2019
DOI: 10.1007/s11277-019-06585-7
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Analysis of Subscribers’ Privacy Exposure by LTE Paging

Abstract: Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes vulnerabilities that attackers can exploit. This might be the case of paging messages, wake-up notifications that target specific subscribers, and that are broadcasted in clear over the radio interface. If they are not properly implemented, paging messages can expose the identity of subscribers and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
(25 reference statements)
0
2
0
Order By: Relevance
“…These enable us to derive the master's UAP. 2 To find the UAP of a device, we need to (i) first identify which 6-bits of the master clock were used to whiten a frame header and de-whiten it, and (ii) infer what UAP value produces a HEC value that matches the HEC in the de-whitened header. We illustrate this logic in Fig.…”
Section: Re-identifying Bluetooth Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…These enable us to derive the master's UAP. 2 To find the UAP of a device, we need to (i) first identify which 6-bits of the master clock were used to whiten a frame header and de-whiten it, and (ii) infer what UAP value produces a HEC value that matches the HEC in the de-whitened header. We illustrate this logic in Fig.…”
Section: Re-identifying Bluetooth Devicesmentioning
confidence: 99%
“…In recent years, however, the privacy attack surface has expanded significantly with the pervasiveness of mobile and sensing devices, open mobile platforms (running untrusted code), diverse wireless connectivity options, and the availability of SDR platforms. For instance, faulty implementations of paging messages in LTE networks allow attackers to collect IMSIs through passive sniffing [2]. This questions the effectiveness of SUCI, given that it is possible to downgrade a terminal's connectivity from 5G to 3G via jamming, and subsequently use one of the many SDR-based IMSI catching tools [3] to reveal a target's identity.…”
Section: Introductionmentioning
confidence: 99%