Formal Analysis of UMTS Privacy
نویسندگان
چکیده
The ubiquitous presence of mobile communication devices and the continuous development of mobile data applications, which results in high level of mobile devices’ activity and exchanged data, often transparent to the user, makes privacy preservation an important feature of mobile telephony systems. We present a formal analysis of the UMTS Authentication and Key Agreement protocol, using the applied pi-calculus and the ProVerif tool. We formally verify the model with respect to privacy properties. We show a linkability attack which makes it possible, for individuals with low-cost equipment, to trace UMTS subscribers. The attack exploits information leaked by poorly designed error messages.
منابع مشابه
Mobile Platform and Secure Access Approach of UMTS Terminal Based on Trusted Computing
On the basis of comprehensive study of trusted computing technology and the threats to 3G network, the architecture of trusted mobile platform based on mobile trusted module is proposed, and a DAA-based key management and a trusted computing based access mechanism for 3G network are designed. Furthermore, a predicate logic based formal analysis method is also proposed. With DAA mechanism, user ...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملDistribution of UMTS protocols for ad-hoc extensions with direct signaling
Ad-hoc extensions of cellular networks help reducing intra-cell interference and hence increasing the capacity of cellular systems. This paper proposes an appropriate distribution of UMTS protocols between end terminals and intermediate relaying devices aiming at increasing capacity in UMTS while following two main principles: improving robustness by using a direct cellular connection for signa...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1109.2066 شماره
صفحات -
تاریخ انتشار 2011