Abstract

Mobile telephony (e.g. GSM) is today's most common communication solution. Due to the specific characteristics of mobile communication infrastructure it can provide further real added value to different third parties. Using location information and mobility patterns, it not only contributes to emergency planning as well as safety and security, but also is a driving force behind new commercial services. However, by exploiting the subscriber's location information and mobility patterns, an individual's privacy is threatened. We discuss this problem based on an opponent model and show how users may regain control over their mobile handset using a software GSM network stack. While such behavior is rational for an individual subscriber and may not impair the technical functionality of the mobile infrastructure, the additional safety and security provided by the networks will decrease and/or be prevented.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call