Cellular networks connect nearly every human on the planet; they consequently have visibility into location data and voice, SMS, and data contacts and communications. Such near-universal visibility represents a significant threat to the privacy of mobile subscribers. In 5G networks, end-user mobile device manufacturers assign a Permanent Equipment Identifier (PEI) to every new device. Mobile operators legitimately use the PEI to blocklist stolen devices from the network to discourage device theft, but the static PEI also provides a mechanism to uniquely identify and track subscribers. Advertisers and data brokers have also historically abused the PEI for data fusion of location and analytics data, including private data sold by cellular providers.In this paper, we present a protocol that allows mobile devices to prove that they are not in the blocklist without revealing their PEI to any entity on the network. Thus, we maintain the primary purpose of the PEI while preventing potential privacy violations. We describe a provably-secure anonymous proof of blocklist nonmembership for cellular network, based on the RSA accumulators and zero-knowledge proofs introduced by Camenisch and Lysyanskaya (Crypto'02) and expanded upon by Li, Li and Xue (ACNS'07). We show experimentally that this approach is viable for cellular networks: a phone can create a blocklist non-membership proof in only 3432 milliseconds of online computation, and the network can verify the proof in less than one second on average. In total this adds fewer than 4.5 seconds to the rare network attach process. This work shows that PEIs can be attested anonymously in 5G and future network generations, and it paves the way for additional advances toward a cellular network with guaranteed privacy.
CCS Concepts• Security and privacy ! Cryptography; Mobile and wireless security; • Networks ! Mobile networks.
With the rapid advance of mobile computing, high speed Wireless Local Area Networks (LAN) attracts a lot of research interests in recent years. A new international stander IEEE 802.11 on wireless LAN has been established. Its physical transmission is realized by either spread spectrum communication or non-directive infrared. The medium access control of IEEE 802.11 is using carrier sense multiple access with collision avoidance (CSMA/CA) as the basic level access. Continuing from the study of, we shall analyze IEEE 802.11 CSMA/CA performance with or without RTS/CTS in this paper. We have improved the simulation by including RTS/CTS exchanges, which is part of the CSMA/CA protocol. Using this methodology, we hoped to increase the number of successful transmissions and decrease the number of collisions within the WLAN. This particular aspect of the simulation is demonstrated in the Analysis section of this work. Additionally, the simulation makes sure that once an RTS/CTS handshake is completed; all other nodes not included in the data exchange remain silent. This is done to prevent nodes from getting into a continuous cycle of RTS/CTS exchanges.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.