DocumentCode
568481
Title
Enhancing User Identity Privacy in LTE
Author
Choudhury, Hiten ; Roychoudhury, Basav ; Saikia, Dilip Kr
Author_Institution
Dept. of Comput. Sci., St. Edmund´´s Coll., Shillong, India
fYear
2012
fDate
25-27 June 2012
Firstpage
949
Lastpage
957
Abstract
Identity privacy is a security issue that is crucial for the users of a cellular network. Knowledge of the permanent identity of a user may allow an adversary to track and amass comprehensive profiles about individuals. Such profiling may expose an individual to various kind of unanticipated risks, and above all may deprive an individual of his right to privacy. With the introduction of sensitive services like online banking, shopping, etc. through cellular phones, identity privacy has now become a bigger security issue. In GSM and UMTS, the problem of user identity privacy vulnerability is proven to exist. In both these systems, there are situations where the permanent identity of a subscriber may get compromised. Long Term Evolution (LTE), which evolved from GSM and UMTS, is proposed by 3GPP for inclusion into the fourth generation of cellular networks. Although security of LTE has evolved from the security of GSM and UMTS, due to different architectural and business requirements of fourth generation systems, LTE security is substantially different and improved compared to its predecessors. However, the issue of identity privacy vulnerability continue to exist in LTE. In this paper, we discuss how the security architecture of LTE deals with identity privacy. We also discuss a possible solution that may be utilised to overcome the problem of user identity privacy in LTE.
Keywords
3G mobile communication; 4G mobile communication; Long Term Evolution; cellular radio; data privacy; telecommunication security; 3GPP; GSM; LTE security; UMTS; cellular network fourth generation; cellular phones; long term evolution; permanent identity knowledge; user identity privacy enhancement; user identity privacy vulnerability; 3G mobile communication; Authentication; Computer architecture; Databases; Privacy; AKA; Anonymity; Authentication; Confidentiality; Identity; Key Agreement; LTE; Privacy;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location
Liverpool
Print_ISBN
978-1-4673-2172-3
Type
conf
DOI
10.1109/TrustCom.2012.148
Filename
6296075
Link To Document