Pseudonym Mutable Based Privacy for 5G User Identity

被引:7
作者
Saeed, Rashid A. [1 ]
Saeed, Mamoon M. [2 ,3 ]
Mokhtar, Rania A. [1 ]
Alhumyani, Hesham [1 ]
Abdel-Khalek, S. [4 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Comp Engn, POB 11099, At Taif 21944, Saudi Arabia
[2] Alzaiem Alazhari Univ, Fac Engn, Dept Elect Engn, Khartoum 11111, Sudan
[3] Univ Modern Sci UMS, Fac Engn, Dept Commun & Elect Engn, Sanaa 16784, Yemen
[4] Taif Univ, Coll Sci, Dept Math, POB 11099, At Taif 21944, Saudi Arabia
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2021年 / 39卷 / 01期
关键词
5G; MMSI; IMSI; AKA; privacy; user identity; ELLIPTIC-CURVE CRYPTOGRAPHY; AUTHENTICATION; ENCRYPTION; SECURE;
D O I
10.32604/csse.2021.015593
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy, identity preserving and integrity have become key problems for telecommunication standards. Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed. As Internet of Things (IoT) and long-term evolution for machine type (LTE-m) are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase. For all the above issues standards' bodies should ensure users' identity and privacy in order to gain the trust of service providers and industries. Against such threats, 5G specifications require a rigid and robust privacy procedure. Many research studies have addressed user privacy in 5G networks. This paper proposes a method to enhance user identity privacy in 5G systems through a scheme to protect the international mobile subscriber identity (IMSI) using a mutable mobile subscriber identity (MMSI) that changes randomly and avoids the exchange of IMSIs. It maintains authentication and key agreement (AKA) structure compatibility with previous mobile generations and improves user equipment (UE) synchronization with home networks. The proposed algorithm adds no computation overhead to UE or the network except a small amount in the home subscriber server (HSS). The proposed pseudonym mutable uses the XOR function to send the MMSI from the HSS to the UE which is reducing the encryption overhead significantly. The proposed solution was verified by ProVerif.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [31] A Systematic Analysis of 5G Networks With a Focus on 5G Core Security
    Tang, Qiang
    Ermis, Orhan
    Nguyen, Cu D.
    De Oliveira, Alexandre
    Hirtzig, Alain
    IEEE ACCESS, 2022, 10 : 18298 - 18319
  • [32] A Privacy Preserving Model for Fog-enabled MCC systems using 5G Connection
    Baniata., Hamza
    Almobaideen, Wesam
    Kertesz, Attila
    2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2020, : 223 - 230
  • [33] Location-Privacy-Preserving Technique for 5G mmWave Devices
    Jimenez Checa, Javier
    Tomasin, Stefano
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (12) : 2692 - 2695
  • [34] Efficient privacy protection authentication protocol for vehicle network in 5G
    Zhang, Guixian
    Zhao, Xiaoyu
    Chen, Menglu
    Ma, Shuyi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022,
  • [35] Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Argyriou, Antonios
    Kosmanos, Dimitrios
    Janicke, Helge
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 101 : 55 - 82
  • [36] Proof of Pseudonym: Blockchain-Based Privacy Preserving Protocol for Intelligent Transport System
    Johar, S.
    Ahmad, N.
    Durrani, A.
    Ali, G.
    IEEE ACCESS, 2021, 9 : 163625 - 163639
  • [37] SDN-Based Secure and Privacy-Preserving Scheme for Vehicular Networks: A 5G Perspective
    Garg, Sahil
    Kaur, Kuljeet
    Kaddoum, Georges
    Ahmed, Syed Hassan
    Jayakody, Dushantha Nalin K.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (09) : 8421 - 8434
  • [38] Security for 5G and Beyond
    Ahmad, Ijaz
    Shahabuddin, Shahriar
    Kumar, Tanesh
    Okwuibe, Jude
    Gurtov, Andrei
    Ylianttila, Mika
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) : 3682 - 3722
  • [39] XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets
    Wang, Mingjun
    Zhao, Dongsheng
    Yan, Zheng
    Wang, Haiguang
    Li, Tieyan
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (07) : 5962 - 5976
  • [40] Secure and Efficient Privacy-Preserving Authentication Scheme for 5G Software Defined Vehicular Networks
    Huang, Jiaqi
    Qian, Yi
    Hu, Rose Qingyang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 8542 - 8554