loading
Papers

Research.Publish.Connect.

Paper

Authors: Haibat Khan and Keith Martin

Affiliation: Information Security Group, Royal Holloway, University of London and U.K.

ISBN: 978-989-758-378-0

Keyword(s): 5G AKA, Mobile Telephony, Privacy, Unlinkability.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Information and Systems Security ; Privacy ; Security and Privacy in Mobile Systems

Abstract: The AKA protocol is the primary mechanism in mobile telephony for establishment of a secure channel between mobile subscribers and their service providers. In addition to the requisite security guarantees, provisioning subscription privacy is an essential requirement for AKA. A recent paper by Borgaonkar et al. has uncovered a new vulnerability in one of the associated mechanisms of the AKA protocol. Based upon this vulnerability, Borgaonkar et al. have presented two privacy attacks; namely, activity monitoring attack and location confidentiality attack. In this paper, we analyze these attacks for their effectiveness, practicability and potency against 5G. Our analysis reveal that the activity monitoring attack is not as effective against 5G as it is against the previous generations (3G/4G). The analysis also bring to light the fact that the location confidentiality attack is a direct extension of an existing privacy vulnerability that affects all generations (including 5G) of mobile telephony in a much severe manner. In this paper we also establish that any countermeasure introduced to fix this existing vulnerability will also render these two new attacks ineffective. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.203.142

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Khan, H. and Martin, K. (2019). On the Efficacy of New Privacy Attacks against 5G AKA.In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT, ISBN 978-989-758-378-0, pages 431-438. DOI: 10.5220/0007919704310438

@conference{secrypt19,
author={Haibat Khan. and Keith M. Martin.},
title={On the Efficacy of New Privacy Attacks against 5G AKA},
booktitle={Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,},
year={2019},
pages={431-438},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007919704310438},
isbn={978-989-758-378-0},
}

TY - CONF

JO - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,
TI - On the Efficacy of New Privacy Attacks against 5G AKA
SN - 978-989-758-378-0
AU - Khan, H.
AU - Martin, K.
PY - 2019
SP - 431
EP - 438
DO - 10.5220/0007919704310438

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.