We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A New Trust Model for Improved Identity Privacy in Cellular Networks

by Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 14
Year of Publication: 2012
Authors: Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia
10.5120/8956-3172

Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia . A New Trust Model for Improved Identity Privacy in Cellular Networks. International Journal of Computer Applications. 56, 14 ( October 2012), 1-8. DOI=10.5120/8956-3172

@article{ 10.5120/8956-3172,
author = { Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia },
title = { A New Trust Model for Improved Identity Privacy in Cellular Networks },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 14 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number14/8956-3172/ },
doi = { 10.5120/8956-3172 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:58:46.894050+05:30
%A Hiten Choudhury
%A Basav Roychoudhury
%A Dilip Kr. Saikia
%T A New Trust Model for Improved Identity Privacy in Cellular Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 14
%P 1-8
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cellular networks have evolved through various generations, starting with 1G, followed by 2G and then by 3G, cellular networks have come a long way. A recent technology that has marked the beginning of 4G is Long Term Evolution (LTE). While transmission technologies, authentication mechanisms, confidentiality protection, etc. , improved significantly through the generations, not much has improved with regards to the subscriber's identity privacy, and LTE is no exception. Much of this could be due to the trust model adopted in these networks. Introduction of sensitive services like mobile-banking, mobile-commerce, etc. , has increased the importance of identity privacy by many folds. Identification of threats like location tracking and comprehensive profiling - where data about movement, usage, etc. , of a subscriber is amassed and linked to his/her identity to explore various attacks - is quite alarming. In this paper, we propose a new trust model for strengthening identity privacy in cellular networks; it has an additional capacity to enhance interoperability among different cellular operators. We also propose a security extension that adopts this trust model to improve identity privacy and interoperability in LTE. A formal analysis of the extension proves that it meets its security goals.

References
  1. 3GPP. 3G Security;Security architecture. TS 33. 102, 3rd Generation Partnership Project (3GPP), 2011.
  2. 3GPP. 3GPP System Architecture Evolution (SAE); Security architecture. TS 33. 401, 3rd Generation Partnership Project (3GPP), 2011.
  3. 3GPP. General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network. TR 23. 401, 3rd Generation Partnership Project (3GPP), 2011.
  4. 3GPP. Numbering, addressing and identification. TS 23. 003, 3rd Generation Partnership Project (3GPP), 2011.
  5. M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, 426(1871):233– 271, 1989.
  6. H. Choudhury, B. Roychoudhury, and D. K. Saikia. Umts user identity confidentiality: An end-to-end solution. In Wireless and Optical Communications Networks (WOCN), 2011 Eighth International Conference on, pages 1–6. IEEE, 2011.
  7. H. Choudhury, B. Roychoudhury, and D. K. Saikia. Enhancing user identity privacy in lte. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pages 949– 957. IEEE, 2012.
  8. G. M. Koien. An introduction to access security in umts. Wireless Communications, IEEE, 11(1):8–18, 2004.
  9. U. Meyer and S. Wetzel. A man-in-the-middle attack on umts. In Proceedings of the 3rd ACM workshop onWireless security, pages 90–97. ACM, 2004.
  10. CB Sankaran. Network access security in next-generation 3gpp systems: A tutorial. Communications Magazine, IEEE, 47(2):84–91, 2009.
  11. G. Wedel and V. Kessler. Formal semantics for authentication logics. In Computer Security ESORICS 96, pages 219– 241. Springer, 1996.
  12. C. Xenakis and L. Merakos. Ipsec-based end-to-end vpn deployment over umts. Computer Communications, 27(17):1693–1708, 2004.
  13. M. Zhang and Y. Fang. Security analysis and enhancements of 3gpp authentication and key agreement protocol. Wireless Communications, IEEE Transactions on, 4(2):734– 742, 2005. 8
Index Terms

Computer Science
Information Sciences

Keywords

Trust model LTE AKA Identity privacy Formal analysis Cellular networks