Browsing by Author "Akman, Gizem"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
- Privacy-Aware Access Protocols for MEC Applications in 5G
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2022-04-01) Akman, Gizem; Ginzboorg, Philip; Niemi, ValtteriMulti-access edge computing (MEC) is one of the emerging key technologies in fifth generation (5G) mobile networks, providing reduced end-to-end latency for applications and reduced load in the transport network. This paper proposes mechanisms to enhance user privacy in MEC within 5G. We consider a basic MEC usage scenario, where the user accesses an application hosted in the MEC platform via the radio access network of the mobile network operator (MNO). First, we create a system model based on this scenario. Second, we define the adversary model and give the list of privacy requirements for this system model. We also analyze the impact on user privacy when some of the parties in our model share information that is not strictly needed for providing the service. Third, we introduce a privacy-aware access protocol for the system model and analyze this protocol against the privacy requirements. - Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2023-01) Akman, Gizem; Ginzboorg, Philip; Damir, Mohamed Taoufiq; Niemi, ValtteriMulti-access edge computing (MEC) is an emerging technology of 5G that brings cloud computing benefits closer to the user. The current specifications of MEC describe the connectivity of mobile users and the MEC host, but they have issues with application-level security and privacy. We consider how to provide secure and privacy-preserving communication channels between a mobile user and a MEC application in the non-roaming case. It includes protocols for registration of the user to the main server of the MEC application, renewal of the shared key, and usage of the MEC application in the MEC host when the user is stationary or mobile. For these protocols, we designed a privacy-enhanced version of the 5G authentication and key management for applications (AKMA) service. We formally verified the current specification of AKMA using ProVerif and found a new spoofing attack as well as other security and privacy vulnerabilities. Then we propose a fix against the spoofing attack. The privacy-enhanced AKMA is designed considering these shortcomings. We formally verified the privacy-enhanced AKMA and adapted it to our solution. - Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications
Conference article in proceedings(2021-09-10) Akman, Gizem; Ginzboorg, Philip; Niemi, ValtteriMulti-Access Edge Computing (MEC) is one of the emerging key technologies in Fifth Generation (5G) Mobile Networks, providing reduced end-to-end latency for applications and reduced load in the transport network. This paper is about user privacy in MEC within 5G. We consider a basic MEC usage scenario, where the user accesses an application hosted in the MEC platform via the radio access network of the Mobile Network Operator (MNO). First, we create a system model based on this scenario, then define the adversary model and privacy requirements for this system model. Second, we introduce a privacy-preserving access solution for the system model and analyze the solution against the privacy requirements.