Defeating the Downgrade Attack on Identity Privacy in 5G

被引:8
|
作者
Khan, Mohsin [1 ,2 ]
Ginzboorg, Philip [3 ,4 ]
Jarvinen, Kimmo [1 ,2 ]
Niemi, Valtteri [1 ,2 ]
机构
[1] Univ Helsinki, Helsinki, Finland
[2] Helsinki Inst Informat Technol, Helsinki, Finland
[3] Huawei Technol, Helsinki, Finland
[4] Aalto Univ, Espoo, Finland
关键词
3GPP; IMSI catchers; Pseudonym; Identity privacy 5G;
D O I
10.1007/978-3-030-04762-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
3GPP Release 15, the first 5G standard, includes protection of user identity privacy against IMSI catchers. These protection mechanisms are based on public key encryption. Despite this protection, IMSI catching is still possible in LTE networks which opens the possibility of a downgrade attack on user identity privacy, where a fake LTE base station obtains the identity of a 5G user equipment. We propose (i) to use an existing pseudonym-based solution to protect user identity privacy of 5G user equipment against IMSI catchers in LTE and (ii) to include a mechanism for updating LTE pseudonyms in the public key encryption based 5G identity privacy procedure. The latter helps to recover from a loss of synchronization of LTE pseudonyms. Using this mechanism, pseudonyms in the user equipment and home network are automatically synchronized when the user equipment connects to 5G. Our mechanisms utilize existing LTE and 3GPP Release 15 messages and require modifications only in the user equipment and home network in order to provide identity privacy. Additionally, lawful interception requires minor patching in the serving network.
引用
收藏
页码:95 / 119
页数:25
相关论文
共 50 条
  • [41] Generative adversarial networks enhanced location privacy in 5G networks
    Qu, Youyang
    Zhang, Jingwen
    Li, Ruidong
    Zhang, Xiaoning
    Zhai, Xuemeng
    Yu, Shui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (12)
  • [42] CHALLENGES AND NOVEL SOLUTIONS FOR 5G NETWORK SECURITY, PRIVACY AND TRUST
    Mazurczyk, Wojciech
    Bisson, Pascal
    Jover, Roger Piqueras
    Nakao, Koji
    Cabaj, Krzysztof
    [J]. IEEE WIRELESS COMMUNICATIONS, 2020, 27 (04) : 6 - 7
  • [43] Location-Privacy-Preserving Technique for 5G mmWave Devices
    Jimenez Checa, Javier
    Tomasin, Stefano
    [J]. IEEE COMMUNICATIONS LETTERS, 2020, 24 (12) : 2692 - 2695
  • [44] Generative adversarial networks enhanced location privacy in 5G networks
    Youyang Qu
    Jingwen Zhang
    Ruidong Li
    Xiaoning Zhang
    Xuemeng Zhai
    Shui Yu
    [J]. Science China Information Sciences, 2020, 63
  • [45] Privacy in the Era of 5G, IoT, Big Data and Machine Learning
    Bertino, Elisa
    [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 134 - 137
  • [46] Privacy Preserving Cyberbullying Prevention with AI Methods in 5G Networks
    Ramezanian, Sara
    Niemi, Vaitteri
    [J]. PROCEEDINGS OF THE 2019 25TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 265 - 271
  • [47] Privacy in the Era of 5G, IoT, Big Data, and Machine Learning
    Bertino, Elisa
    [J]. IEEE SECURITY & PRIVACY, 2023, 21 (01) : 92 - 91
  • [48] Privacy-Preserving Decentralized Edge Caching in 5G Networks
    Zeng, Yiming
    Huang, Yaodong
    Liu, Zhenhua
    Liu, Ji
    Yang, Yuanyuan
    [J]. 2021 IEEE 14TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2021), 2021, : 189 - 199
  • [49] 5G In the internet of things era: An overview on security and privacy challenges
    Sicari, Sabrina
    Rizzardi, Alessandra
    Coen-Porisini, Alberto
    [J]. COMPUTER NETWORKS, 2020, 179
  • [50] Attack Graphs for Standalone Non-Public 5G Networks
    Tripathi, Arpit
    Thakur, Abhishek
    Tamma, Bheemarjuna Reddy
    [J]. 2022 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2022, : 158 - 163