A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure

  • Changhee Hahn
  • Hyunsoo Kwon
  • Daeyoung Kim
  • Kyungtae Kang
  • Junbeom Hur
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8491)


Mobile telephony device is widely used these days. Protecting subscribers privacy is crucial and can be achieved by evading linkability of subscribers by malicious third parties. In this paper, we analyze the privacy-related security properties of 4th generation mobile telephony, especially LTE. We suggest an attack model which makes it possible to trace a victim’s mobile device so that the attacker can know the presence of the victim’s device in a specific area. Tracking subscribers’ location by unauthorized third parties may violate the privacy of subscribers. To solve this problem, we propose a modified authentication protocol in LTE to preserve location privacy of the device. Considering security level and efficiency, we build our scheme to have low computational overhead and strong secrecy. Also we prove that the proposed scheme satisfies unlinkability property using the automatic verification tool ProVerif.


LTE location privacy authentication security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kim, M., Kang, C., Kim, Y., Kim, W.: WiBroWiMAX LTE Mobile Broadband. Kwangmoonkag, Seoul (2011)Google Scholar
  2. 2.
    Varshney, U.: Location Management for Mobile Commerce Applications in Wireless Internet Environment. ACM Transactions on Internet Technology 3, 4–6 (2003)CrossRefGoogle Scholar
  3. 3.
    Park, J., Kim, H., Joo, Y., Pyeun, S., Lim, J.: Lte New World. Miraebook, Seoul (2012)Google Scholar
  4. 4.
    Køien, G.M., Oleshchuk, V.A.: Location privacy for cellular systems; analysis and solution. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 40–58. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. 5.
    Meyer, U., Wetzel, S.: A man-in-the-middle attack on UMTS. In: 3rd ACM Workshop on Wireless Security, WiSe 2004, pp. 90–91. ACM DL, Philadelphia (2004)CrossRefGoogle Scholar
  6. 6.
    Xiehua, L., Yongjun, W.: Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network. In: 7th International Conference on Wireless Communications Networking and Mobile Computing, pp. 1–3. IEEE, Wuhan (2011)Google Scholar
  7. 7.
    3GPP: Universal Mobile Telecommunications System(UMTS); USIM and IC card requirements. Technical report, 3GPP (2008)Google Scholar
  8. 8.
    Dahlman, E., Parkvall, S., Skold, J., Beming, P.: 3G Evolution: HSPA and LTE for Mobile Broadband. Academic Press, Waltham (2010)Google Scholar
  9. 9.
    The LTE Network Architecture | Strategic White Paper,
  10. 10.
    3GPP: Technical Specification Group Core Network and Terminals; Characteristics of the IP Multimedia Services Identity Module (ISIM) application. Technical report, 3GPP (2012)Google Scholar
  11. 11.
    Gueron, S., Johnson, S., Walker, J.: SHA-512/256. In: 8th Conference on Information Technology New Generations, pp. 2–6. IEEE Computer Society Press, Las Vegas (2011)Google Scholar
  12. 12.
    3GPP: Technical Specification Group Services and System Aspects; 3G Security; Cryptographic algorithm requirements. Technical report, 3GPP (2009)Google Scholar
  13. 13.
    3GPP: Network Access Security in Next-Generation 3GPP Systems: A Tutorial. Technical report. IEEE Communications Magazine (2009)Google Scholar
  14. 14.
    Bortolozzo, M., Centenaro, M., Focardi, R., Steel, G.: Attacking and fixing PKCS#11 security tokens. In: 17th ACM Conference on Computer and Communications Security, pp. 1–3. ACM Press, Chicago (2010)Google Scholar
  15. 15.
    Golde, N., Redon, K., Borgaonkar, R.: Weaponizing femtocells: The effect of rogue devices on mobile telecommunications. In: 19th Annual Network and Distributed System Security Symposium, pp. 2–4. NDSS, San Diego (2012)Google Scholar
  16. 16.
    Arpinis, M., Mancini, L., Ritter, E., Ryan, M., Golde, N., Redon, K., Borgaonkar, R.: New Privacy Issues in Mobile Telephony: Fix and Verification. In: 19th ACM Conference on Computer and Communications Security, pp. 4–10. ACM Press, Raleigh (2012)Google Scholar
  17. 17.
    Forsberg, D., Horn, G., Moeller, W., Niemi, V.: LTE Security. John Wiley and Sons, New Jersey (2012)CrossRefGoogle Scholar
  18. 18.
    3GPP: Universal Mobile Telecommunications System(UMTS); 3G Security; Security architecture. Technical report, 3GPP (2010)Google Scholar
  19. 19.
    Agilent Technologies: LTE and the Evolution to 4G Wireless: Design and Measurement Challenges. WILEY, Hoboken (2013)Google Scholar
  20. 20.
    Zugenmaier, A., Aono, H.: Security Technology for SAE/LTE. NTT DOCOMO Technical Journal 11(3), 28–30 (2009)Google Scholar
  21. 21.
    Cheval, V., Blanchet, B.: Proving More Observational Equivalences with ProVerif. In: 2nd Conference on Principles of Security and Trust, pp. 9–17. ETAPS, Rome (2013)Google Scholar
  22. 22.
    Arpinis, M., Chothia, T., Ritter, E., Ryan, M.: Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. In: 23rd Computer Security Foundations Symposium, pp. 8–9. IEEE Press, Edinburgh (2010)Google Scholar
  23. 23.
    Pfitzmann, A., Kohntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: International Workshop on Design Issues in Anonymity and Unobservability, pp. 8–9. ACM DL, Berkeley (2001)Google Scholar
  24. 24.
    Ryan, M., Smyth, B.: Applied pi calculus. In: Formal Models and Techniques for Analyzing Security Protocols. IOS Press, Amsterdam (2011)Google Scholar
  25. 25.
    Lai, C., Li, H., Lu, R., Shen, X.: SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. The International Journal of Computer and Telecommunications Networking 57, 2–9 (2013)Google Scholar
  26. 26.
    Ta, T., Baras, J.S.: Enhancing Privacy in LTE Paging System using Physical Layer Identification. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. LNCS, vol. 7731, pp. 15–28. Springer, Heidelberg (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Changhee Hahn
    • 1
  • Hyunsoo Kwon
    • 1
  • Daeyoung Kim
    • 1
  • Kyungtae Kang
    • 2
  • Junbeom Hur
    • 1
  1. 1.School of Computer Science and EngineeringChung-Ang UniversitySeoulRepublic of Korea
  2. 2.Department of Computer Science and EngineeringHanyang UniversityAnsanRepublic of Korea

Personalised recommendations