2018
DOI: 10.1007/978-3-030-04762-7_7
|View full text |Cite
|
Sign up to set email alerts
|

Identity Confidentiality in 5G Mobile Telephony Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 7 publications
0
14
0
Order By: Relevance
“…These kinds of attacks can be used to leak location by listening to the paging channel and stress testing the network. Our work contributes to the growing body of literature on 5G security, which has used formal methods to audit the new security protocols [11,22,38] and proposed changes to improve security [39].…”
Section: Related Workmentioning
confidence: 99%
“…These kinds of attacks can be used to leak location by listening to the paging channel and stress testing the network. Our work contributes to the growing body of literature on 5G security, which has used formal methods to audit the new security protocols [11,22,38] and proposed changes to improve security [39].…”
Section: Related Workmentioning
confidence: 99%
“…To identify the 5G user in the LoRaWAN infrastructure, such 5G SUPI/IMSI identifier needs to be transmitted instead of the LoRaWAN identifier. It can involve a security and privacy risk [30] since the SUPI/IMSI is recommended to be encrypted in 5G even when it is not done in 4G and it will be exchanged in LoRaWAN network inside of the LoRaWAN JoinRequest message without encryption. To cope with this issue, our proposal encrypts the 5G SUPI/IMSI identifier during the LoRaWAN packets transmissions using the 5G shared key (K i ).…”
Section: B Subscription Permanent Identifier (Supi) Protectionmentioning
confidence: 99%
“…Furthermore, ECIES-based authentication is vulnerable to specific subscription permanent identifier (SUPI) attacks and bidding-down attacks. The public key of the HN needs to be quickly updated when the malware attempts to recover the private key of the HN; therefore, it needs further refinement and development [41].…”
Section: A Cyber Security For Lte-m and Nb-iotmentioning
confidence: 99%