2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.148
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing User Identity Privacy in LTE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 5 publications
0
19
0
Order By: Relevance
“…While other authors observe that significant changes to widely deployed infrastructure are unlikely to be feasible [6,21], realistic and practical proposals have not been made. Choudhury et al [6] have proposed a scheme to improve user identity confidentiality in the LTE network. Their scheme involves significant changes to the air interface protocol.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…While other authors observe that significant changes to widely deployed infrastructure are unlikely to be feasible [6,21], realistic and practical proposals have not been made. Choudhury et al [6] have proposed a scheme to improve user identity confidentiality in the LTE network. Their scheme involves significant changes to the air interface protocol.…”
Section: Related Workmentioning
confidence: 99%
“…when registering with the network after switching on a phone. This user privacy issue has been discussed extensively in the literature [5,6,7,20,21,27,28], and many modifications to existing protocols have been proposed to avoid the problem [5,7,19,28]. All these proposals involve making major modifications to the air interface protocol, which would require changes to the operation of all the serving networks as well as all the deployed phones.…”
Section: Introductionmentioning
confidence: 99%
“…The role of the DM SI is to randomise and mask the IM SI so that an adversary having access to a particular DM SI cannot link it with any subscriber or any previous communication. This extension is based on our work that was presented in [7]. For successful functioning of the security extension the following operator specific random number and functions are used:…”
Section: Security Extension For Eps-akamentioning
confidence: 99%
“…Despite this security strategy the LTE still has a number of security flaws [2][3][4][5][6]. The user identity is still vulnerable to privacy attacks.…”
Section: Introductionmentioning
confidence: 99%
“…There are some occasions when the UE is requested to identify itself with its permanent identifier IMSI. Such situations occur when the network fails to retrieve the temporary identifiers of the UE and asks the UE to transmit the UE's IMSI, which in turn transmits it (in clear text) [2]. The IMSI can be intercepted by an attacker, who then could track the movements of the user, and thus violating the user's privacy.…”
Section: Introductionmentioning
confidence: 99%