과제정보
We thank the editors and anonymous reviewers for their helpful feedback. This work was supported by National Science Foundation under Grant No. 1922410 and by Institute of Information & communications Technology Planning & Evaluation (IITP) grants funded by the Korea government (MSIT) (No. 2021-0-00796, Research on Foundational Technologies for 6G Autonomous Security-by-Design to Guarantee Constant Quality of Security; No.2021-0-02107, Collaborative Research on Element Technologies for 6G Security-by-Design and Standardization-Based International Cooperation).
참고문헌
- G. S. M., 3.20 version 3.3.2, European Digital Cellular Telecommunication System (Phase1), 1991.
- 3GPP. TS 33.501, Security architecture and procedures for 5G System, 2021.
- A. Shaik, R. Borgaonkar, N. Asokan, V. Niemi, and J.-P. Seifert, Practical attacks against privacy and availability in 4G/LTE mobile communication systems, 2015. arXiv preprint arXiv:1510.07563.
- B. Hong, S. Bae, and Y. Kim, GUTIreallocation demystified: Cellular location tracking with changing temporary identifier, Network and Distributed Systems Security Symposium, SanDiego, CA, USA), 2018. https://doi.org/10.14722/ndss.2018.23349
- D. F. Kune, J. Koelndorfer, N. Hopper, and Y. Kim, Location leaks on the GSM air interface, (Network and Distributed Systems Security Symposium, SanDiego, CA, USA), 2012.
- S. R. Hussain, M. Echeverria, O. Chowdhury, N. Li, and E. Bertino, Privacy attacks to the 4G and 5G cellular paging protocols using side channel information, (Network and Distributed Systems Security, San Diego, CA, USA), 2019. https://doi.org/10.14722/ndss.2019.23442
- D. Rupprecht, K. Kohls, T. Holz, and C. Popper, Breaking LTE on layer two, (IEEE Symposium on Security and Privacy, San Francisco, CA, USA). IEEE, 2019, pp. 1121-1136.
- S. Bae, M. Son, D. Kim, C. Park, J. Lee, S. Son, and Y. Kim, Watching the watchers: Practical video identification attack in fLTEg networks, (31st Usenix Security Symposium (Usenix Security 22), Boston, MA, USA) 2022, pp. 1307-1324.
- H. Kim, J. Lee, E. Lee, and Y. Kim, Touching the untouchables: Dynamic security analysis of the lte control plane, (IEEE Symposium on Security and Privacy, San Francisco, CA, USA), 2019, pp. 1153-1168.
- 3GPP. TR 21.915, Release 15, 2021. https://www.3gpp.org/release-15
- 3GPP. TR 21.916, Release 16, 2021. https://www.3gpp.org/release-16
- U. Gorrepati, P. Zavarsky, and R. Ruhl, Privacy protection in lte and 5G networks, (2nd International Conference on Secure Cyber Computing and Communications, Jalandhar, India), 2021, pp. 382-387.
- T. Dittler, F. Tschorsch, S. Dietzel, and B. Scheuermann, Anotel: Cellular networks with location privacy, (IEEE 41st Conference on Local Computer Networks, Dubai, United Arab Emirates) 2016, pp. 635-638.
- H. Nicanfar, J. Hajipour, F. Agharebparast, P. TalebiFard, and V. ictorC. M. Leung, Privacy-preserving handover mechanism in 4G, (IEEE Conference on Communications and Network Security, National Harbor, MD, USA), 2013, pp. 373-374.
- Y. Wu, H.-N. Dai, H. Wang, and K.-K. R. Choo, Blockchainbased privacy preservation for 5G-enabled drone communications, IEEE Netw. 35 (2021), no. 1, 50-56.
- A. Haque, V. Madathil, B. Reaves, and A. Scafuro, Anonymous device authorization for cellular networks, (Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, pp. 25-36.
- 3GPP. TS 23.003, Numbering, addressing and identification, 2021.
- S. R. Hussain, M. Echeverria, I. Karim, O. Chowdhury, and E. Bertino, 5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol, (Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom), 2019, pp. 669-684.
- 3GPP. TS 36.321, Medium Access Control (MAC) protocol specification, 2021.
- A. Shaik, R. Borgaonkar, S. Park, and J.-P. Seifert, New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities, (Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, Miami, FL, USA), 2019, pp. 221-231.
- 3GPP. TS 36.331, Radio Resource Control (RRC), 2021.
- A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, A statistical test suite for random and pseudorandom number generators for cryptographic applications, Booz-Allen and Hamilton inc, McLean, VA, 2001.
- A. W. Appel, Verification of a cryptographic primitive: Sha-256, ACM Trans. Program. Lang. Syst. (TOPLAS) 37 (2015), no. 2, 1-31. https://doi.org/10.1145/2701415
- L. Lamport, Password authentication with insecure communication, Commun. ACM 24 (1981), no. 11, 770-772. https://doi.org/10.1145/358790.358797
- S.-Y. Chang, Y. Park, and B. B. A. Babu, Fast IP hopping randomization to secure hop-by-hop access in SDN, IEEE Trans. Netw. Service Manag. 16 (2018), no. 1, 308-320.
- A. Perrig, R. Canetti, J. D. Tygar, and D. Song, The tesla broadcast authentication protocol, Rsa Cryptobytes 5 (2002), no. 2, 2-13.
- Quora, How big of an area and how many people does one cell tower usually cover, 2022. https://www.quora.com/How-big-of-an-area-and-how-many-people-does-one-cell-tower-usuallycover [last accessed March 2022].
- Alexa, 2022. https://www.alexa.com/topsites [last accessed March 2022].
- IANA, Internet Assigned Numbers Authority. https://www.iana.org/
- L. Wenwei, Z. Dafang, Y. Jinmin, and X. Gaogang, On evaluating the differences of TCP and ICMP in network measurement, Comput. Commun. 30 (2007), no. 2, 428-439. https://doi.org/10.1016/j.comcom.2006.09.015