Proceedings of the 50th Hawaii International Conference on System Sciences (2017) 2017
DOI: 10.24251/hicss.2017.761
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy in LTE: A Case Study on Exploiting the Cellular Signaling Plane's Timing Advance

Abstract: Abstract-Location privacy is an oft-overlooked, but exceedingly important niche of the overall privacy macrocosm. An ambition of this work is to raise awareness of concerns relating to location privacy in cellular networks. To this end, we will demonstrate how user location information is leaked through a vulnerability, viz. the timing advance (TA) parameter, in the Long Term Evolution (LTE) signaling plane and how the position estimate that results from that parameter can be refined through a previously intro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…For example, radio link a ackers can use fake base stations either to check whether UEs are present in a given location or to obtain precise coordinates of the UE [92,106,133,163]. Similarly, adversaries with access to core network can misuse signaling protocols (e.g., SS7 [55,56] and Diameter [80,145]) or exploit vulnerabilities in the signaling plane [149] for obtaining location information. IP-based a ack vectors from the IMS domain (e.g., over VoLTE) also yields similar results [100].…”
Section: Impactsmentioning
confidence: 99%
“…For example, radio link a ackers can use fake base stations either to check whether UEs are present in a given location or to obtain precise coordinates of the UE [92,106,133,163]. Similarly, adversaries with access to core network can misuse signaling protocols (e.g., SS7 [55,56] and Diameter [80,145]) or exploit vulnerabilities in the signaling plane [149] for obtaining location information. IP-based a ack vectors from the IMS domain (e.g., over VoLTE) also yields similar results [100].…”
Section: Impactsmentioning
confidence: 99%
“…These limitations notwithstanding, the tighter timing requirements in LTE provide a level of accuracy up to 78.125 m [12], which bring the TA back under consideration as a viable method for cellular localization. Unfortunately, the security architecture of LTE does not afford for the confidentiality of the TA and other signaling plane information critical for the protection of user privacy as it is not encrypted [7], [13]. As this information is sent in the clear, it provides the vehicle for location exploitation in LTE.…”
Section: Location-based Exploitation In Cellular Networkmentioning
confidence: 99%
“…The TA has been previously considered formally as a location privacy preserving mechanism (LPPM) [13], [14] with both a user anonymization component (the cell-radio network temporary identifier (C-RNTI) [9]) and an information obscurity component (the discretization of distance via the TA [15]). The obscurity component of the LPPM is described with the model…”
Section: Location-based Exploitation In Cellular Networkmentioning
confidence: 99%
See 1 more Smart Citation