Privacy Enhanced Fast Mutual Authentication in 5G Network Using Identity Based Encryption

Authors

  • Mohsin Khan Department of Computer Science, P.O. Box 68 (Gustaf H¨allstr¨omin katu 2b), FI-00014 University of Helsinki, Finland
  • Valtteri Niemi Department of Computer Science, P.O. Box 68 (Gustaf H¨allstr¨omin katu 2b), FI-00014 University of Helsinki, Finland

DOI:

https://doi.org/10.13052/jicts2245-800X.514

Keywords:

5G, Identity, IMSI, IBE, Privacy, Mutual Authentication, 3GPP

Abstract

Subscription privacy of a user has been a historical concern with all the previous generation mobile networks, namely, GSM, UMTS, and LTE. While a little improvement have been achieved in securing the privacy of the long-term identity of a subscriber, the so called IMSI catchers are still in existence even in the LTE and advanced LTE networks. Proposals have been published to tackle this problem in 5G based on pseudonyms, and different public-key technologies. This paper looks into the problem of concealing long-term identity of a subscriber and presents a protocol based on identity based encryption (IBE) to tackle it. The proposed solution can be extended to a mutual authentication and key agreement protocol between a serving network (SN) and a user equipment (UE). We name the protocol PEFMA (privacy enhanced fast mutual authentication). The SN does not need to connect with the home network (HN) on every PEFMA run. In PEFMA, both the user equipment (UE) and the SN has public keys. A UE sends the IMSI after encrypting it using the SN’s public key. Since both the UE and SN have public keys, PEFMA can run without contacting the HN. A qualitative comparison of different techniques show that our solution is competitive for securing the long-term identity privacy of a user in the 5G network.

 

Downloads

Download data is not yet available.

Author Biographies

Mohsin Khan, Department of Computer Science, P.O. Box 68 (Gustaf H¨allstr¨omin katu 2b), FI-00014 University of Helsinki, Finland

Mohsin Khan received his M.Sc. degree in 2015 from Aalto University, Espoo, Finland, majoring in foundations of advanced computing. Currently he is studying in University of Helsinki as a Ph.D student. His Ph.D topic is cryptographic techniques in 5G networks.

Valtteri Niemi, Department of Computer Science, P.O. Box 68 (Gustaf H¨allstr¨omin katu 2b), FI-00014 University of Helsinki, Finland

Valtteri Niemi is a Professor of Computer Science in University of Helsinki and leads the Secure Systems research group. Earlier he has been a Professor of Mathematics in two other Finnish universities: University of Vaasa during 1993–97 and University of Turku during 2012–2015. Between these two academic positions Niemi served for 15 years in various roles at Nokia Research Center and was nominated as a Nokia Fellow in 2009. At Nokia, Dr. Niemi worked for wireless security, including cryptological aspects and privacy-enhancing technologies. He participated 3GPP SA3 (security) standardization group from its beginning and during 2003–2009 he was the chairman of the group. He has published more than 70 scientific articles and he is a co-author of four books and more than 30 patent families.

References

RFC 6507 Category: Informational. https://tools.ietf.org/html/rfc6507

RFC 6508 Category: Informational. https://tools.ietf.org/html/rfc6508

3GPP. 3GPP TR 21.905. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=558

3GPP. 3GPP TS 23.003. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=729

3GPP. 3GPP TS 33.106. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2265

3GPP. 3GPP TS 33.107. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2266

3GPP. 3GPP TR 33.821. (2009). https://portal.3gpp.org/desktopmodules/ Specifications/SpecificationDetails.aspx?specificationId=2311

3GPP. 3GPP TR 33.899. (2016). https://portal.3gpp.org/desktopmodules/ Specifications/SpecificationDetails.aspx?specificationId=3045

3GPP. About 3GPP Home. (2017). http://www.3gpp.org/about-3gpp/about-3gpp

Boneh, D. and Franklin, M. (2001). “Identity-based encryption from the weil pairing,” in Advances in Cryptology – CRYPTO 2001: 21st Annual International Cryptology Conference, (Springer: Berlin, Heidelberg), 213–219.

Cocks, C. (2001). “An identity based encryption scheme based on quadratic residues,” in Proceedings of the 8th IMA International Conference on Cryptography and Coding, (Springer-Verlog: London, UK), 360–363.

Ginzboorg, P. and Niemi, V. (2016). “Privacy of the long-term identities in cellular networks,” in Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia ’16, (ICST, 2016), 167–175.

Jo, H. J., Paik, J. H. and Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Trans. Mobile Comput. 13, 1469–1481.

Shafiul Alam Khan, M. and Chris J. Mitchell (2015). “Improving Air Interface User Privacy in Mobile Telephony,” in Proceedings of Second International Conference, SSR 2015, (Springer International Publishing), 165—184.

Køien, G. M. (2013). “Privacy enhanced mutual authentication in LTE,” in 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 614–621.

NGMN. NGMN 5G White Paper. https://www.ngmn.org/uploads/ media/NGMN_5G_White_Paper_V1_0.pdf

Norrman, K., Näslund, M. and Dubrova, E. (2016). “Protecting IMSI and User Privacy in 5G Networks,” in Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia ’16, (ICST, 2016), 159–166.

Shamir, A. (1985). “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology: Proceedings of CRYPTO 84, (Springer: Berlin, Heidelberg), 47–53.

van den Broek, F., Verdult, R. and de Ruiter, J. (2015). “Defeating IMSI Catchers,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS ’15, (ACM, 2015), 340–351.

Downloads

Published

2017-09-08

How to Cite

Khan, M. ., & Niemi, V. . (2017). Privacy Enhanced Fast Mutual Authentication in 5G Network Using Identity Based Encryption. Journal of ICT Standardization, 5(1), 69–90. https://doi.org/10.13052/jicts2245-800X.514

Issue

Section

Articles