The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these ...The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme.展开更多
Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed....Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed.As Internet of Things(IoT)and long-term evolution for machine type(LTE-m)are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase.For all the above issues standards’bodies should ensure users’identity and privacy in order to gain the trust of service providers and industries.Against such threats,5G specifications require a rigid and robust privacy procedure.Many research studies have addressed user privacy in 5G networks.This paper proposes a method to enhance user identity privacy in 5G systems through a scheme to protect the international mobile subscriber identity(IMSI)using a mutable mobile subscriber identity(MMSI)that changes randomly and avoids the exchange of IMSIs.It maintains authentication and key agreement(AKA)structure compatibility with previous mobile generations and improves user equipment(UE)synchronization with home networks.The proposed algorithm adds no computation overhead to UE or the network except a small amount in the home subscriber server(HSS).The proposed pseudonym mutable uses the XOR function to send the MMSI from the HSS to the UE which is reducing the encryption overhead significantly.The proposed solution was verified by ProVerif.展开更多
基金The Universiti Kebangsaan Malaysia(UKM)Research Grant Scheme GGPM-2020-028 funded this research.
文摘The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme.
基金This Research was supported by Taif University Researchers Supporting Project Number(TURSP-2020/216),Taif University,Taif,Saudi Arabia。
文摘Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed.As Internet of Things(IoT)and long-term evolution for machine type(LTE-m)are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase.For all the above issues standards’bodies should ensure users’identity and privacy in order to gain the trust of service providers and industries.Against such threats,5G specifications require a rigid and robust privacy procedure.Many research studies have addressed user privacy in 5G networks.This paper proposes a method to enhance user identity privacy in 5G systems through a scheme to protect the international mobile subscriber identity(IMSI)using a mutable mobile subscriber identity(MMSI)that changes randomly and avoids the exchange of IMSIs.It maintains authentication and key agreement(AKA)structure compatibility with previous mobile generations and improves user equipment(UE)synchronization with home networks.The proposed algorithm adds no computation overhead to UE or the network except a small amount in the home subscriber server(HSS).The proposed pseudonym mutable uses the XOR function to send the MMSI from the HSS to the UE which is reducing the encryption overhead significantly.The proposed solution was verified by ProVerif.