On the Efficacy of New Privacy Attacks against 5G AKA

被引:5
|
作者
Khan, Haibat [1 ]
Martin, Keith M. [1 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp, London, England
关键词
5G AKA; Mobile Telephony; Privacy; Unlinkability;
D O I
10.5220/0007919704310438
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The AKA protocol is the primary mechanism in mobile telephony for establishment of a secure channel between mobile subscribers and their service providers. In addition to the requisite security guarantees, provisioning subscription privacy is an essential requirement for AKA. A recent paper by Borgaonkar et al. has uncovered a new vulnerability in one of the associated mechanisms of the AKA protocol. Based upon this vulnerability, Borgaonkar et al. have presented two privacy attacks; namely, activity monitoring attack and location confidentiality attack. In this paper, we analyze these attacks for their effectiveness, practicability and potency against 5G. Our analysis reveal that the activity monitoring attack is not as effective against 5G as it is against the previous generations (3G/4G). The analysis also bring to light the fact that the location confidentiality attack is a direct extension of an existing privacy vulnerability that affects all generations (including 5G) of mobile telephony in a much severe manner. In this paper we also establish that any countermeasure introduced to fix this existing vulnerability will also render these two new attacks ineffective.
引用
收藏
页码:431 / 438
页数:8
相关论文
共 50 条
  • [1] Location Privacy, 5G AKA, and Enhancements
    Damir, Mohamed Taoufiq
    Niemi, Valtteri
    [J]. SECURE IT SYSTEMS, NORDSEC 2022, 2022, 13700 : 40 - 57
  • [2] Privacy-Preserving and Standard-Compatible AKA Protocol for 5G
    Wang, Yuchen
    Zhang, Zhenfeng
    Xie, Yongquan
    [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 3595 - 3612
  • [3] A New Tracking-Attack Scenario Based on the Vulnerability and Privacy Violation of 5G AKA Protocol
    Cheng, Ya-Chu
    Shen, Chung-An
    [J]. IEEE ACCESS, 2022, 10 : 77679 - 77687
  • [4] PPSE: Privacy Preservation and Security Efficient AKA Protocol for 5G Communication Networks
    Parne, Balu L.
    Gupta, Shubham
    Gandhi, Kaneesha
    Meena, Shubhangi
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2020,
  • [5] Attacks Against Mobility Prediction in 5G Networks
    Atiiq, Syafiq Al
    Yuan, Yachao
    Gehrmann, Christian
    Sternby, Jakob
    Barriga, Luis
    [J]. Proceedings - 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom/BigDataSE/CSE/EUC/iSCI 2023, 2023, : 1502 - 1511
  • [6] The 5G-AKA Authentication Protocol Privacy
    Koutsos, Adrien
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 464 - 479
  • [7] Attacks against Machine Learning Models in 5G Networks
    Zolotukhin, Mikhail
    Zhang, Di
    Miraghaie, Parsa
    Hamalainen, Timo
    Ke, Wang
    Dunderfelt, Marja
    [J]. 2022 6TH EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING & COMPUTER SCIENCE, ELECS, 2022, : 106 - 114
  • [8] 5G Attacks and Countermeasures
    Bjerre, Sebastian Angelo
    Blomsterberg, Mikkel Woidemann Klaebel
    Andersen, Birger
    [J]. 2022 25TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2022,
  • [9] Smart jamming attacks in 5G new radio: A review
    School of Electrical Engineering and Computer Science, University of North Dakota Grand Forks, ND, United States
    [J]. arXiv, 1600,
  • [10] Smart Jamming Attacks in 5G New Radio: A Review
    Arjoune, Youness
    Faruque, Saleh
    [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 1010 - 1015