Defeating the Downgrade Attack on Identity Privacy in 5G

11/06/2018
by   Mohsin Khan, et al.
0

3GPP Release 15, the first 5G standard, includes protection of user identity privacy against IMSI catchers. These protection mechanisms are based on public key encryption. Despite this protection, IMSI catching is still possible in LTE networks which opens the possibility of a downgrade attack on user identity privacy, where a fake LTE base station obtains the identity of a 5G user equipment. We propose (i) to use an existing pseudonym-based solution to protect user identity privacy of 5G user equipment against IMSI catchers in LTE and (ii) to include a mechanism for updating LTE pseudonyms in the public key encryption based 5G identity privacy procedure. The latter helps to recover from a loss of synchronization of LTE pseudonyms. Using this mechanism, pseudonyms in the user equipment and home network are automatically synchronized when the user equipment connects to 5G. Our mechanisms utilize existing LTE and 3GPP Release 15 messages and require modifications only in the user equipment and home network in order to provide identity privacy. Additionally, lawful interception requires minor patching in the serving network.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/15/2018

Anonymous Identity-Based Encryption with Identity Recovery

Anonymous Identity-Based Encryption can protect privacy of the receiver....
research
01/23/2022

A Survey on Patients Privacy Protection with Stganography and Visual Encryption

In this survey, thirty models for steganography and visual encryption me...
research
12/12/2013

Managing NymBoxes for Identity and Tracking Protection

Despite the attempts of well-designed anonymous communication tools to p...
research
03/29/2021

Uplink Channel Impulse Response Based Secondary Carrier Prediction

A typical handover problem requires sequence of complex signaling betwee...
research
06/27/2021

A Fair Model of Identity Information Exchange Leveraging Zero-Knowledge

Many companies use identity information for different goals. There are a...
research
10/19/2019

Improving Privacy in Graphs Through Node Addition

The rapid growth of computer systems which generate graph data necessita...
research
01/18/2022

Identification for Accountability vs Privacy

This document considers the counteracting requirements of privacy and ac...

Please sign up or login with your details

Forgot password? Click here to reset