Abstract
This paper is in the area of pseudonym-based enhancements of user identity privacy in mobile networks. Khan and Mitchell (2017) have found that in recently published pseudonym-based schemes an attacker can desynchronize the pseudonyms’ state in the user equipment and in its home network. In this paper, we first show that by exploiting this vulnerability a botnet of mobile devices can kick out of service a large portion of the users of a mobile network. We characterize this novel DDoS attack analytically and confirm our analysis using a simulation. Second, we explain how to modify the pseudonym-based schemes in order to mitigate the DDoS attack. The proposed solution is simpler than that in Khan and Mitchell (2017). We also discuss aspects of pseudonym usage in mobile network from charging and regulatory point of view.
Original language | English |
---|---|
Title of host publication | Information Systems Security. ICISS 2017 |
Subtitle of host publication | 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings |
Editors | R. Shyamasundar, V. Singh, J. Vaidya |
Publisher | Springer |
Pages | 347-366 |
ISBN (Electronic) | 978-3-319-72598-7 |
ISBN (Print) | 978-3-319-72597-0 |
DOIs | |
Publication status | Published - 2017 |
MoE publication type | A4 Conference publication |
Event | International Conference on Information Systems Security - Mumbai, India Duration: 16 Dec 2017 → 20 Dec 2017 Conference number: 13 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Volume | 10717 |
Conference
Conference | International Conference on Information Systems Security |
---|---|
Abbreviated title | ICISS |
Country/Territory | India |
City | Mumbai |
Period | 16/12/2017 → 20/12/2017 |
Keywords
- 3GPP
- IMSI catchers
- Pseudonym
- Identity
- Privacy