Access the full text.
Sign up today, get DeepDyve free for 14 days.
Hannes Federrath, Anja Jerichow, Dogan Kesdogan, A. Pfitzmann, Dirk Trossen (1997)
Minimizing the average cost of paging on the air interface-an approach considering privacy1997 IEEE 47th Vehicular Technology Conference. Technology in Motion, 2
Byeongdo Hong, Sangwook Bae, Yongdae Kim (2018)
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
Tim Dittler, Florian Tschorsch, S. Dietzel, B. Scheuermann (2016)
ANOTEL: Cellular Networks with Location Privacy2016 IEEE 41st Conference on Local Computer Networks (LCN)
Syed Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, E. Bertino (2019)
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel InformationProceedings 2019 Network and Distributed System Security Symposium
R. Rivest, A. Shamir, L. Adleman (1978)
A method for obtaining digital signatures and public-key cryptosystemsCommun. ACM, 21
Katherine Ye, M. Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, A. Appel (2017)
Verified Correctness and Security of mbedTLS HMAC-DRBGProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
A. Perrig, R. Canetti, J. Tygar, D. Song (2000)
Efficient authentication and signing of multicast streams over lossy channelsProceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
(2012)
NIST Special Publication 800-90A: Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Xiaomeng Chen, Jiayi Meng, Y. Hu, M. Gupta, R. Hasholzner, Venkatesan Ekambaram, Ashish Singh, S. Srikanteswara (2017)
A Fine-grained Event-based Modem Power Model for Enabling In-depth Modem Energy Drain AnalysisProceedings of the ACM on Measurement and Analysis of Computing Systems, 1
Tuan Ta, J. Baras (2012)
Enhancing Privacy in LTE Paging System Using Physical Layer Identification
H. Nicanfar, Javad Hajipour, F. Agharebparast, Peyman TalebiFard, Victor Leung (2013)
Privacy-preserving handover mechanism in 4G2013 IEEE Conference on Communications and Network Security (CNS)
A. Huang (2003)
Hacking the Xbox: An Introduction to Reverse Engineering
Public key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ecdsa). ANSI X9
A. Menezes, P. Oorschot, S. Vanstone (2018)
Handbook of Applied Cryptography
Syed Hussain, Omar Chowdhury, Shagufta Mehnaz, E. Bertino (2018)
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
Denis Kune, John Kölndorfer, Nicholas Hopper, Yongdae Kim (2011)
Location Leaks on the GSM Air Interface
User Equipment (UE) procedures in idle mode and in RRC Inactive state
Denis Kune, John Kölndorfer, Nicholas Hopper, Yongdae Kim (2012)
Location leaks over the GSM air interface
Ravishankar Borgaonkar (2015)
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication SystemsArXiv, abs/1510.07563
Non-Access-Stratum (NAS) protocol for 5G System (5GS)
A. Perrig, R. Canetti, J. Tygar, D. Song (2002)
The TESLA Broadcast Authentication Protocol, 5
AbstractThis paper focuses on protecting the cellular paging protocol — which balances between the quality-of-service and battery consumption of a device — against security and privacy attacks. Attacks against this protocol can have severe repercussions, for instance, allowing attacker to infer a victim’s location, leak a victim’s IMSI, and inject fabricated emergency alerts. To secure the protocol, we first identify the underlying design weaknesses enabling such attacks and then propose efficient and backward-compatible approaches to address these weaknesses. We also demonstrate the deployment feasibility of our enhanced paging protocol by implementing it on an open-source cellular protocol library and commodity hardware. Our evaluation demonstrates that the enhanced protocol can thwart attacks without incurring substantial overhead.
Proceedings on Privacy Enhancing Technologies – de Gruyter
Published: Jan 1, 2020
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.