2017
DOI: 10.5815/ijcnis.2017.01.07
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of User Identity Privacy in LTE and Proposed Solution

Abstract: Abstract-The mechanisms adopted by cellular technologies for user identification allow an adversary to collect information about individuals and track their movements within the network; and thus exposing privacy of the users to unknown risks. Efforts have been made toward enhancing privacy preserving capabilities in cellular technologies, culminating in Long Term Evolution LTE technology. LTE security architecture is substantially enhanced comparing with its predecessors 2G and 3G; however, LTE does not elimi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…According to [20], identity management and protection of user privacy allow us to improve the security issues. Identity management improves the algorithms used in the computer security.…”
Section: Related Workmentioning
confidence: 99%
“…According to [20], identity management and protection of user privacy allow us to improve the security issues. Identity management improves the algorithms used in the computer security.…”
Section: Related Workmentioning
confidence: 99%
“…The BVR and KM15 schemes describe how pseudonyms can be introduced in the legacy networks. Also other proposals [3,9,10] were published in 2016 and 2017. All these proposals use essentially the same idea of using frequently changing pseudonyms recognized by the HN.…”
Section: Related Workmentioning
confidence: 99%
“…A potentially simple and backward compatible solution approach is to use frequently-changing temporary identities for mobile users [7,8,3,9,10]. The idea is that, if a UE communicates with an active IMSI catcher, it reveals only its temporary identity.…”
Section: Introductionmentioning
confidence: 99%
“…Another study investigated the IMSI encryption in which the IMSI-NC and CC data have defined and publicized the hidden identifier [15]. However, the routing requests for validation data between HN and visited network as well as the request for other IMSI data to be publicized within the HN are discussed here.…”
mentioning
confidence: 99%