Defeating the Downgrade Attack on Identity Privacy in 5G

被引:13
作者
Khan, Mohsin [1 ,2 ]
Ginzboorg, Philip [3 ,4 ]
Jarvinen, Kimmo [1 ,2 ]
Niemi, Valtteri [1 ,2 ]
机构
[1] Univ Helsinki, Helsinki, Finland
[2] Helsinki Inst Informat Technol, Helsinki, Finland
[3] Huawei Technol, Helsinki, Finland
[4] Aalto Univ, Espoo, Finland
来源
SECURITY STANDARDISATION RESEARCH (SSR 2018) | 2018年 / 11322卷
关键词
3GPP; IMSI catchers; Pseudonym; Identity privacy 5G;
D O I
10.1007/978-3-030-04762-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
3GPP Release 15, the first 5G standard, includes protection of user identity privacy against IMSI catchers. These protection mechanisms are based on public key encryption. Despite this protection, IMSI catching is still possible in LTE networks which opens the possibility of a downgrade attack on user identity privacy, where a fake LTE base station obtains the identity of a 5G user equipment. We propose (i) to use an existing pseudonym-based solution to protect user identity privacy of 5G user equipment against IMSI catchers in LTE and (ii) to include a mechanism for updating LTE pseudonyms in the public key encryption based 5G identity privacy procedure. The latter helps to recover from a loss of synchronization of LTE pseudonyms. Using this mechanism, pseudonyms in the user equipment and home network are automatically synchronized when the user equipment connects to 5G. Our mechanisms utilize existing LTE and 3GPP Release 15 messages and require modifications only in the user equipment and home network in order to provide identity privacy. Additionally, lawful interception requires minor patching in the serving network.
引用
收藏
页码:95 / 119
页数:25
相关论文
共 33 条
[11]  
[Anonymous], 2014, ACSAC 14
[12]  
[Anonymous], 2018, 33106 3GPP TS 33106 3GPP TS
[13]  
[Anonymous], 2012, 1804 NIST FIPS PUB
[14]  
Asokan N, 1994, 1 WORKSH MOB COMP SY 1 WORKSH MOB COMP SY
[15]  
Bernstein DJ, 2006, LECT NOTES COMPUT SC, V3958, P207
[16]  
Certicom Research, 2010, SEC 2 REC ELL CURV D
[17]  
Ginzboorg P., 2016, P 9 EAI INT C MOB MU P 9 EAI INT C MOB MU
[18]  
Herzberg A., 1994, 1994 1 WORKSH MOB CO 1994 1 WORKSH MOB CO
[19]  
Interactive digital media GmbH, INTERACTIVE DIGITAL INTERACTIVE DIGITAL
[20]  
Khan Mohsin, 2017, Information Systems Security. 13th International Conference, ICISS 2017. Proceedings: LNCS 10717, P347, DOI 10.1007/978-3-319-72598-7_22