P3LI5: Practical and Confidential Lawful Interception on the 5G Core

08/27/2023
by   Francesco Intoci, et al.
0

Lawful Interception (LI) is a legal obligation of Communication Service Providers (CSPs) to provide interception capabilities to Law Enforcement Agencies (LEAs) in order to gain insightful data from network communications for criminal proceedings, e.g., network identifiers for tracking suspects. With the privacy-enhancements of network identifiers in the 5th generation of mobile networks (5G), LEAs need to interact with CSPs for network identifier resolution. This raises new privacy issues, as untrusted CSPs are able to infer sensitive information about ongoing investigations, e.g., the identities of their subscribers under suspicion. In this work, we propose P3LI5, a novel system that enables LEAs to privately query CSPs for network identifier resolution leveraging on an information retrieval protocol, SparseWPIR, that is based on private information retrieval and its weakly private version. As such, P3LI5 can be adapted to various operational scenarios with different confidentiality or latency requirements, by selectively allowing a bounded information leakage for improved performance. We implement P3LI5 on the 5G LI infrastructure using well known open-source projects and demonstrate its scalability to large databases while retaining low latency. To the best of our knowledge, P3LI5 is the first proposal for addressing the privacy issues raised by the mandatory requirement for LI on the 5G core network.

READ FULL TEXT
research
05/17/2021

Weakly Private Information Retrieval Under Rényi Divergence

Private information retrieval (PIR) is a protocol that guarantees the pr...
research
04/29/2020

Provably-secure symmetric private information retrieval with quantum cryptography

Private information retrieval (PIR) is a database query protocol that pr...
research
05/05/2020

Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics

With the outbreak of the coronavirus, governments rely more and more on ...
research
06/01/2021

Intermittent Private Information Retrieval with Application to Location Privacy

We study the problem of intermittent private information retrieval with ...
research
01/20/2019

Weakly-Private Information Retrieval

Private information retrieval (PIR) protocols make it possible to retrie...
research
07/03/2019

Location Privacy in Cognitive Radios with Multi-Server Private Information Retrieval

Spectrum database-based cognitive radio networks (CRNs) have become the ...
research
04/12/2023

5Greplay: a 5G Network Traffic Fuzzer – Application to Attack Injection

The fifth generation of mobile broadband is more than just an evolution ...

Please sign up or login with your details

Forgot password? Click here to reset