2018
DOI: 10.1007/978-3-030-04762-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Defeating the Downgrade Attack on Identity Privacy in 5G

Abstract: 3GPP Release 15, the first 5G standard, includes protection of user identity privacy against IMSI catchers. These protection mechanisms are based on public key encryption. Despite this protection, IMSI catching is still possible in LTE networks which opens the possibility of a downgrade attack on user identity privacy, where a fake LTE base station obtains the identity of a 5G user equipment. We propose (i) to use an existing pseudonym-based solution to protect user identity privacy of 5G user equipment agains… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 15 publications
(52 reference statements)
0
6
0
Order By: Relevance
“…The algorithm is used to offer better security device distribution, isolation, and improved traffic flow. In [34], the authors update LTE pseudonyms by utilizing the current pseudonym-based solutions to prevent International Mobile Subscriber Identity (IMSI) downgrade attacks using fake base stations. Various access control solutions have been proposed based on authentication, encryption, authorization, and secret sharing.…”
Section: Access Controlmentioning
confidence: 99%
“…The algorithm is used to offer better security device distribution, isolation, and improved traffic flow. In [34], the authors update LTE pseudonyms by utilizing the current pseudonym-based solutions to prevent International Mobile Subscriber Identity (IMSI) downgrade attacks using fake base stations. Various access control solutions have been proposed based on authentication, encryption, authorization, and secret sharing.…”
Section: Access Controlmentioning
confidence: 99%
“…Special instances, like private networks, optionally require authentication based on EAP. Because it is separate from the Radio Access (RA) scheme, in non-3GPP technologies, primary authentication will also work [80]. When the data network authentication is done outside the authority of a telecom provider is secondary authentication.…”
Section: Authenticationmentioning
confidence: 99%
“…To prevent downgrade attacks with a fake LTE BS from IMSI (International Mobile Subscriber Identity), advocated using an existing approach based on pseudonyms and a method to change LTE pseudonyms. An attack called RPEDO is addressed to find security problems with the paging protocol [80].…”
Section: Access Controlmentioning
confidence: 99%
“…Recently, Khan et al [25] proposed a downgrade attack against 5G ME, which can catch ME's International Mobile Subscriber Identity (IMSI) which is a global identity of ME. Hussain et al [26] came up with an attack named ToRPEDO that can enable an adversary to verify a victim's coarse-grained location information, inject fabricated paging messages, and initiate DoS attacks.…”
Section: Attacks Against Integritymentioning
confidence: 99%