A privacy threat in 4th generation mobile telephony and its countermeasure
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hahn, Changhee | - |
dc.contributor.author | Kwon, Hyunsoo | - |
dc.contributor.author | Kim, Daeyoung | - |
dc.contributor.author | Kang, Kyungtae | - |
dc.contributor.author | Hur, Junbeom | - |
dc.date.accessioned | 2021-06-23T01:25:23Z | - |
dc.date.available | 2021-06-23T01:25:23Z | - |
dc.date.issued | 2014-06 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/25501 | - |
dc.description.abstract | Mobile telephony device is widely used these days. Protecting subscribers privacy is crucial and can be achieved by evading linkability of subscribers by malicious third parties. In this paper, we analyze the privacy-related security properties of 4th generation mobile telephony, especially LTE. We suggest an attack model which makes it possible to trace a victim’s mobile device so that the attacker can know the presence of the victim’s device in a specific area. Tracking subscribers’ location by unauthorized third parties may violate the privacy of subscribers. To solve this problem, we propose a modified authentication protocol in LTE to preserve location privacy of the device. Considering security level and efficiency, we build our scheme to have low computational overhead and strong secrecy. Also we prove that the proposed scheme satisfies unlinkability property using the automatic verification tool ProVerif. © Springer International Publishing Switzerland 2014. | - |
dc.format.extent | 12 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Springer Verlag | - |
dc.title | A privacy threat in 4th generation mobile telephony and its countermeasure | - |
dc.type | Article | - |
dc.publisher.location | 독일 | - |
dc.identifier.doi | 10.1007/978-3-319-07782-6_56 | - |
dc.identifier.scopusid | 2-s2.0-84919395351 | - |
dc.identifier.wosid | 000345072900056 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.8491, pp 624 - 635 | - |
dc.citation.title | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.volume | 8491 | - |
dc.citation.startPage | 624 | - |
dc.citation.endPage | 635 | - |
dc.type.docType | Conference Paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | other | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | Authentication | - |
dc.subject.keywordPlus | Authentication protocols | - |
dc.subject.keywordPlus | Automatic verification tools | - |
dc.subject.keywordPlus | Computational overheads | - |
dc.subject.keywordPlus | Location privacy | - |
dc.subject.keywordPlus | Mobile telephony | - |
dc.subject.keywordPlus | Security | - |
dc.subject.keywordPlus | Security properties | - |
dc.subject.keywordPlus | Strong secrecies | - |
dc.subject.keywordPlus | Location | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Location privacy | - |
dc.subject.keywordAuthor | LTE | - |
dc.subject.keywordAuthor | Security | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-319-07782-6_56 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.