Pseudonym Mutable Based Privacy for 5G User Identity

被引:7
|
作者
Saeed, Rashid A. [1 ]
Saeed, Mamoon M. [2 ,3 ]
Mokhtar, Rania A. [1 ]
Alhumyani, Hesham [1 ]
Abdel-Khalek, S. [4 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Comp Engn, POB 11099, At Taif 21944, Saudi Arabia
[2] Alzaiem Alazhari Univ, Fac Engn, Dept Elect Engn, Khartoum 11111, Sudan
[3] Univ Modern Sci UMS, Fac Engn, Dept Commun & Elect Engn, Sanaa 16784, Yemen
[4] Taif Univ, Coll Sci, Dept Math, POB 11099, At Taif 21944, Saudi Arabia
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2021年 / 39卷 / 01期
关键词
5G; MMSI; IMSI; AKA; privacy; user identity; ELLIPTIC-CURVE CRYPTOGRAPHY; AUTHENTICATION; ENCRYPTION; SECURE;
D O I
10.32604/csse.2021.015593
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy, identity preserving and integrity have become key problems for telecommunication standards. Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed. As Internet of Things (IoT) and long-term evolution for machine type (LTE-m) are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase. For all the above issues standards' bodies should ensure users' identity and privacy in order to gain the trust of service providers and industries. Against such threats, 5G specifications require a rigid and robust privacy procedure. Many research studies have addressed user privacy in 5G networks. This paper proposes a method to enhance user identity privacy in 5G systems through a scheme to protect the international mobile subscriber identity (IMSI) using a mutable mobile subscriber identity (MMSI) that changes randomly and avoids the exchange of IMSIs. It maintains authentication and key agreement (AKA) structure compatibility with previous mobile generations and improves user equipment (UE) synchronization with home networks. The proposed algorithm adds no computation overhead to UE or the network except a small amount in the home subscriber server (HSS). The proposed pseudonym mutable uses the XOR function to send the MMSI from the HSS to the UE which is reducing the encryption overhead significantly. The proposed solution was verified by ProVerif.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [1] Preserving privacy of user identity based on pseudonym variable in 5G
    Saeed, Mamoon M.
    Hasan, Mohammad Kamrul
    Hassan, Rosilah
    Mokhtar, Rania
    Saeed, Rashid A.
    Saeid, Elsadig
    Gupta, Manoj
    Computers, Materials and Continua, 2022, 70 (03): : 5551 - 5567
  • [2] Preserving Privacy of User Identity Based on Pseudonym Variable in 5G
    Saeed, Mamoon M.
    Hasan, Mohammad Kamrul
    Hassan, Rosilah
    Mokhtar, Rania
    Saeed, Rashid A.
    Saeid, Elsadig
    Gupta, Manoj
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 5551 - 5568
  • [3] 5G Visions of User Privacy
    Sorensen, Lene Tolstrup
    Khajuria, Samant
    Skouby, Knud Erik
    2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,
  • [4] RETRACTED: A Novel Variable Pseudonym Scheme for Preserving Privacy User Location in 5G Networks (Retracted Article)
    Saeed, Mamoon M.
    Saeed, Rashid A.
    Mokhtar, Rania A.
    Alhumyani, Hesham
    Ali, Elmustafa Sayed
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] A Blockchain-Based User Identity Authentication Method for 5G
    Tu, Zhe
    Zhou, Huachun
    Li, Kun
    Song, Haoxiang
    Wang, Weilin
    MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 335 - 351
  • [6] Defeating the Downgrade Attack on Identity Privacy in 5G
    Khan, Mohsin
    Ginzboorg, Philip
    Jarvinen, Kimmo
    Niemi, Valtteri
    SECURITY STANDARDISATION RESEARCH (SSR 2018), 2018, 11322 : 95 - 119
  • [7] A comprehensive review on the users' identity privacy for 5G networks
    Saeed, Mamoon M.
    Hasan, Mohammad Kamrul
    Obaid, Ahmed J.
    Saeed, Rashid A.
    Mokhtar, Rania A.
    Ali, Elmustafa Sayed
    Akhtaruzzaman, Md
    Amanlou, Sanaz
    Hossain, A. K. M. Zakir
    IET COMMUNICATIONS, 2022, 16 (05) : 384 - 399
  • [8] Preserving Privacy in the Age of Wireless Evolution: Differential Privacy in 5G, Beyond 5G, and 6G
    Sanon, Sogo Pierre
    Lipps, Christoph
    Schotten, Hans D.
    2023 INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATIONS AND NETWORKS, FCN, 2023,
  • [9] Privacy Preserving AKMA in 5G
    Khan, Mohsin
    Ginzboorg, Philip
    Niemi, Valtteri
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), 2019, : 45 - 56
  • [10] Privacy and Economics in a 5G Environment
    Samant Khajuria
    Knud Erik Skouby
    Wireless Personal Communications, 2017, 95 : 145 - 154