A privacy threat in 4th generation mobile telephony and its countermeasure

Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Kyungtae Kang, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Mobile telephony device is widely used these days. Protecting subscribers privacy is crucial and can be achieved by evading linkability of subscribers by malicious third parties. In this paper, we analyze the privacy-related security properties of 4th generation mobile telephony, especially LTE. We suggest an attack model which makes it possible to trace a victim’s mobile device so that the attacker can know the presence of the victim’s device in a specific area. Tracking subscribers’ location by unauthorized third parties may violate the privacy of subscribers. To solve this problem, we propose a modified authentication protocol in LTE to preserve location privacy of the device. Considering security level and efficiency, we build our scheme to have low computational overhead and strong secrecy. Also we prove that the proposed scheme satisfies unlinkability property using the automatic verification tool ProVerif.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings
EditorsSiyao Cheng, Hongzhi Wang, Hong Gao, Chaokun Wang, Zhipeng Cai
PublisherSpringer Verlag
Pages624-635
Number of pages12
ISBN (Electronic)9783319077819
Publication statusPublished - 2014 Jan 1
Externally publishedYes
Event9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014 - Harbin, China
Duration: 2014 Jun 232014 Jun 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8491
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014
CountryChina
CityHarbin
Period14/6/2314/6/25

Keywords

  • Authentication
  • Location privacy
  • LTE
  • Security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A privacy threat in 4th generation mobile telephony and its countermeasure'. Together they form a unique fingerprint.

Cite this