A Practical Location Privacy Attack in Proximity Services

Author(s):  
Sergio Mascetti ◽  
Letizia Bertolaja ◽  
Claudio Bettini
2019 ◽  
Vol 2019 (3) ◽  
pp. 108-127 ◽  
Author(s):  
Ravishankar Borgaonkar ◽  
Lucca Hirschi ◽  
Shinjo Park ◽  
Altaf Shaik

Abstract Mobile communications are used by more than two-thirds of the world population who expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) responsible for the worldwide standardization of mobile communication has designed and mandated the use of the AKA protocol to protect the subscribers’ mobile services. Even though privacy was a requirement, numerous subscriber location attacks have been demonstrated against AKA, some of which have been fixed or mitigated in the enhanced AKA protocol designed for 5G. In this paper, we reveal a new privacy attack against all variants of the AKA protocol, including 5G AKA, that breaches subscriber privacy more severely than known location privacy attacks do. Our attack exploits a new logical vulnerability we uncovered that would require dedicated fixes. We demonstrate the practical feasibility of our attack using low cost and widely available setups. Finally we conduct a security analysis of the vulnerability and discuss countermeasures to remedy our attack.


2019 ◽  
Vol 23 (5) ◽  
pp. 1167-1185
Author(s):  
Xiaohan Wang ◽  
Yonglong Luo ◽  
Shiyang Liu ◽  
Taochun Wang ◽  
Huihui Han

Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3658
Author(s):  
Qingfeng Zhu ◽  
Sai Ji ◽  
Jian Shen ◽  
Yongjun Ren

With the advanced development of the intelligent transportation system, vehicular ad hoc networks have been observed as an excellent technology for the development of intelligent traffic management in smart cities. Recently, researchers and industries have paid great attention to the smart road-tolling system. However, it is still a challenging task to ensure geographical location privacy of vehicles and prevent improper behavior of drivers at the same time. In this paper, a reliable road-tolling system with trustworthiness evaluation is proposed, which guarantees that vehicle location privacy is secure and prevents malicious vehicles from tolling violations at the same time. Vehicle route privacy information is encrypted and uploaded to nearby roadside units, which then forward it to the traffic control center for tolling. The traffic control center can compare data collected by roadside units and video surveillance cameras to analyze whether malicious vehicles have behaved incorrectly. Moreover, a trustworthiness evaluation is applied to comprehensively evaluate the multiple attributes of the vehicle to prevent improper behavior. Finally, security analysis and experimental simulation results show that the proposed scheme has better robustness compared with existing approaches.


Sign in / Sign up

Export Citation Format

Share Document