Analysis of privacy in mobile telephony systems

被引:5
|
作者
Arapinis, Myrto [1 ]
Mancini, Loretta Ilaria [2 ]
Ritter, Eike [2 ]
Ryan, Mark Dermot [2 ]
机构
[1] Univ Edinburgh, Edinburgh, Midlothian, Scotland
[2] Univ Birmingham, Birmingham, W Midlands, England
基金
英国工程与自然科学研究理事会;
关键词
Privacy; Automatic verification; ProVerif; Mobile telephony; Pseudonym; LOCATION PRIVACY; AUTOMATED VERIFICATION; CONCRETE ATTACKS; FORMAL ANALYSIS; AUTHENTICATION; EQUIVALENCES;
D O I
10.1007/s10207-016-0338-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a thorough experimental and formal analysis of users' privacy in mobile telephony systems. In particular, we experimentally analyse the use of pseudonyms and point out weak deployed policies leading to some critical scenarios which make it possible to violate a user's privacy. We also expose some protocol's vulnerabilities resulting in breaches of the anonymity and/or user unlinkability. We show these breaches translate in actual attacks which are feasible to implement on real networks and discuss our prototype implementation. In order to countermeasure these attacks, we propose realistic solutions. Finally, we provide the theoretical framework for the automatic verification of the unlinkability and anonymity of the fixed 2G/3G procedures and automatically verify them using the ProVerif tool.
引用
收藏
页码:491 / 523
页数:33
相关论文
共 50 条
  • [1] Analysis of privacy in mobile telephony systems
    Myrto Arapinis
    Loretta Ilaria Mancini
    Eike Ritter
    Mark Dermot Ryan
    [J]. International Journal of Information Security, 2017, 16 : 491 - 523
  • [2] Privacy through Pseudonymity in Mobile Telephony Systems
    Arapinis, Myrto
    Mancini, Loretta Ilaria
    Ritter, Eike
    Ryan, Mark
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [3] Bluetooth in Mobile Telephony: Privacy and Security Issues
    Kostopoulos, George K.
    [J]. CREATING GLOBAL ECONOMIES THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: THEORY & PRACTICE, VOLS 1-3, 2009, : 1353 - 1356
  • [4] Improving Air Interface User Privacy in Mobile Telephony
    Khan, Mohammed Shafiul Alam
    Mitchell, Chris J.
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 165 - 184
  • [5] A NOVEL METHOD FOR THE CODECS' PERFORMANCE ANALYSIS IN MOBILE TELEPHONY SYSTEMS
    Lebl, Aleksandar
    Mitic, Dragan
    Matic, Vladimir
    Mileusnic, Mladen
    Markov, Zarko
    [J]. FACTA UNIVERSITATIS-SERIES ELECTRONICS AND ENERGETICS, 2020, 33 (02) : 243 - 259
  • [6] ANTENNA SYSTEMS FOR MULTICHANNEL MOBILE TELEPHONY
    BABCOCK, WC
    NYLUND, HW
    [J]. PROCEEDINGS OF THE INSTITUTE OF RADIO ENGINEERS, 1950, 38 (11): : 1324 - 1329
  • [7] ANTENNA SYSTEMS FOR MULTICHANNEL MOBILE TELEPHONY
    BABCOCK, WC
    NYLUND, HW
    [J]. PROCEEDINGS OF THE INSTITUTE OF RADIO ENGINEERS, 1949, 37 (02): : 163 - 163
  • [8] Another Look at Privacy Threats in 3G Mobile Telephony
    Khan, Mohammed Shafiul Alam
    Mitchell, Chris J.
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 386 - 396
  • [9] Risk analysis for mobile telephony in a hospital
    Nordland, O
    [J]. PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT, VOL 1- 6, 2004, : 2985 - 2990
  • [10] PRINCIPAL SYSTEMS OF ANALOGICAL CELLULAR MOBILE TELEPHONY
    DIACRE, M
    [J]. ONDE ELECTRIQUE, 1984, 64 (03): : 14 - 21