Mamoon M. Saeed, R. Saeed, R. Mokhtar, H. Alhumyani, Elmustafa Syed Ali
{"title":"通过使用可变假名保护5G中的隐私位置","authors":"Mamoon M. Saeed, R. Saeed, R. Mokhtar, H. Alhumyani, Elmustafa Syed Ali","doi":"10.14738/TNC.85.9571","DOIUrl":null,"url":null,"abstract":"User privacy is one of the most issues addressed extensively in mobile communications evolutions, research literature, and standardization. Location privacy is a key parameter and crucial aspect for user privacy, where most of the tracking, Unsolicited advertising, malicious activities, and location-based terrorism attacks are depending on the location of the victims. For preserving location privacy, various methods in previous mobile networks use a pseudonym instead of permanent identity i.e. Cell Radio Network Temporary Identifiers (C-RNTI), However, these methods based on C-RNII have been proofed that faces many vulnerable due to the clear text used for C-RNII exchange. A man-in-the-middle attack can easily trace users and collect information. The main objective of this paper is to propose a new location privacy algorithm that can greatly enhance the capabilities of the 5G architecture. The proposed algorithm introduces a novel variable pseudonym (V-RNTI) as an identifier for the user radio channel. Also, it provides an enhanced pseudonyms allocation procedure for identification. A new procedure that enabling UE to use different values for V-RNTI changed frequently using agreed equations to generate the values of the identifier. The proposed scheme is compatible with 3GPP standards architecture, where minor modifications/upgrades are needed for UEs eNB. Specifically, we build our model of the 5G V-RNTI authentication protocol and perform an automated security verification tool analysis of the protocol model by using the ProVerif model checker. Our analysis results show that the proposed procedure is working without flaws.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Preserving Privacy Location in 5G by Using Variable Pseudonym\",\"authors\":\"Mamoon M. Saeed, R. Saeed, R. Mokhtar, H. Alhumyani, Elmustafa Syed Ali\",\"doi\":\"10.14738/TNC.85.9571\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"User privacy is one of the most issues addressed extensively in mobile communications evolutions, research literature, and standardization. Location privacy is a key parameter and crucial aspect for user privacy, where most of the tracking, Unsolicited advertising, malicious activities, and location-based terrorism attacks are depending on the location of the victims. For preserving location privacy, various methods in previous mobile networks use a pseudonym instead of permanent identity i.e. Cell Radio Network Temporary Identifiers (C-RNTI), However, these methods based on C-RNII have been proofed that faces many vulnerable due to the clear text used for C-RNII exchange. A man-in-the-middle attack can easily trace users and collect information. The main objective of this paper is to propose a new location privacy algorithm that can greatly enhance the capabilities of the 5G architecture. The proposed algorithm introduces a novel variable pseudonym (V-RNTI) as an identifier for the user radio channel. Also, it provides an enhanced pseudonyms allocation procedure for identification. A new procedure that enabling UE to use different values for V-RNTI changed frequently using agreed equations to generate the values of the identifier. The proposed scheme is compatible with 3GPP standards architecture, where minor modifications/upgrades are needed for UEs eNB. Specifically, we build our model of the 5G V-RNTI authentication protocol and perform an automated security verification tool analysis of the protocol model by using the ProVerif model checker. Our analysis results show that the proposed procedure is working without flaws.\",\"PeriodicalId\":448328,\"journal\":{\"name\":\"Transactions on Networks and Communications\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transactions on Networks and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14738/TNC.85.9571\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Networks and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14738/TNC.85.9571","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Preserving Privacy Location in 5G by Using Variable Pseudonym
User privacy is one of the most issues addressed extensively in mobile communications evolutions, research literature, and standardization. Location privacy is a key parameter and crucial aspect for user privacy, where most of the tracking, Unsolicited advertising, malicious activities, and location-based terrorism attacks are depending on the location of the victims. For preserving location privacy, various methods in previous mobile networks use a pseudonym instead of permanent identity i.e. Cell Radio Network Temporary Identifiers (C-RNTI), However, these methods based on C-RNII have been proofed that faces many vulnerable due to the clear text used for C-RNII exchange. A man-in-the-middle attack can easily trace users and collect information. The main objective of this paper is to propose a new location privacy algorithm that can greatly enhance the capabilities of the 5G architecture. The proposed algorithm introduces a novel variable pseudonym (V-RNTI) as an identifier for the user radio channel. Also, it provides an enhanced pseudonyms allocation procedure for identification. A new procedure that enabling UE to use different values for V-RNTI changed frequently using agreed equations to generate the values of the identifier. The proposed scheme is compatible with 3GPP standards architecture, where minor modifications/upgrades are needed for UEs eNB. Specifically, we build our model of the 5G V-RNTI authentication protocol and perform an automated security verification tool analysis of the protocol model by using the ProVerif model checker. Our analysis results show that the proposed procedure is working without flaws.