@inproceedings{2356e4aa6f80461cbe40fd28499109b9,
title = "A privacy threat in 4th generation mobile telephony and its countermeasure",
abstract = "Mobile telephony device is widely used these days. Protecting subscribers privacy is crucial and can be achieved by evading linkability of subscribers by malicious third parties. In this paper, we analyze the privacy-related security properties of 4th generation mobile telephony, especially LTE. We suggest an attack model which makes it possible to trace a victim{\textquoteright}s mobile device so that the attacker can know the presence of the victim{\textquoteright}s device in a specific area. Tracking subscribers{\textquoteright} location by unauthorized third parties may violate the privacy of subscribers. To solve this problem, we propose a modified authentication protocol in LTE to preserve location privacy of the device. Considering security level and efficiency, we build our scheme to have low computational overhead and strong secrecy. Also we prove that the proposed scheme satisfies unlinkability property using the automatic verification tool ProVerif.",
keywords = "Authentication, LTE, Location privacy, Security",
author = "Changhee Hahn and Hyunsoo Kwon and Daeyoung Kim and Kyungtae Kang and Junbeom Hur",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing Switzerland 2014.; 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014 ; Conference date: 23-06-2014 Through 25-06-2014",
year = "2014",
doi = "10.1007/978-3-319-07782-6_56",
language = "English",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "624--635",
editor = "Zhipeng Cai and Chaokun Wang and Siyao Cheng and Hongzhi Wang and Hong Gao",
booktitle = "Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings",
}