2015
DOI: 10.1007/978-3-319-27152-1_9
|View full text |Cite
|
Sign up to set email alerts
|

Improving Air Interface User Privacy in Mobile Telephony

Abstract: Although the security properties of 3G and 4G mobile networks have significantly improved by comparison with 2G (GSM), significant shortcomings remain with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant modifications to existing deployed infrastructures, which are almost certainly impractical to achieve in practice. In this article we propose an approach which does not requ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 17 publications
(22 citation statements)
references
References 7 publications
0
22
0
Order By: Relevance
“…Publications proposing cellular network pseudonyms in the same format as IMSI, but with randomized, frequently changing MSIN, include [7][8][9][10]. In Broek et al [7] and Khan and Mitchell [8] the pseudonym's update is embedded in a random challenge, RAND, of AKA. Khan and Mitchell [11] identified a weakness in solutions proposing cellular network pseudonyms in the same format as IMSI, which could be exploited to desynchronize pseudonyms in the UE and the HN.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Publications proposing cellular network pseudonyms in the same format as IMSI, but with randomized, frequently changing MSIN, include [7][8][9][10]. In Broek et al [7] and Khan and Mitchell [8] the pseudonym's update is embedded in a random challenge, RAND, of AKA. Khan and Mitchell [11] identified a weakness in solutions proposing cellular network pseudonyms in the same format as IMSI, which could be exploited to desynchronize pseudonyms in the UE and the HN.…”
Section: Related Workmentioning
confidence: 99%
“…(Indeed, if the UE uses pseudonym in IMSI format when it communicates with SN, and the SN does not get the long-term identifier of that UE -for instance, because it was not patched for LI, then the SN has no other choice but to put the UE's pseudonym into the CDR.) For this reason the home network has to consult a log of pseudonym allocations when it maps from UE identifiers in received CDRs to the actual subscribers' data [8,12]. That log includes the following information: (i) the pseudonym, (ii) the IMSI of the subscriber whom the pseudonym is given to, (iii) the time when HN allocated the pseudonym to the subscriber, (iv) the time when the subscriber started using the pseudonym (i.e., the time of the first successful AKA run of that subscriber with the pseudonym), (v) the time when the UE notified that it is no longer using the pseudonym, and (vi) list of SNs that the user has attached with using this pseudonym.…”
Section: Charging and Billingmentioning
confidence: 99%
See 1 more Smart Citation
“…As for Dupré, the purpose of the 'special RAND' was completely different to that proposed here. The other published references to the notion appear in papers [4,17,22] that independently propose the use of RAND hijacking for improving the privacy properties of GSM, 3G and 4G networks. As far as the authors are aware, no previous authors have proposed the use of this technique for providing mutual authentication in GSM networks.…”
Section: Rand Hijackingmentioning
confidence: 99%
“…However, these protocols do not consider SMS as a communication medium and require additional cost and storage for a group setup. Recently, a solution for user privacy in mobile telephony was proposed using the predefined multiple International Mobile Subscriber Identities (IMSI) for each Universal Subscriber Identity Module (USIM) [40]. However, this solution requires a large storage space, generates a huge overhead for pseudo-identities, and utilizes significant bandwidth for sending IMSIs to each MS.…”
Section: Existing Solutionsmentioning
confidence: 99%