Defeating the downgrade attack on identity privacy in 5G
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.author | Khan, Mohsin | en_US |
dc.contributor.author | Ginzboorg, Philip | en_US |
dc.contributor.author | Järvinen, Kimmo | en_US |
dc.contributor.author | Niemi, Valtteri | en_US |
dc.contributor.department | Department of Communications and Networking | en |
dc.contributor.editor | Cremers, Cas | en_US |
dc.contributor.editor | Lehmann, Anja | en_US |
dc.contributor.organization | University of Helsinki | en_US |
dc.date.accessioned | 2019-01-14T09:24:37Z | |
dc.date.available | 2019-01-14T09:24:37Z | |
dc.date.issued | 2018-01-01 | en_US |
dc.description.abstract | 3GPP Release 15, the first 5G standard, includes protection of user identity privacy against IMSI catchers. These protection mechanisms are based on public key encryption. Despite this protection, IMSI catching is still possible in LTE networks which opens the possibility of a downgrade attack on user identity privacy, where a fake LTE base station obtains the identity of a 5G user equipment. We propose (i) to use an existing pseudonym-based solution to protect user identity privacy of 5G user equipment against IMSI catchers in LTE and (ii) to include a mechanism for updating LTE pseudonyms in the public key encryption based 5G identity privacy procedure. The latter helps to recover from a loss of synchronization of LTE pseudonyms. Using this mechanism, pseudonyms in the user equipment and home network are automatically synchronized when the user equipment connects to 5G. Our mechanisms utilize existing LTE and 3GPP Release 15 messages and require modifications only in the user equipment and home network in order to provide identity privacy. Additionally, lawful interception requires minor patching in the serving network. | en |
dc.description.version | Peer reviewed | en |
dc.format.extent | 25 | |
dc.format.extent | 95-119 | |
dc.format.mimetype | application/pdf | en_US |
dc.identifier.citation | Khan, M, Ginzboorg, P, Järvinen, K & Niemi, V 2018, Defeating the downgrade attack on identity privacy in 5G . in C Cremers & A Lehmann (eds), Security Standardisation Research - 4th International Conference, SSR 2018, Proceedings . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11322 LNCS, Springer, pp. 95-119, Conference on Security Standards Research, Darmstadt, Germany, 26/11/2018 . https://doi.org/10.1007/978-3-030-04762-7_6 | en |
dc.identifier.doi | 10.1007/978-3-030-04762-7_6 | en_US |
dc.identifier.isbn | 9783030047610 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.issn | 1611-3349 | |
dc.identifier.other | PURE UUID: d4ba02ed-2bf1-4f94-8f0f-4d4150d4df61 | en_US |
dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/d4ba02ed-2bf1-4f94-8f0f-4d4150d4df61 | en_US |
dc.identifier.other | PURE LINK: http://www.scopus.com/inward/record.url?scp=85057777554&partnerID=8YFLogxK | en_US |
dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/30809100/Defeating_the_downgrade_attack_on_identity_privacy_in_5G_SSR_2018.pdf | en_US |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/36026 | |
dc.identifier.urn | URN:NBN:fi:aalto-201901141209 | |
dc.language.iso | en | en |
dc.relation.ispartof | Conference on Security Standards Research | en |
dc.relation.ispartofseries | Security Standardisation Research - 4th International Conference, SSR 2018, Proceedings | en |
dc.relation.ispartofseries | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en |
dc.relation.ispartofseries | Volume 11322 LNCS | en |
dc.rights | openAccess | en |
dc.subject.keyword | 3GPP | en_US |
dc.subject.keyword | 5G | en_US |
dc.subject.keyword | Identity privacy | en_US |
dc.subject.keyword | IMSI catchers | en_US |
dc.subject.keyword | Pseudonym | en_US |
dc.title | Defeating the downgrade attack on identity privacy in 5G | en |
dc.type | A4 Artikkeli konferenssijulkaisussa | fi |
dc.type.version | acceptedVersion |