Privacy Enhanced Fast Mutual Authentication in 5G Network Using Identity Based Encryption
DOI:
https://doi.org/10.13052/jicts2245-800X.514Keywords:
5G, Identity, IMSI, IBE, Privacy, Mutual Authentication, 3GPPAbstract
Subscription privacy of a user has been a historical concern with all the previous generation mobile networks, namely, GSM, UMTS, and LTE. While a little improvement have been achieved in securing the privacy of the long-term identity of a subscriber, the so called IMSI catchers are still in existence even in the LTE and advanced LTE networks. Proposals have been published to tackle this problem in 5G based on pseudonyms, and different public-key technologies. This paper looks into the problem of concealing long-term identity of a subscriber and presents a protocol based on identity based encryption (IBE) to tackle it. The proposed solution can be extended to a mutual authentication and key agreement protocol between a serving network (SN) and a user equipment (UE). We name the protocol PEFMA (privacy enhanced fast mutual authentication). The SN does not need to connect with the home network (HN) on every PEFMA run. In PEFMA, both the user equipment (UE) and the SN has public keys. A UE sends the IMSI after encrypting it using the SN’s public key. Since both the UE and SN have public keys, PEFMA can run without contacting the HN. A qualitative comparison of different techniques show that our solution is competitive for securing the long-term identity privacy of a user in the 5G network.
Downloads
References
RFC 6507 Category: Informational. https://tools.ietf.org/html/rfc6507
RFC 6508 Category: Informational. https://tools.ietf.org/html/rfc6508
3GPP. 3GPP TR 21.905. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=558
3GPP. 3GPP TS 23.003. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=729
3GPP. 3GPP TS 33.106. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2265
3GPP. 3GPP TS 33.107. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2266
3GPP. 3GPP TR 33.821. (2009). https://portal.3gpp.org/desktopmodules/ Specifications/SpecificationDetails.aspx?specificationId=2311
3GPP. 3GPP TR 33.899. (2016). https://portal.3gpp.org/desktopmodules/ Specifications/SpecificationDetails.aspx?specificationId=3045
3GPP. About 3GPP Home. (2017). http://www.3gpp.org/about-3gpp/about-3gpp
Boneh, D. and Franklin, M. (2001). “Identity-based encryption from the weil pairing,” in Advances in Cryptology – CRYPTO 2001: 21st Annual International Cryptology Conference, (Springer: Berlin, Heidelberg), 213–219.
Cocks, C. (2001). “An identity based encryption scheme based on quadratic residues,” in Proceedings of the 8th IMA International Conference on Cryptography and Coding, (Springer-Verlog: London, UK), 360–363.
Ginzboorg, P. and Niemi, V. (2016). “Privacy of the long-term identities in cellular networks,” in Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia ’16, (ICST, 2016), 167–175.
Jo, H. J., Paik, J. H. and Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Trans. Mobile Comput. 13, 1469–1481.
Shafiul Alam Khan, M. and Chris J. Mitchell (2015). “Improving Air Interface User Privacy in Mobile Telephony,” in Proceedings of Second International Conference, SSR 2015, (Springer International Publishing), 165—184.
Køien, G. M. (2013). “Privacy enhanced mutual authentication in LTE,” in 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 614–621.
NGMN. NGMN 5G White Paper. https://www.ngmn.org/uploads/ media/NGMN_5G_White_Paper_V1_0.pdf
Norrman, K., Näslund, M. and Dubrova, E. (2016). “Protecting IMSI and User Privacy in 5G Networks,” in Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia ’16, (ICST, 2016), 159–166.
Shamir, A. (1985). “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology: Proceedings of CRYPTO 84, (Springer: Berlin, Heidelberg), 47–53.
van den Broek, F., Verdult, R. and de Ruiter, J. (2015). “Defeating IMSI Catchers,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS ’15, (ACM, 2015), 340–351.