2014
DOI: 10.1007/s10207-014-0231-3
|View full text |Cite
|
Sign up to set email alerts
|

Anonymity guarantees of the UMTS/LTE authentication and connection protocol

Abstract: Abstract. The UMTS/LTE protocol for mobile phone networks has been designed to offer a limited form of anonymity for mobile phone users. In this paper we quantify precisely what this limited form of anonymity actually provides via a formal security model. The model considers an execution where the home and roaming network providers are considered as one entity. We consider two forms of anonymity, one where the mobile stations under attack are statically selected before the execution, and a second where the adv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…However, we discovered a linkability attack against the protocol, which falsifies the authors claim. In [21], the authors study the 4G-AKA protocol without its first message. They show that this reduced protocol satisfies a form of anonymity (which is weaker than unlinkability).…”
Section: Introductionmentioning
confidence: 99%
“…However, we discovered a linkability attack against the protocol, which falsifies the authors claim. In [21], the authors study the 4G-AKA protocol without its first message. They show that this reduced protocol satisfies a form of anonymity (which is weaker than unlinkability).…”
Section: Introductionmentioning
confidence: 99%
“…Lee et al [18] consider the untraceability of the 4G LTE (Long-term Evolution) protocol (similar to AKA, but with a different identifier-and key-management), but do not focus on the handshake itself. Their main result is that in the absence of server corruptions, LTE is (weakly) untraceable against an active MiM adversary.…”
Section: Introductionmentioning
confidence: 99%
“…Finally observe that the security properties of the AKA protocol itself have been proven to hold [4] -the problems we consider here arise from exchanges not actually part of the AKA protocol. This makes clear the necessity to consider the entirety of a system if robust results about security and privacy are to be achieved.…”
Section: The Aka Protocolmentioning
confidence: 99%