Privacy through Pseudonymity in Mobile Telephony Systems
- Submitting institution
-
The University of Birmingham
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 24113005
- Type
- E - Conference contribution
- DOI
-
10.14722/ndss.2014.23082
- Title of conference / published proceedings
- 21st Annual Network and Distributed System Security Symposium (NDSS'14)
- First page
- 1
- Volume
- -
- Issue
- -
- ISSN
- -
- Open access status
- -
- Month of publication
- February
- Year of publication
- 2014
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
3
- Research group(s)
-
-
- Citation count
- -
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- This paper shows that weaknesses in 3G mobile phone protocols allow mobile phone users to be easily traced. We describe concrete attacks, propose countermeasures, and formally verify that the modified protocols satisfy the desired privacy properties. The attacks are easily executable. The novel techniques for verifying the fixes are applicable to similar scenarios which are common. The problems described in this paper arise also for the latest mobile phone protocols, and several proposals to fix the issues we identified have been developed. This paper has been published in one of the top conferences in Computer Security.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -