Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382221
|View full text |Cite
|
Sign up to set email alerts
|

New privacy issues in mobile telephony

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
148
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 127 publications
(148 citation statements)
references
References 10 publications
0
148
0
Order By: Relevance
“…An active adversary can intentionally simulate one of these scenarios to force a UE to transfer its IMSI in cleartext. Moreover, several further scenarios have been identified [5,9,27] in which use of the TMSI fails to protect user identity confidentiality. In the remainder of this paper, we propose a novel approach to improving user privacy in the air interface, which requires no modifications to the existing deployed mobile telecommunications infrastructures, including the phones.…”
Section: User Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…An active adversary can intentionally simulate one of these scenarios to force a UE to transfer its IMSI in cleartext. Moreover, several further scenarios have been identified [5,9,27] in which use of the TMSI fails to protect user identity confidentiality. In the remainder of this paper, we propose a novel approach to improving user privacy in the air interface, which requires no modifications to the existing deployed mobile telecommunications infrastructures, including the phones.…”
Section: User Privacymentioning
confidence: 99%
“…when registering with the network after switching on a phone. This user privacy issue has been discussed extensively in the literature [5,6,7,20,21,27,28], and many modifications to existing protocols have been proposed to avoid the problem [5,7,19,28]. All these proposals involve making major modifications to the air interface protocol, which would require changes to the operation of all the serving networks as well as all the deployed phones.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Arapinis et al [7] described two vulnerabilities related to anonymity. In the first attack, called an IMSI paging attack, the adversary attacks the paging procedure used to locate the phone.…”
Section: Introductionmentioning
confidence: 99%
“…In the second attack in [7], called a AKA protocol linkability attack, an active adversary which has previously intercepted an authentication request message can replay the message and check the presence of a specific phone in a particular area. Because the victims mobile phone will return a synchronization failure message after receipt of the replayed authentication request message, the adversary can trace the movements of the victim mobile phone.…”
Section: Introductionmentioning
confidence: 99%