University of Wollongong
Browse

Location privacy in mobile IP

Download (1.15 MB)
conference contribution
posted on 2024-11-14, 09:39 authored by Rungrat Wiangsripanawan, Reihaneh Safavi-Naini, Willy SusiloWilly Susilo
Several security issues arise, due to the design of the mobile IP and its deployment in conjunction with other network protocols. Most of the work on the security of mobile IP has focused on authentication of the control packet and the confidentiality of the content in the protocol, and there are not many proposals in the area of location privacy. In this paper, we propose a method to provide location privacy for mobile IP users. We present two protocols that use an overlay network approach, and designed particularly for mobile IP. We employ universal re-encryption and extend it to n-out-of-n universal re-encryption to achieve our goal. In contrast to other overlay network approaches, where at least n public key encryption are required, our scheme requires only 2 public key encryption operations. Therefore, it is applicable to mobile IP systems, where in most cases the mobile nodes are small devices and have computational limitation.

History

Citation

This paper was originally published as: Wiangsripanawan, R, Safavi-Naini, R & Susilo, W, Location privacy in mobile IP, IEEE 7th Malaysia International Conference on Communication 2005 and the 13th IEEE International Conference on Networks, 16-18 November 2005, 2. Copyright IEEE 2005.

Parent title

2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings

Volume

2

Pagination

1120-1125

Language

English

RIS ID

13186

Usage metrics

    Categories

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC