A privacy threat in 4th generation mobile telephony and its countermeasure

Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Kyungtae Kang, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Mobile telephony device is widely used these days. Protecting subscribers privacy is crucial and can be achieved by evading linkability of subscribers by malicious third parties. In this paper, we analyze the privacy-related security properties of 4th generation mobile telephony, especially LTE. We suggest an attack model which makes it possible to trace a victim’s mobile device so that the attacker can know the presence of the victim’s device in a specific area. Tracking subscribers’ location by unauthorized third parties may violate the privacy of subscribers. To solve this problem, we propose a modified authentication protocol in LTE to preserve location privacy of the device. Considering security level and efficiency, we build our scheme to have low computational overhead and strong secrecy. Also we prove that the proposed scheme satisfies unlinkability property using the automatic verification tool ProVerif.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings
EditorsSiyao Cheng, Hongzhi Wang, Hong Gao, Chaokun Wang, Zhipeng Cai
PublisherSpringer Verlag
Pages624-635
Number of pages12
ISBN (Electronic)9783319077819
Publication statusPublished - 2014 Jan 1
Externally publishedYes
Event9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014 - Harbin, China
Duration: 2014 Jun 232014 Jun 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8491
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014
CountryChina
CityHarbin
Period14/6/2314/6/25

Fingerprint

Countermeasures
Privacy
Mobile Devices
Mobile devices
Authentication
Location Privacy
Automatic Verification
Authentication Protocol
Violate
Network protocols
Trace
Attack
Model

Keywords

  • Authentication
  • Location privacy
  • LTE
  • Security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Hahn, C., Kwon, H., Kim, D., Kang, K., & Hur, J. (2014). A privacy threat in 4th generation mobile telephony and its countermeasure. In S. Cheng, H. Wang, H. Gao, C. Wang, & Z. Cai (Eds.), Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings (pp. 624-635). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8491). Springer Verlag.

A privacy threat in 4th generation mobile telephony and its countermeasure. / Hahn, Changhee; Kwon, Hyunsoo; Kim, Daeyoung; Kang, Kyungtae; Hur, Junbeom.

Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. ed. / Siyao Cheng; Hongzhi Wang; Hong Gao; Chaokun Wang; Zhipeng Cai. Springer Verlag, 2014. p. 624-635 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8491).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hahn, C, Kwon, H, Kim, D, Kang, K & Hur, J 2014, A privacy threat in 4th generation mobile telephony and its countermeasure. in S Cheng, H Wang, H Gao, C Wang & Z Cai (eds), Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8491, Springer Verlag, pp. 624-635, 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014, Harbin, China, 14/6/23.
Hahn C, Kwon H, Kim D, Kang K, Hur J. A privacy threat in 4th generation mobile telephony and its countermeasure. In Cheng S, Wang H, Gao H, Wang C, Cai Z, editors, Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. Springer Verlag. 2014. p. 624-635. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hahn, Changhee ; Kwon, Hyunsoo ; Kim, Daeyoung ; Kang, Kyungtae ; Hur, Junbeom. / A privacy threat in 4th generation mobile telephony and its countermeasure. Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. editor / Siyao Cheng ; Hongzhi Wang ; Hong Gao ; Chaokun Wang ; Zhipeng Cai. Springer Verlag, 2014. pp. 624-635 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{2356e4aa6f80461cbe40fd28499109b9,
title = "A privacy threat in 4th generation mobile telephony and its countermeasure",
abstract = "Mobile telephony device is widely used these days. Protecting subscribers privacy is crucial and can be achieved by evading linkability of subscribers by malicious third parties. In this paper, we analyze the privacy-related security properties of 4th generation mobile telephony, especially LTE. We suggest an attack model which makes it possible to trace a victim’s mobile device so that the attacker can know the presence of the victim’s device in a specific area. Tracking subscribers’ location by unauthorized third parties may violate the privacy of subscribers. To solve this problem, we propose a modified authentication protocol in LTE to preserve location privacy of the device. Considering security level and efficiency, we build our scheme to have low computational overhead and strong secrecy. Also we prove that the proposed scheme satisfies unlinkability property using the automatic verification tool ProVerif.",
keywords = "Authentication, Location privacy, LTE, Security",
author = "Changhee Hahn and Hyunsoo Kwon and Daeyoung Kim and Kyungtae Kang and Junbeom Hur",
year = "2014",
month = "1",
day = "1",
language = "English",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "624--635",
editor = "Siyao Cheng and Hongzhi Wang and Hong Gao and Chaokun Wang and Zhipeng Cai",
booktitle = "Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings",

}

TY - GEN

T1 - A privacy threat in 4th generation mobile telephony and its countermeasure

AU - Hahn, Changhee

AU - Kwon, Hyunsoo

AU - Kim, Daeyoung

AU - Kang, Kyungtae

AU - Hur, Junbeom

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Mobile telephony device is widely used these days. Protecting subscribers privacy is crucial and can be achieved by evading linkability of subscribers by malicious third parties. In this paper, we analyze the privacy-related security properties of 4th generation mobile telephony, especially LTE. We suggest an attack model which makes it possible to trace a victim’s mobile device so that the attacker can know the presence of the victim’s device in a specific area. Tracking subscribers’ location by unauthorized third parties may violate the privacy of subscribers. To solve this problem, we propose a modified authentication protocol in LTE to preserve location privacy of the device. Considering security level and efficiency, we build our scheme to have low computational overhead and strong secrecy. Also we prove that the proposed scheme satisfies unlinkability property using the automatic verification tool ProVerif.

AB - Mobile telephony device is widely used these days. Protecting subscribers privacy is crucial and can be achieved by evading linkability of subscribers by malicious third parties. In this paper, we analyze the privacy-related security properties of 4th generation mobile telephony, especially LTE. We suggest an attack model which makes it possible to trace a victim’s mobile device so that the attacker can know the presence of the victim’s device in a specific area. Tracking subscribers’ location by unauthorized third parties may violate the privacy of subscribers. To solve this problem, we propose a modified authentication protocol in LTE to preserve location privacy of the device. Considering security level and efficiency, we build our scheme to have low computational overhead and strong secrecy. Also we prove that the proposed scheme satisfies unlinkability property using the automatic verification tool ProVerif.

KW - Authentication

KW - Location privacy

KW - LTE

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=84919395351&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84919395351&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84919395351

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 624

EP - 635

BT - Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings

A2 - Cheng, Siyao

A2 - Wang, Hongzhi

A2 - Gao, Hong

A2 - Wang, Chaokun

A2 - Cai, Zhipeng

PB - Springer Verlag

ER -