Preserving Privacy of User Identity Based on Pseudonym Variable in 5G

被引:6
|
作者
Saeed, Mamoon M. [1 ]
Hasan, Mohammad Kamrul [2 ]
Hassan, Rosilah [2 ]
Mokhtar, Rania [3 ]
Saeed, Rashid A. [3 ,4 ]
Saeid, Elsadig [1 ]
Gupta, Manoj [5 ]
机构
[1] Alzaiem Alazahri Univ, Fac Engn, Elect Engn Dept, Khartoum, Sudan
[2] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Malaysia
[3] Taif Univ, Coll Comp & Informat Technol, Dept Comp Engn, POB 11099, At Taif 21944, Saudi Arabia
[4] Sudan Univ Sci & Technol, Dept Elect Engn, Coll Engn, Khartoum, Sudan
[5] JECRC Univ, Dept Elect & Commun Engn, Jaipur, Rajasthan, India
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 03期
关键词
5G; privacy and security; user identity; IMSI; authentication and key agreement (AKA); SCHEME; DESIGN;
D O I
10.32604/cmc.2022.017338
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fifth generation (5G) system is the forthcoming generation of the mobile communication system. It has numerous additional features and offers an extensively high data rate, more capacity, and low latency. However, these features and applications have many problems and issues in terms of security, which has become a great challenge in the telecommunication industry. This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity, which randomly changes and does not use the permanent identity between the user equipment and home network. Through this mechanism, the user identity privacy would be secured and hidden. Moreover, it improves the synchronization between mobile users and home networks. Additionally, its compliance with the Authentication and Key Agreement (AKA) structure was adopted in the previous generations. It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector's message size. Moreover, the addition of any hardware to the AKA carries minor adjustments on the network parties. In this paper, the ProVerif is used to verify the proposed scheme.
引用
收藏
页码:5551 / 5568
页数:18
相关论文
共 50 条
  • [1] Preserving privacy of user identity based on pseudonym variable in 5G
    Saeed, Mamoon M.
    Hasan, Mohammad Kamrul
    Hassan, Rosilah
    Mokhtar, Rania
    Saeed, Rashid A.
    Saeid, Elsadig
    Gupta, Manoj
    [J]. Computers, Materials and Continua, 2022, 70 (03): : 5551 - 5567
  • [2] Pseudonym Mutable Based Privacy for 5G User Identity
    Saeed, Rashid A.
    Saeed, Mamoon M.
    Mokhtar, Rania A.
    Alhumyani, Hesham
    Abdel-Khalek, S.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 39 (01): : 1 - 14
  • [3] RETRACTED: A Novel Variable Pseudonym Scheme for Preserving Privacy User Location in 5G Networks (Retracted Article)
    Saeed, Mamoon M.
    Saeed, Rashid A.
    Mokhtar, Rania A.
    Alhumyani, Hesham
    Ali, Elmustafa Sayed
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [4] Privacy Preserving AKMA in 5G
    Khan, Mohsin
    Ginzboorg, Philip
    Niemi, Valtteri
    [J]. PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), 2019, : 45 - 56
  • [5] Variable Periodic Pseudonym-based Location Privacy Preserving for ICV
    Zhou, Xinling
    Peng, Lei
    Li, Huiyun
    Chen, Mingsong
    Zhu, Hongwei
    Dong, Shi
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INTELLIGENT MANUFACTURING (ITIM 2017), 2017, 142 : 71 - 74
  • [6] 5G Visions of User Privacy
    Sorensen, Lene Tolstrup
    Khajuria, Samant
    Skouby, Knud Erik
    [J]. 2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,
  • [7] Privacy-Preserving User-Auditable Pseudonym Systems
    Camenisch, Jan
    Lehmann, Anja
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 269 - 284
  • [8] Preserving Privacy in the Age of Wireless Evolution: Differential Privacy in 5G, Beyond 5G, and 6G
    Sanon, Sogo Pierre
    Lipps, Christoph
    Schotten, Hans D.
    [J]. 2023 INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATIONS AND NETWORKS, FCN, 2023,
  • [9] A Blockchain-Based User Identity Authentication Method for 5G
    Tu, Zhe
    Zhou, Huachun
    Li, Kun
    Song, Haoxiang
    Wang, Weilin
    [J]. MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 335 - 351
  • [10] Defeating the Downgrade Attack on Identity Privacy in 5G
    Khan, Mohsin
    Ginzboorg, Philip
    Jarvinen, Kimmo
    Niemi, Valtteri
    [J]. SECURITY STANDARDISATION RESEARCH (SSR 2018), 2018, 11322 : 95 - 119