A New Tracking-Attack Scenario Based on the Vulnerability and Privacy Violation of 5G AKA Protocol

被引:2
|
作者
Cheng, Ya-Chu [1 ]
Shen, Chung-An [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Elect & Comp Engn, Taipei 106, Taiwan
关键词
Protocols; 5G mobile communication; Authentication; Security; Privacy; Synchronization; Monitoring; Tracking and monitoring attack scenario; vulnerability; exploit; 5G AKA protocol; 3GPP; authentication and key agreement; privacy violation; TAMARIN prover; srsLTE; AUTHENTICATION; SECURITY;
D O I
10.1109/ACCESS.2022.3193372
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security architecture and procedure for 5G systems (TS 33.501) is based on the 3rd Generation Partner Project (3GPP) security specification draft that is released in 2018. Since its debut, the security violations in the 5G security protocol have been intensively studied and discussed. Based on the 5G security protocol, this paper illustrates a new tracking-attack scenario that feasibly makes subscribers suffer in a breakdown of personal privacy. Specifically, it is shown in this paper that patterns of personal behavior are leaked without any awareness during the synchronization procedures in the 5G protocol. An in-depth analysis of the privacy violations is presented in this paper and potential countermeasures for protecting the sensitive information of genuine subscribers are given. A lemma model based on the TAMARIN Prover is illustrated to analyze the privacy vulnerabilities in the depicted attack scenario. Furthermore, a practical experiment based on the srsLTE framework is setup to demonstrate how the privacy information of genuine subscribers are violated based on the scenario that is reported in this paper.
引用
收藏
页码:77679 / 77687
页数:9
相关论文
共 50 条
  • [1] On the Efficacy of New Privacy Attacks against 5G AKA
    Khan, Haibat
    Martin, Keith M.
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 431 - 438
  • [2] Location Privacy, 5G AKA, and Enhancements
    Damir, Mohamed Taoufiq
    Niemi, Valtteri
    [J]. SECURE IT SYSTEMS, NORDSEC 2022, 2022, 13700 : 40 - 57
  • [3] The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks
    Fei, Teng
    Wang, Wenye
    [J]. COMPUTER NETWORKS, 2023, 228
  • [4] Privacy-Preserving and Standard-Compatible AKA Protocol for 5G
    Wang, Yuchen
    Zhang, Zhenfeng
    Xie, Yongquan
    [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 3595 - 3612
  • [5] The 5G-AKA Authentication Protocol Privacy
    Koutsos, Adrien
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 464 - 479
  • [6] PPSE: Privacy Preservation and Security Efficient AKA Protocol for 5G Communication Networks
    Parne, Balu L.
    Gupta, Shubham
    Gandhi, Kaneesha
    Meena, Shubhangi
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2020,
  • [7] Formal Verification of 5G EAP-AKA protocol
    Ajit, Megha
    Sankaran, Sriram
    Jain, Kurunandan
    [J]. 2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 140 - 146
  • [8] Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
    Braeken, An
    [J]. COMPUTER NETWORKS, 2020, 181
  • [9] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    [J]. IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [10] Defeating the Downgrade Attack on Identity Privacy in 5G
    Khan, Mohsin
    Ginzboorg, Philip
    Jarvinen, Kimmo
    Niemi, Valtteri
    [J]. SECURITY STANDARDISATION RESEARCH (SSR 2018), 2018, 11322 : 95 - 119