scholarly journals New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols

2019 ◽  
Vol 2019 (3) ◽  
pp. 108-127 ◽  
Author(s):  
Ravishankar Borgaonkar ◽  
Lucca Hirschi ◽  
Shinjo Park ◽  
Altaf Shaik

Abstract Mobile communications are used by more than two-thirds of the world population who expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) responsible for the worldwide standardization of mobile communication has designed and mandated the use of the AKA protocol to protect the subscribers’ mobile services. Even though privacy was a requirement, numerous subscriber location attacks have been demonstrated against AKA, some of which have been fixed or mitigated in the enhanced AKA protocol designed for 5G. In this paper, we reveal a new privacy attack against all variants of the AKA protocol, including 5G AKA, that breaches subscriber privacy more severely than known location privacy attacks do. Our attack exploits a new logical vulnerability we uncovered that would require dedicated fixes. We demonstrate the practical feasibility of our attack using low cost and widely available setups. Finally we conduct a security analysis of the vulnerability and discuss countermeasures to remedy our attack.

2020 ◽  
Vol 10 (19) ◽  
pp. 6998
Author(s):  
Cintya G. Soria-Hernández ◽  
Sergio O. Serna-Saldívar ◽  
Cristina Chuck-Hernández

Vegetable proteins are potential low-cost alternatives to solve the protein deficiency of the world population. A protein extracted from a mixture of soybean meal and maize germ was developed to offer more protein alternatives with high nutritional value. In this study, physicochemical, functional, and nutritional characteristics of isolates and hydrolysates of soybean and counterparts extracted from a soybean meal-maize germ were compared. The isolate and hydrolysate of the soybean-maize blend had a protein content of 93.9% and 73.6%, respectively. These protein mixtures contained 10% and 52% more solubility, 303.9%, and 22.7% more emulsifying capacity, 4.5% and 4.2% higher foam density and 36.3% and 1.2% more coagulation capacity compared to the soybean isolate and hydrolysate. Electrophoretic profiles of soybean-maize proteins showed four additional bands to the typical soybean pattern of 56, 55, 52 and 18 kDa, which could correspond to globulins and zeins from maize. The isolate extracted from the mixture of soybean meal and maize is a new alternative to provide the necessary amino acids for proper physical and mental development. Additionally, it has a high potential to be used as an ingredient by the food industry due to its excellent functionality and nutritional value.


2013 ◽  
Vol 336-338 ◽  
pp. 1882-1886
Author(s):  
Tian Fu ◽  
Zhen Wang ◽  
Pan Deng Yang

With the gradual application of RFID technology, the problems of privacy security arouse people's great attention. To address the problems of the existing RFID authentication protocol, such as the weakness on security and privacy, the high cost and the un-stabilizing systems performance, this paper puts forward a kind effective protection of privacy and low cost RFID security authentication protocol, analyses the security and performance of this protocol. This protocol can not only effectively solve the problems of replay attacks, location privacy attack and data synchronization, but also greatly use the Reader computing resources to reduce the cost of system construction, so it is appropriate for the application of RFID system.


2012 ◽  
Vol 6-7 ◽  
pp. 1072-1077 ◽  
Author(s):  
Gui Chao Wang ◽  
Ai Li Zhang ◽  
Yong Zhen Li

The security and privacy problem of low-cost RFID system is one of the most difficult conundrums in the RFID research field. A protocol based on access control was proposed in this paper, which used the reader access, partial ID, XOR operation, etc. By using of the reader authority distribution method, the unauthorized tag`s information was prevented give-away and it can avoid the lawful reader attack, location privacy attack, etc. Function of the reader was fully used. At the same time, the back-end database`s load and the time of the tag`s answer were reduced. Compared with several traditional security authentication protocols, this protocol is more security, lower energy consumption and more suitable for low-cost RFID system.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Aroosa ◽  
Syed Sajid Ullah ◽  
Saddam Hussain ◽  
Roobaea Alroobaea ◽  
Ihsan Ali

The Internet of Health Things (IoHT) is an extended version of the Internet of Things that is acting a starring role in data sharing remotely. These remote data sources consist of physiological processes, such as treatment progress, patient monitoring, and consultation. The main purpose of IoHT platform is to intervene independently from geographically remote areas by providing low-cost preventive or active healthcare services. Several low-power biomedical sensors with limited computing capabilities provide IoHT’s communication, integration, computation, and interoperability. However, IoHT transfers IoT data via IP-centric Internet, which has implications for security and privacy. To address this issue, in this paper, we suggest using named data networking (NDN), a future Internet model that is well suited for mobile patients and caregivers. As the IoHT contains a lot of personal information about a user’s physical condition, which can be detrimental to users’ finances and health if leaked, therefore, data protection is important in the IoHT. Experts and scholars have researched this area, but the reconstruction of existing schemes could be further improved. Also, doing computing-intensive tasks leads to slower response times, which further worsens the performance of IoHT. We are trying to resolve such an error, so a new NDN-based certificateless signcryption scheme is proposed for IoHT using the security hardness of the hyperelliptic curve cryptosystem. Security analysis and comparisons with existing schemes show the viability of the designed scheme. The final results confirm that the designed scheme provides better security with minimal computational and communicational resources. Finally, we validate the security of the designed scheme against man-in-the-middle attacks and replay attacks using the AVISPA tool.


Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4846
Author(s):  
Feng Zhu ◽  
Peng Li ◽  
He Xu ◽  
Ruchuan Wang

The Internet of Things (IoT) has been integrated into legacy healthcare systems for the purpose of improving healthcare processes. As one of the key technologies of IoT, radio frequency identification (RFID) technology has been applied to offer services like patient monitoring, drug administration, and medical asset tracking. However, people have concerns about the security and privacy of RFID-based healthcare systems, which require a proper solution. To solve the problem, recently in 2019, Fan et al. proposed a lightweight RFID authentication scheme in the IEEE Network. They claimed that their scheme can resist various attacks in RFID systems with low implementation cost, and thus is suitable for RFID-based healthcare systems. In this article, our contributions mainly consist of two parts. First, we analyze the security of Fan et al.’s scheme and find out its security vulnerabilities. Second, we propose a novel lightweight authentication scheme to overcome these security weaknesses. The security analysis shows that our scheme can satisfy the necessary security requirements. Besides, the performance evaluation demonstrates that our scheme is of low cost. Thus, our scheme is well-suited for practical RFID-based healthcare systems.


2022 ◽  
Vol 2022 ◽  
pp. 1-9
Author(s):  
Muhammad Asghar Khan ◽  
Insaf Ullah ◽  
Mohammed H. Alsharif ◽  
Abdulaziz H. Alghtani ◽  
Ayman A. Aly ◽  
...  

Internet of drones (IoD) is a network of small drones that leverages IoT infrastructure to deliver real-time data communication services to users. On the one hand, IoD is an excellent choice for a number of military and civilian applications owing to key characteristics like agility, low cost, and ease of deployment; on the other hand, small drones are rarely designed with security and privacy concerns in mind. Intruders can exploit this vulnerability to compromise the security and privacy of IoD networks and harm the information exchange operation. An aggregate signature scheme is the best solution for resolving security and privacy concerns since multiple drones are connected in IoD networks to gather data from a certain zone. However, most aggregate signature schemes proposed in the past for this purpose are either identity-based or relied on certificateless cryptographic methods. Using these methods, a central authority known as a trusted authority (TA) is responsible for generating and distributing secret keys of every user. However, the key escrow problem is formulated as knowing the secret key generated by the TA. These methods are hampered by key distribution issues, which restrict their applicability in a variety of situations. To address these concerns, this paper presents a certificate-based aggregate signature (CBS-AS) scheme based on hyperelliptic curve cryptography (HECC). The proposed scheme has been shown to be both efficient in terms of computation cost and unforgeable while testing its toughness through formal security analysis.


2019 ◽  
Vol 8 (3) ◽  
pp. 2937-2942

Introduction of IoT (Internet of Things) has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained till date. IoT systems collect the voluminous amount of data in real time from hospitals, battlefield and daily living environment which is related to privacy and security of people. So, securing collected sensitive data is one of the major challenges in the development of IoT systems. Authenticating the source of collected data is utmost important because the adversary may act as a source which may lead to a breach in security and privacy of people using the IoT network. IoT devices are resource scarce so lightweight methods for network security and privacy need to develop to achieve future development goals. In this paper, a novel lightweight node to node authentication scheme based on watermark is proposed to solve the contradiction between the security and restricted resources of perception layer. To improve the security, Proposed scheme usage node identity and the number of neighbours as input to generate the watermark and use the watermark to calculate the embedding positions which makes node authentication based on temporal dynamics of sensing network. The generated watermark is embedded in fixed size message digest generated using the variable message as input into a low-cost one-way hashing algorithm LOCHA. The embedded bits of watermark extracted at the receiving node and matched to check the authenticity of the sender node. The security analysis and simulations of the proposed scheme show that it can be a good candidate to ensure the authentication of the resource constraint devices which are integral part of Internet of Things at low cost


Author(s):  
José Pío Beltrán

The evolution of life has led to the formation of complex systems where plants are essentials. Homo sapiens’ success is based on its ability to obtain food. In what remains of this century, the world population will increase by a quarter of the current total, reaching 10 billion people. This is itself a major challenge, amplified by the environmental conditions resulting from global change and the threat to sustainability derived from the use of the planet’s natural resources. Thus, we wonder if we will be able to respond to this challenge and, to that end, how the plants of the future should look. Recent advances in sequencing techniques allow us to identify genomes at a low cost, and genome editing techniques have been developed, such as those derived from CRISPR/Cas9, which allow us to modify plant and animal genomes in a precise and targeted manner. This monograph analyses the possibility of cultivating plants outside our planet Earth; presents advances in genome editing such as those that have allowed my laboratory to obtain seedless tomatoes; assesses strategies that should lead to more plentiful harvests using fewer resources; and explains biotechnological strategies to strengthen plants’ immune systems or to use them as biofactories in which we can harvest molecules of health or nutrition interest. Will that be enough? Will we make it in time?


2014 ◽  
Vol 644-650 ◽  
pp. 4496-4500
Author(s):  
Hang Qin ◽  
Yi Liu

Radio Frequency Identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects. It is well suitable for many fields and is expected to replace barcodes in the near future. However, it is a challenging task to design an authentication protocol because of the limited resource of low-cost RFID tags. Recently, a lightweight RFID authentication protocol presented by Kulseng et al uses Physically Unclonable Functions (PUFs) and Linear Feedback Shift Registers (LFSRs) which are well known lightweight operations. The number of gates which the protocol require can be significantly decreased. Unfortunately, their protocol faces several serious security issues. In this paper, based PUFs and LFSRs, we suggest a secure mutual authentication for low-cost RFID Systems. Security analysis shows that our protocol owns security and privacy.


Author(s):  
Emilie M. Hafner-Burton

In the last six decades, one of the most striking developments in international law is the emergence of a massive body of legal norms and procedures aimed at protecting human rights. In many countries, though, there is little relationship between international law and the actual protection of human rights on the ground. This book takes a fresh look at why it's been so hard for international law to have much impact in parts of the world where human rights are most at risk. The book argues that more progress is possible if human rights promoters work strategically with the group of states that have dedicated resources to human rights protection. These human rights “stewards” can focus their resources on places where the tangible benefits to human rights are greatest. Success will require setting priorities as well as engaging local stakeholders such as nongovernmental organizations and national human rights institutions. To date, promoters of international human rights law have relied too heavily on setting universal goals and procedures and not enough on assessing what actually works and setting priorities. This book illustrates how, with a different strategy, human rights stewards can make international law more effective and also safeguard human rights for more of the world population.


Sign in / Sign up

Export Citation Format

Share Document