Defeating the Downgrade Attack on Identity Privacy in 5G

被引:8
|
作者
Khan, Mohsin [1 ,2 ]
Ginzboorg, Philip [3 ,4 ]
Jarvinen, Kimmo [1 ,2 ]
Niemi, Valtteri [1 ,2 ]
机构
[1] Univ Helsinki, Helsinki, Finland
[2] Helsinki Inst Informat Technol, Helsinki, Finland
[3] Huawei Technol, Helsinki, Finland
[4] Aalto Univ, Espoo, Finland
关键词
3GPP; IMSI catchers; Pseudonym; Identity privacy 5G;
D O I
10.1007/978-3-030-04762-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
3GPP Release 15, the first 5G standard, includes protection of user identity privacy against IMSI catchers. These protection mechanisms are based on public key encryption. Despite this protection, IMSI catching is still possible in LTE networks which opens the possibility of a downgrade attack on user identity privacy, where a fake LTE base station obtains the identity of a 5G user equipment. We propose (i) to use an existing pseudonym-based solution to protect user identity privacy of 5G user equipment against IMSI catchers in LTE and (ii) to include a mechanism for updating LTE pseudonyms in the public key encryption based 5G identity privacy procedure. The latter helps to recover from a loss of synchronization of LTE pseudonyms. Using this mechanism, pseudonyms in the user equipment and home network are automatically synchronized when the user equipment connects to 5G. Our mechanisms utilize existing LTE and 3GPP Release 15 messages and require modifications only in the user equipment and home network in order to provide identity privacy. Additionally, lawful interception requires minor patching in the serving network.
引用
收藏
页码:95 / 119
页数:25
相关论文
共 50 条
  • [31] Transmission of Digital Data in the 5G Era: Compression and Privacy
    Carpentieri, Bruno
    Palmieri, Francesco
    [J]. INFORMATION, 2023, 14 (02)
  • [32] 5G WIRELESS COMMUNICATION NETWORKS: CHALLENGES IN SECURITY AND PRIVACY
    Qian, Yi
    [J]. IEEE WIRELESS COMMUNICATIONS, 2020, 27 (04) : 2 - 3
  • [33] Which future strategy and policies for privacy in 5G and beyond?
    Del Re, Enrico
    [J]. 2020 IEEE 3RD 5G WORLD FORUM (5GWF), 2020, : 235 - 238
  • [34] On the Efficacy of New Privacy Attacks against 5G AKA
    Khan, Haibat
    Martin, Keith M.
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 431 - 438
  • [35] FAIDM for Medical Privacy Protection in 5G Telemedicine Systems
    Lin, Tzu-Wei
    Hsu, Chien-Lung
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 22
  • [36] Automated Attack and Defense Framework toward 5G Security
    Sun, Yanbin
    Tian, Zhihong
    Li, Mohan
    Zhu, Chunsheng
    Guizani, Nadra
    [J]. IEEE NETWORK, 2020, 34 (05): : 247 - 253
  • [37] Open RAN for detection of a jamming attack in a 5G network
    Kryszkiewicz, Pawel
    Hoffmann, Marcin
    [J]. 2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,
  • [38] Investigating the Jamming Attack on 5G NR Physical Channels
    Kazemian, Mohsen
    [J]. arXiv,
  • [39] Open RAN for detection of a jamming attack in a 5G network
    Kryszkiewicz, Pawel
    Hoffmann, Marcin
    [J]. IEEE Vehicular Technology Conference, 2023, 2023-June
  • [40] 何为5G? 5G何用?
    张佳佳
    [J]. 初中生世界, 2020, (18) : 11 - 11