Pseudonym Mutable Based Privacy for 5G User Identity

被引:7
作者
Saeed, Rashid A. [1 ]
Saeed, Mamoon M. [2 ,3 ]
Mokhtar, Rania A. [1 ]
Alhumyani, Hesham [1 ]
Abdel-Khalek, S. [4 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Comp Engn, POB 11099, At Taif 21944, Saudi Arabia
[2] Alzaiem Alazhari Univ, Fac Engn, Dept Elect Engn, Khartoum 11111, Sudan
[3] Univ Modern Sci UMS, Fac Engn, Dept Commun & Elect Engn, Sanaa 16784, Yemen
[4] Taif Univ, Coll Sci, Dept Math, POB 11099, At Taif 21944, Saudi Arabia
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2021年 / 39卷 / 01期
关键词
5G; MMSI; IMSI; AKA; privacy; user identity; ELLIPTIC-CURVE CRYPTOGRAPHY; AUTHENTICATION; ENCRYPTION; SECURE;
D O I
10.32604/csse.2021.015593
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy, identity preserving and integrity have become key problems for telecommunication standards. Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed. As Internet of Things (IoT) and long-term evolution for machine type (LTE-m) are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase. For all the above issues standards' bodies should ensure users' identity and privacy in order to gain the trust of service providers and industries. Against such threats, 5G specifications require a rigid and robust privacy procedure. Many research studies have addressed user privacy in 5G networks. This paper proposes a method to enhance user identity privacy in 5G systems through a scheme to protect the international mobile subscriber identity (IMSI) using a mutable mobile subscriber identity (MMSI) that changes randomly and avoids the exchange of IMSIs. It maintains authentication and key agreement (AKA) structure compatibility with previous mobile generations and improves user equipment (UE) synchronization with home networks. The proposed algorithm adds no computation overhead to UE or the network except a small amount in the home subscriber server (HSS). The proposed pseudonym mutable uses the XOR function to send the MMSI from the HSS to the UE which is reducing the encryption overhead significantly. The proposed solution was verified by ProVerif.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [41] DPSP: A Dynamic Pseudonym Swap Program Based Location Privacy Protection Algorithm for Internet of Vehicles
    Zhang, Wenbo
    Guo, Zhiru
    Han, Guangjie
    Zhu, Hongbo
    Liu, Qi
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05): : 4525 - 4535
  • [42] Local Trajectory Privacy Protection in 5G Enabled Industrial Intelligent Logistics
    Yang, Zhigang
    Wang, Ruyan
    Wu, Dapeng
    Wang, Honggang
    Song, Haina
    Ma, Xinqiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) : 2868 - 2876
  • [43] Strongly Secure Identity-Based Authenticated Key Agreement Protocol With Identity Concealment for Secure Communication in 5G Network
    Lian, Huanhuan
    Kang, Burong
    Yang, Libao
    IEEE ACCESS, 2024, 12 : 98611 - 98622
  • [44] SECURITY AND PRIVACY FOR EDGE INTELLIGENCE IN 5G AND BEYOND NETWORKS: CHALLENGES AND SOLUTIONS
    Li, Yannan
    Yu, Yong
    Susilo, Willy
    Hong, Zhiyong
    Guizani, Mohsen
    IEEE WIRELESS COMMUNICATIONS, 2021, 28 (02) : 63 - 69
  • [45] Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives
    Zhang, Junsong
    He, Lei
    Zhang, Qikun
    Gan, Yong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (11): : 5654 - 5673
  • [46] A Fast Physical Layer Security-Based Location Privacy Parameter Recommendation Algorithm in 5G IoT
    Zhao, Hua
    Xu, Mingyan
    Zhong, Zhou
    Wang, Ding
    CHINA COMMUNICATIONS, 2021, 18 (08) : 75 - 84
  • [47] Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks
    Yazdinejad, Abbas
    Parizi, Reza M.
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1120 - 1132
  • [48] CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets
    Cao, Jin
    Ma, Maode
    Fu, Yulong
    Li, Hui
    Zhang, Yinghui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1182 - 1195
  • [49] Trust in 5G and Beyond Networks
    Benzaid, Chafika
    Taleb, Tarik
    Farooqi, Muhammad Zubair
    IEEE NETWORK, 2021, 35 (03): : 212 - 222
  • [50] An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
    Sun, Jinyuan
    Zhang, Chi
    Zhang, Yanchao
    Fang, Yuguang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (09) : 1227 - 1239