Skip to main content

Enhancing Privacy in LTE Paging System Using Physical Layer Identification

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7731))

Abstract

User location privacy is a growing concern in cellular networks. It has been recently shown that the paging architecture in GSM networks leaks user location information. In this paper, we first prove theoretically that LTE networks also have the same vulnerability. We then propose a solution making use of a novel signal processing technique, physical layer identification. The idea is to embed users’ unique tags onto the downlink paging signal waveforms so that the tags are stealthy and robust. We show that our scheme not only improves users’ privacy, but also saves system bandwidth.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kune, D.F., Koelndorfer, J., Hopper, N., Kim, Y.: Location leaks over the GSM air interface. In: Proc. 19th Annual Network and Distributed System Security Symposium (2012)

    Google Scholar 

  2. Yu, P., Baras, J.S., Sadler, B.: Physical-Layer Authentication. IEEE Trans. on Information Forensics and Security 3, 38–51 (2008)

    Article  Google Scholar 

  3. Yu, P., Baras, J.S., Sadler, B.: Multicarrier authentication at the physical layer. In: WoWMoM (2008)

    Google Scholar 

  4. Nohl, K., Munaut, S.: GSM Sniffing, http://events.ccc.de/congress/2010/Fahrplan/attachments/1783_101228.27C3.GSM-Sniffing.Nohl_Munaut.pdf

  5. F-Secure: 440,783 “Silent SMS” Used to Track German Suspects in 2010 (2010), http://www.f-secure.com/weblog/archives/00002294.html

  6. 3GPP TS 36.211: Evolved Universal Terrestrial Radio Access (E-UTRA); Physical channels and modulation (version 10.4.0) (2011)

    Google Scholar 

  7. 3GPP TS 36.213: Evolved Universal Terrestrial Radio Access (E-UTRA); Physical layer procedures (version 10.4.0) (2011)

    Google Scholar 

  8. 3GPP TS 36.321: Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC); Protocol specification (version 10.4.0) (2011)

    Google Scholar 

  9. 3GPP TS 36.331: Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification (version 10.4.0) (2011)

    Google Scholar 

  10. Baker, M., Moulsley, T.: Downlink Physical Data and Control Channels. In: LTE The UMTS Long Term Evolution, ch. 9, pp. 189–214 (2011)

    Google Scholar 

  11. Edfors, O., Sandell, M., van de Beek, J.J., Wilson, S.K., Borjesson, P.O.: OFDM channel estimation by singular value decomposition. IEEE Trans. on Communications 46, 931–939 (1998)

    Article  Google Scholar 

  12. The OsmocomBB project - Open source GSM baseband software implementation, http://bb.osmocom.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ta, T., Baras, J.S. (2013). Enhancing Privacy in LTE Paging System Using Physical Layer Identification. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2012 2012. Lecture Notes in Computer Science, vol 7731. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35890-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35890-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35889-0

  • Online ISBN: 978-3-642-35890-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics