (WOCN), 2011 Eighth International Conference on, IEEE 2011:1–6.
[12] 12. Diab W, Tohme S: VPN solution for securing voice over third generation networks. In Internet Mul-timedia Services Architecture and Applications, 2008. IMSAA 2008. 2nd International Conference on, IEEE 2008:1–6.
[13] 13. Xenakis C, Ntantogian C, Stavrakakis I: A network-assisted mobile VPN for securing users data in UMTS. Computer Communications 2008, 31(14):3315–3327.
[14] 14. Arkko J, Devarapalli V, Dupont F: Using IPsec to protect mobile IPv6 signaling between mobile nodes and home agents 2004, [http://trac.tools.ietf.org/html/rfc3776].
[15] 15. Xenakis C, Merakos L: IPsec-based end-to-end VPN deployment over UMTS. Computer Communications 2004, 27(17):1693–1708.