Defeating the Downgrade Attack on Identity Privacy in 5G

被引:8
|
作者
Khan, Mohsin [1 ,2 ]
Ginzboorg, Philip [3 ,4 ]
Jarvinen, Kimmo [1 ,2 ]
Niemi, Valtteri [1 ,2 ]
机构
[1] Univ Helsinki, Helsinki, Finland
[2] Helsinki Inst Informat Technol, Helsinki, Finland
[3] Huawei Technol, Helsinki, Finland
[4] Aalto Univ, Espoo, Finland
关键词
3GPP; IMSI catchers; Pseudonym; Identity privacy 5G;
D O I
10.1007/978-3-030-04762-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
3GPP Release 15, the first 5G standard, includes protection of user identity privacy against IMSI catchers. These protection mechanisms are based on public key encryption. Despite this protection, IMSI catching is still possible in LTE networks which opens the possibility of a downgrade attack on user identity privacy, where a fake LTE base station obtains the identity of a 5G user equipment. We propose (i) to use an existing pseudonym-based solution to protect user identity privacy of 5G user equipment against IMSI catchers in LTE and (ii) to include a mechanism for updating LTE pseudonyms in the public key encryption based 5G identity privacy procedure. The latter helps to recover from a loss of synchronization of LTE pseudonyms. Using this mechanism, pseudonyms in the user equipment and home network are automatically synchronized when the user equipment connects to 5G. Our mechanisms utilize existing LTE and 3GPP Release 15 messages and require modifications only in the user equipment and home network in order to provide identity privacy. Additionally, lawful interception requires minor patching in the serving network.
引用
收藏
页码:95 / 119
页数:25
相关论文
共 50 条
  • [1] A comprehensive review on the users' identity privacy for 5G networks
    Saeed, Mamoon M.
    Hasan, Mohammad Kamrul
    Obaid, Ahmed J.
    Saeed, Rashid A.
    Mokhtar, Rania A.
    Ali, Elmustafa Sayed
    Akhtaruzzaman, Md
    Amanlou, Sanaz
    Hossain, A. K. M. Zakir
    [J]. IET COMMUNICATIONS, 2022, 16 (05) : 384 - 399
  • [2] Pseudonym Mutable Based Privacy for 5G User Identity
    Saeed, Rashid A.
    Saeed, Mamoon M.
    Mokhtar, Rania A.
    Alhumyani, Hesham
    Abdel-Khalek, S.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 39 (01): : 1 - 14
  • [3] Preserving Privacy of User Identity Based on Pseudonym Variable in 5G
    Saeed, Mamoon M.
    Hasan, Mohammad Kamrul
    Hassan, Rosilah
    Mokhtar, Rania
    Saeed, Rashid A.
    Saeid, Elsadig
    Gupta, Manoj
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 5551 - 5568
  • [4] Preserving privacy of user identity based on pseudonym variable in 5G
    Saeed, Mamoon M.
    Hasan, Mohammad Kamrul
    Hassan, Rosilah
    Mokhtar, Rania
    Saeed, Rashid A.
    Saeid, Elsadig
    Gupta, Manoj
    [J]. Computers, Materials and Continua, 2022, 70 (03): : 5551 - 5567
  • [5] Preserving Privacy in the Age of Wireless Evolution: Differential Privacy in 5G, Beyond 5G, and 6G
    Sanon, Sogo Pierre
    Lipps, Christoph
    Schotten, Hans D.
    [J]. 2023 INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATIONS AND NETWORKS, FCN, 2023,
  • [6] Privacy Preserving AKMA in 5G
    Khan, Mohsin
    Ginzboorg, Philip
    Niemi, Valtteri
    [J]. PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), 2019, : 45 - 56
  • [7] Privacy and Economics in a 5G Environment
    Samant Khajuria
    Knud Erik Skouby
    [J]. Wireless Personal Communications, 2017, 95 : 145 - 154
  • [8] 5G Visions of User Privacy
    Sorensen, Lene Tolstrup
    Khajuria, Samant
    Skouby, Knud Erik
    [J]. 2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,
  • [9] Privacy and Economics in a 5G Environment
    Khajuria, Samant
    Skouby, Knud Erik
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (01) : 145 - 154
  • [10] 5G Privacy: Scenarios and Solutions
    Liyanage, Madhusanka
    Salo, Jukka
    Braeken, An
    Kumar, Tanesh
    Seneviratne, Suranga
    Ylianttila, Mika
    [J]. 2018 IEEE 5G WORLD FORUM (5GWF), 2018, : 197 - 203