Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6,016 Hits in 2.4 sec

PAL - privacy augmented LTE

Daniel Angermeier, Alexander Kiening, Frederic Stumpf
2013 Proceeding of the tenth ACM international workshop on Vehicular inter-networking, systems, and applications - VANET '13  
We propose a novel privacy-preserving scheme for LTE in vehicular communication.  ...  We show that our scheme improves the privacy of subscribers without loss of functionality in terms of all relevant use cases for vehicular communication over LTE.  ...  Thus, MNOs can fully track UEs using IMEIs, resulting in detailed location profiles and a violation of location privacy. • In an LTE mobile network, mobile nodes usually receive an IP address when turned  ... 
doi:10.1145/2482967.2482975 dblp:conf/mobisys/AngermeierKS13 fatcat:b52ptpm3xvdslbphoc6usivc64

LTE Phone Number Catcher: A Practical Attack against Mobile Privacy

Chuan Yu, Shuhui Chen, Zhiping Cai
2019 Security and Communication Networks  
This paper intends to verify that mobile privacy is also quite vulnerable even in LTE networks as long as the legacy GSM still exists.  ...  Hence, we hope the operators worldwide can completely disable the GSM mobile networks in the areas covered by 3G and 4G networks as soon as possible to reduce the possibility of attacks on higher-generation  ...  and Communication Networks can precisely locate an LTE device by using an LTE rogue station [17] .  ... 
doi:10.1155/2019/7425235 fatcat:yburh73j4jhera5dgicir76tiy

Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging [article]

Christian Sørseth, Xianyu Shelley Zhou, Stig F. Mjølsnes, Ruxandra F. Olimid
2018 arXiv   pre-print
Moreover, we present a general experimental method to test privacy exposure by LTE paging messages, and we conduct a case study on three different LTE mobile operators.  ...  Over the last years, considerable attention has been given to the privacy of individuals in wireless environments.  ...  This paper focuses on privacy exposure caused by LTE paging, and extends the existing work in the sense that it describes in detail an experimental method to test the privacy of subscribers in LTE networks  ... 
arXiv:1807.11350v1 fatcat:kfu2jaomqjhh3bqlkqzj7xxy5m

Analysis of User Identity Privacy in LTE and Proposed Solution

Abdulrahman A. Muthana, Mamoon M. Saeed
2017 International Journal of Computer Network and Information Security  
The scheme provides secure and effective identity management in respect to the protection of user privacy in LTE.  ...  This paper includes an evaluation of LTE security architecture and proposes a security solution for the enhancement of user identity privacy in LTE.  ...  privacy of the users in LTE network.  ... 
doi:10.5815/ijcnis.2017.01.07 fatcat:x5puvznecjeh7eefpfzrikrmlm

Wi Not Calling

Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
2018 Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC '18  
from LTE to Wi-Fi networks.  ...  Wi-Fi Calling, which is used to make and receive calls over the Wi-Fi network, has been widely adopted and deployed to extend the coverage and increase the capacity in weak signal areas by moving traffic  ...  , findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of United States Government or any agency thereof.  ... 
doi:10.1145/3274694.3274753 dblp:conf/acsac/BaekKC0SDA18 fatcat:trxtoixqgfhjdjxxogfp5mqxee

Location-assured, multifactor authentication on smartphones via LTE communication

Torben Kuseler, Ihsan A. Lami, Hisham Al-Assam, Sos S. Agaian, Sabah A. Jassim, Eliza Y. Du
2013 Mobile Multimedia/Image Processing, Security, and Applications 2013  
This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location  ...  The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement  ...  This makes LTE versatile in establishing the location of any user's Smartphone over any network via LPP on the Control Plane (commonly used by emergency services as only way in 2G/3G networks) and via  ... 
doi:10.1117/12.2018027 fatcat:55haczoz7bc5dc64xg62npjvfi

PA-AKA: Privacy-Aware and Lightweight Authentication Scheme for Long Term Evolution (LTE)

Olakanmi O., Eleshinnla Adebola, Dada Adedamola
2019 Communications on Applied Electronics  
Several authentication schemes had been proposed for LTE to ensure confidentiality between the authorised users and the network.  ...  In this work an improved privacy aware authentication scheme is proposed, which does not only preserve the subscribers' privacy during initial connection but allows MME to generate and map subscriber pseudonym  ...  In the scheme, a privacy aware security approach was used to securely transmit the real identities of users, and the use of pseudonym by UE in the initial connection to access the LTE network.  ... 
doi:10.5120/cae2019652806 fatcat:5ko2d3prv5hjvkahr566mmbqqm

An Anonymous Geocast Scheme for ITS Applications

Carsten Büttner, Sorin A. Huss
2016 Proceedings of the 2nd International Conference on Information Systems Security and Privacy  
We show how the proposed scheme can be integrated in mobile networks like Long Term Evolution (LTE) and networks consisting of ITS Roadside Stations (IRSs).  ...  located in a certain geographic area.  ...  In contrast, AGfIA enables the transmission over both LTE and IRS networks with- out the limitation on IPv6 support in DSRC.  ... 
doi:10.5220/0005797501790189 dblp:conf/icissp/ButtnerH16 fatcat:ntjarg4c5zenndyj3rc6mnxdoi

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables.  ...  Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID  ...  Classification of methods based on EAP authentication framework mechanism in LTE-fem to cell heterogeneous networks.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

D.7.2: Adaptation of the reference architecture at the test sites

Anna Adaktylos, Gottfried Allmer, Danilo Amendola, Ilaria De Biasi, Edoardo Bonetto, Daniele Brevi, Michael Buchholz, Silvia Capato, Guillemette Massot, Alessandro Pedron, Anastasia Petrou, Steffen Schulz (+2 others)
2022 Zenodo  
They also consider mechanisms for cyber-security, authentication, integrity and privacy.  ...  iii) the ability to generalise on the results (applicable in other scenarios and environments), and iv) interest to the consortium members and relevance to their industrial roadmaps.  ...  The Hybrid Wireless Network will consist of ITS-G5 roadside units located on the ASFINAG road infrastructure, and of LTE/5G communication technology provided by Magenta.  ... 
doi:10.5281/zenodo.6396562 fatcat:owvwpug44rdkdi4vtml3owmexy

IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management

Yulei Wu, Zheng Yan, Kim-Kwang Raymond Choo, Laurence T. Yang
2019 IEEE Access  
Focusing on such a setting, Yang, et al., in ''Densitybased location preservation for mobile crowdsensing with differential privacy,'' presented a data release mechanism that satisfies differential privacy  ...  collection and data analysis approaches for LTE/LTE-A networks.  ... 
doi:10.1109/access.2019.2915489 fatcat:duhaq23h2rbejboby3hhxvnzse

PeopleTraffic: a common framework for harmonizing privacy and epidemic risks [article]

Ruggero Caravita
2021 arXiv   pre-print
The system is based on a real-time people' locations gathering and mapping system from available 2G, 3G and 4G mobile networks operators, enforcing privacy-by-design through the adoption of an innovative  ...  help balancing social distancing regulations during the Phase-2 of the COVID-19 pandemics, PeopleTraffic would be beneficial for any infection spreading prevention event, e.g. supporting policy-makers in  ...  ACKNOWLEDGMENTS The work beyond this note was conducted during the first outbreak of the COVID-19 pandemic in 2020.  ... 
arXiv:2005.10061v2 fatcat:jayv2gkolfdudbbgrja6himqkq

Location-Privacy Leakage and Integrated Solutions for 5G Cellular Networks and Beyond

Stefano Tomasin, Marco Centenaro, Gonzalo Seco-Granados, Stefan Roth, Aydin Sezgin
2021 Sensors  
In this paper, we first go through the evolution of localization in cellular networks and investigate their effects on location privacy.  ...  Then, we propose a location-privacy-preserving integrated solution comprising virtual private mobile networks, an independent authentication and billing authority, and functions to protect wireless signals  ...  Moreover, if the relay also accesses the network on its own, its location privacy is not protected.  ... 
doi:10.3390/s21155176 fatcat:ueg2qm7zznaevf373vcyjilvqi

Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems [article]

Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert
2017 arXiv   pre-print
Using commercial LTE mobile devices in real LTE networks, we demonstrate inexpensive, and practical attacks exploiting these vulnerabilities.  ...  The LTE suite of specifications is considered to be significantly better than its predecessors not only in terms of functionality but also with respect to security and privacy for subscribers.  ...  T-Labs, Aalto University, and Huawei provided test devices used in our experiments.  ... 
arXiv:1510.07563v3 fatcat:433ag5kbujaivmcb2lbov5zfuu

D.3.1: ICT4CART Reference Architecture

Anna Adaktylos, Gottfried Allmer, Michael Buchholz, Birger Hätty, Yassine Lassoued, Guillemette Massot, Jan Strohbeck, Friedrich Vogl, Markus Wimmer
2019 Zenodo  
The ICT4CART Reference Architecture will be the basis for the subsequent Tasks 3.2, 3.3 and 3.4, where the key aspects of Flexible Networks, IT Environment, and Cyber-Security & Data Privacy will be refined  ...  First, in Section 3, a functional view on the architecture is presented, which shows and describes the different functional components that are used in the project.  ...  networks (LTE/5G).  ... 
doi:10.5281/zenodo.6396340 fatcat:hp2g7u57jvgcfbj524mkpt2z2a
« Previous Showing results 1 — 15 out of 6,016 results