Localization Attack by Precoder Feedback Overhearing in 5G Networks and Countermeasures

12/14/2020
by   Stefan Roth, et al.
0

In fifth-generation (5G) cellular networks, users feed back to the base station the index of the precoder (from a codebook) to be used for downlink transmission. The precoder is strongly related to the user channel and in turn to the user position within the cell. We propose a method by which an external attacker determines the user position by passively overhearing this unencrypted layer-2 feedback signal. The attacker first builds a map of fed back precoder indices in the cell. Then, by overhearing the precoder index fed back by the victim user, the attacker finds its position on the map. We focus on the type-I single-panel codebook, which today is the only mandatory solution in the 3GPP standard. We analyze the attack and assess the obtained localization accuracy against various parameters. We analyze the localization error of a simplified precoder feedback model and describe its asymptotic localization precision. We also propose a mitigation against our attack, wherein the user randomly selects the precoder among those providing the highest rate. Simulations confirm that the attack can achieve a high localization accuracy, which is significantly reduced when the mitigation solution is adopted, at the cost of a negligible rate degradation.

READ FULL TEXT
research
11/18/2022

Users are Closer than they Appear: Protecting User Location from WiFi APs

WiFi-based indoor localization has now matured for over a decade. Most o...
research
09/06/2020

Reconfigurable Intelligent Surfaces for Localization: Position and Orientation Error Bounds

Next-generation cellular networks will witness the creation of smart rad...
research
06/03/2022

HashBeam: Enabling Feedback Through Downlink Beamforming in Unsourced Random Access

Unsourced random access (URA) has emerged as a candidate paradigm for ma...
research
08/28/2019

Downlink Analysis for the Typical Cell in Poisson Cellular Networks

Owing to its unparalleled tractability, the Poisson point process (PPP) ...
research
03/04/2022

User-Level Membership Inference Attack against Metric Embedding Learning

Membership inference (MI) determines if a sample was part of a victim mo...
research
06/14/2018

Identifying the Fake Base Station: A Location Based Approach

Fake base station (FBS) attack is a great security challenge to wireless...
research
06/09/2021

LTrack: Stealthy Tracking of Mobile Phones in LTE

We introduce LTrack, a new tracking attack on LTE that allows an attacke...

Please sign up or login with your details

Forgot password? Click here to reset