A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
PAL - privacy augmented LTE
2013
Proceeding of the tenth ACM international workshop on Vehicular inter-networking, systems, and applications - VANET '13
We propose a novel privacy-preserving scheme for LTE in vehicular communication. ...
We show that our scheme improves the privacy of subscribers without loss of functionality in terms of all relevant use cases for vehicular communication over LTE. ...
Thus, MNOs can fully track UEs using IMEIs, resulting in detailed location profiles and a violation of location privacy. • In an LTE mobile network, mobile nodes usually receive an IP address when turned ...
doi:10.1145/2482967.2482975
dblp:conf/mobisys/AngermeierKS13
fatcat:b52ptpm3xvdslbphoc6usivc64
LTE Phone Number Catcher: A Practical Attack against Mobile Privacy
2019
Security and Communication Networks
This paper intends to verify that mobile privacy is also quite vulnerable even in LTE networks as long as the legacy GSM still exists. ...
Hence, we hope the operators worldwide can completely disable the GSM mobile networks in the areas covered by 3G and 4G networks as soon as possible to reduce the possibility of attacks on higher-generation ...
and Communication Networks can precisely locate an LTE device by using an LTE rogue station [17] . ...
doi:10.1155/2019/7425235
fatcat:yburh73j4jhera5dgicir76tiy
Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging
[article]
2018
arXiv
pre-print
Moreover, we present a general experimental method to test privacy exposure by LTE paging messages, and we conduct a case study on three different LTE mobile operators. ...
Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. ...
This paper focuses on privacy exposure caused by LTE paging, and extends the existing work in the sense that it describes in detail an experimental method to test the privacy of subscribers in LTE networks ...
arXiv:1807.11350v1
fatcat:kfu2jaomqjhh3bqlkqzj7xxy5m
Analysis of User Identity Privacy in LTE and Proposed Solution
2017
International Journal of Computer Network and Information Security
The scheme provides secure and effective identity management in respect to the protection of user privacy in LTE. ...
This paper includes an evaluation of LTE security architecture and proposes a security solution for the enhancement of user identity privacy in LTE. ...
privacy of the users in LTE network. ...
doi:10.5815/ijcnis.2017.01.07
fatcat:x5puvznecjeh7eefpfzrikrmlm
Wi Not Calling
2018
Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC '18
from LTE to Wi-Fi networks. ...
Wi-Fi Calling, which is used to make and receive calls over the Wi-Fi network, has been widely adopted and deployed to extend the coverage and increase the capacity in weak signal areas by moving traffic ...
, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of United States Government or any agency thereof. ...
doi:10.1145/3274694.3274753
dblp:conf/acsac/BaekKC0SDA18
fatcat:trxtoixqgfhjdjxxogfp5mqxee
Location-assured, multifactor authentication on smartphones via LTE communication
2013
Mobile Multimedia/Image Processing, Security, and Applications 2013
This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location ...
The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement ...
This makes LTE versatile in establishing the location of any user's Smartphone over any network via LPP on the Control Plane (commonly used by emergency services as only way in 2G/3G networks) and via ...
doi:10.1117/12.2018027
fatcat:55haczoz7bc5dc64xg62npjvfi
PA-AKA: Privacy-Aware and Lightweight Authentication Scheme for Long Term Evolution (LTE)
2019
Communications on Applied Electronics
Several authentication schemes had been proposed for LTE to ensure confidentiality between the authorised users and the network. ...
In this work an improved privacy aware authentication scheme is proposed, which does not only preserve the subscribers' privacy during initial connection but allows MME to generate and map subscriber pseudonym ...
In the scheme, a privacy aware security approach was used to securely transmit the real identities of users, and the use of pseudonym by UE in the initial connection to access the LTE network. ...
doi:10.5120/cae2019652806
fatcat:5ko2d3prv5hjvkahr566mmbqqm
An Anonymous Geocast Scheme for ITS Applications
2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy
We show how the proposed scheme can be integrated in mobile networks like Long Term Evolution (LTE) and networks consisting of ITS Roadside Stations (IRSs). ...
located in a certain geographic area. ...
In contrast, AGfIA enables the
transmission over both LTE and IRS networks with-
out the limitation on IPv6 support in DSRC. ...
doi:10.5220/0005797501790189
dblp:conf/icissp/ButtnerH16
fatcat:ntjarg4c5zenndyj3rc6mnxdoi
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
[article]
2017
arXiv
pre-print
In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables. ...
Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID ...
Classification of methods based on EAP authentication framework mechanism in LTE-fem to cell heterogeneous networks. ...
arXiv:1708.04027v1
fatcat:lozrjocwq5eblkams72kk4rv6i
D.7.2: Adaptation of the reference architecture at the test sites
2022
Zenodo
They also consider mechanisms for cyber-security, authentication, integrity and privacy. ...
iii) the ability to generalise on the results (applicable in other scenarios and environments), and iv) interest to the consortium members and relevance to their industrial roadmaps. ...
The Hybrid Wireless Network will consist of ITS-G5 roadside units located on the ASFINAG road infrastructure, and of LTE/5G communication technology provided by Magenta. ...
doi:10.5281/zenodo.6396562
fatcat:owvwpug44rdkdi4vtml3owmexy
IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management
2019
IEEE Access
Focusing on such a setting, Yang, et al., in ''Densitybased location preservation for mobile crowdsensing with differential privacy,'' presented a data release mechanism that satisfies differential privacy ...
collection and data analysis approaches for LTE/LTE-A networks. ...
doi:10.1109/access.2019.2915489
fatcat:duhaq23h2rbejboby3hhxvnzse
PeopleTraffic: a common framework for harmonizing privacy and epidemic risks
[article]
2021
arXiv
pre-print
The system is based on a real-time people' locations gathering and mapping system from available 2G, 3G and 4G mobile networks operators, enforcing privacy-by-design through the adoption of an innovative ...
help balancing social distancing regulations during the Phase-2 of the COVID-19 pandemics, PeopleTraffic would be beneficial for any infection spreading prevention event, e.g. supporting policy-makers in ...
ACKNOWLEDGMENTS The work beyond this note was conducted during the first outbreak of the COVID-19 pandemic in 2020. ...
arXiv:2005.10061v2
fatcat:jayv2gkolfdudbbgrja6himqkq
Location-Privacy Leakage and Integrated Solutions for 5G Cellular Networks and Beyond
2021
Sensors
In this paper, we first go through the evolution of localization in cellular networks and investigate their effects on location privacy. ...
Then, we propose a location-privacy-preserving integrated solution comprising virtual private mobile networks, an independent authentication and billing authority, and functions to protect wireless signals ...
Moreover, if the relay also accesses the network on its own, its location privacy is not protected. ...
doi:10.3390/s21155176
fatcat:ueg2qm7zznaevf373vcyjilvqi
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
[article]
2017
arXiv
pre-print
Using commercial LTE mobile devices in real LTE networks, we demonstrate inexpensive, and practical attacks exploiting these vulnerabilities. ...
The LTE suite of specifications is considered to be significantly better than its predecessors not only in terms of functionality but also with respect to security and privacy for subscribers. ...
T-Labs, Aalto University, and Huawei provided test devices used in our experiments. ...
arXiv:1510.07563v3
fatcat:433ag5kbujaivmcb2lbov5zfuu
D.3.1: ICT4CART Reference Architecture
2019
Zenodo
The ICT4CART Reference Architecture will be the basis for the subsequent Tasks 3.2, 3.3 and 3.4, where the key aspects of Flexible Networks, IT Environment, and Cyber-Security & Data Privacy will be refined ...
First, in Section 3, a functional view on the architecture is presented, which shows and describes the different functional components that are used in the project. ...
networks (LTE/5G). ...
doi:10.5281/zenodo.6396340
fatcat:hp2g7u57jvgcfbj524mkpt2z2a
« Previous
Showing results 1 — 15 out of 6,016 results