2017 IEEE Security and Privacy Workshops (SPW) 2017
DOI: 10.1109/spw.2017.14
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Subscriber WiFi Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 23 publications
0
12
0
Order By: Relevance
“…As future work, we would like to study mobile telecommunication protocols that use XOR such as the AKA protocol [3] [1]. Previous analyses of this protocol [5], [49] were not able to model parts of the protocol making use of XOR, therefore providing guarantees that are too weak in our opinion. We would like to investigate the new perspectives opened by our extension in TAMARIN and faithfully analyze the AKA protocol as used in existing mobile networks (i.e., 3G [3] and 4G [1]) as well as in 5G that is being standardized [2].…”
Section: Discussionmentioning
confidence: 99%
“…As future work, we would like to study mobile telecommunication protocols that use XOR such as the AKA protocol [3] [1]. Previous analyses of this protocol [5], [49] were not able to model parts of the protocol making use of XOR, therefore providing guarantees that are too weak in our opinion. We would like to investigate the new perspectives opened by our extension in TAMARIN and faithfully analyze the AKA protocol as used in existing mobile networks (i.e., 3G [3] and 4G [1]) as well as in 5G that is being standardized [2].…”
Section: Discussionmentioning
confidence: 99%
“…While designing the AKA protocol in the year 2000, fake base stations were considered expensive in terms of required financial resources and the attacker's capabilities. However, such fake base stations can now be easily built using e.g., widely available hardware [27] or even WiFi technology [40]. Therefore, in our security analysis, we consider both passive and active attacker models for 3G, 4G, and 5G networks.…”
Section: Threat Modelmentioning
confidence: 99%
“…Related Work. Such techniques have already been leveraged in the past (notably by 3GPP) to formally verify the AKA protocol to some extent (e.g., formal analysis in enhanced BAN Logic and TLA [2], in the tool ProVerif [16,40]). More recently, an in-depth formal analysis of 5G AKA [19] has been conducted using the tool Tamarin [38].…”
Section: Formal Verificationmentioning
confidence: 99%
“…This modelling and analysis uses ProVerif, formally verifying the proposed solutions achieving unlinkability and anonymity. O'Hanlon et al [23] consider the interaction between 4G's authentication protocols and operator-backed WiFi services; they detail how the interaction between these can enable serious privacy violations, as well as their experiences reporting the discovered issues to the relevant stakeholders. Hussain et al [18] combine symbolic model checking with cryptographic protocol verification for 4G's attach, detach, and paging procedures, discovering 10 new attacks, including an authentication relay attack, allowing an adversary to spoof the location of a legitimate user.…”
Section: Introductionmentioning
confidence: 99%