Analysis of privacy in mobile telephony systems

被引:0
|
作者
Myrto Arapinis
Loretta Ilaria Mancini
Eike Ritter
Mark Dermot Ryan
机构
[1] University of Edinburgh,
[2] University of Birmingham,undefined
关键词
Privacy; Automatic verification; ProVerif; Mobile telephony; Pseudonym;
D O I
暂无
中图分类号
学科分类号
摘要
We present a thorough experimental and formal analysis of users’ privacy in mobile telephony systems. In particular, we experimentally analyse the use of pseudonyms and point out weak deployed policies leading to some critical scenarios which make it possible to violate a user’s privacy. We also expose some protocol’s vulnerabilities resulting in breaches of the anonymity and/or user unlinkability. We show these breaches translate in actual attacks which are feasible to implement on real networks and discuss our prototype implementation. In order to countermeasure these attacks, we propose realistic solutions. Finally, we provide the theoretical framework for the automatic verification of the unlinkability and anonymity of the fixed 2G/3G procedures and automatically verify them using the ProVerif tool.
引用
收藏
页码:491 / 523
页数:32
相关论文
共 50 条
  • [41] Cellular mobile telephony in Nepal
    Parajuli J.
    Haynes K.E.
    Letters in Spatial and Resource Sciences, 2018, 11 (2) : 209 - 222
  • [42] Physics and biology of mobile telephony
    Hyland, GJ
    LANCET, 2000, 356 (9244): : 1833 - 1836
  • [43] Signalling Attacks in Mobile Telephony
    Pavloski, Mihajlo
    SECURITY IN COMPUTER AND INFORMATION SCIENCES, EURO-CYBERSEC 2018, 2018, 821 : 130 - 141
  • [44] Privacy and Authentication Protocol for Mobile RFID Systems
    Ben Niu
    Xiaoyan Zhu
    Haotian Chi
    Hui Li
    Wireless Personal Communications, 2014, 77 : 1713 - 1731
  • [45] Privacy and Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Chi, Haotian
    Li, Hui
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 1713 - 1731
  • [46] Speech privacy for modern mobile communication systems
    de Andrade, Jose F., Jr.
    de Campos, Marcello L. R.
    Apolinario, Jose A., Jr.
    2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1777 - +
  • [47] Privacy Requirements Patterns for Mobile Operating Systems
    Xuan, Xiao
    Wang, Ye
    Li, Shanping
    2014 IEEE 4TH INTERNATIONAL WORKSHOP ON REQUIREMENTS (REPA), 2014, : 39 - 42
  • [48] Privacy Protection in Mobile Recommender Systems: A Survey
    Xu, Kun
    Yan, Zheng
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 305 - 318
  • [49] Hybrid renewable power systems for mobile telephony base stations in developing countries
    Kusakana, Kanzumba
    Verrnaak, Herman Jacobus
    RENEWABLE ENERGY, 2013, 51 : 419 - 425
  • [50] Optimization of LDPC codes used in cooperative relay systems: case of mobile telephony
    Diop, Idy
    Ndiaye, Idrissa P.
    Fall, Papa Alioune
    Diallo, Moussa
    2017 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2017,