Vis enkel innførsel

dc.contributor.authorSørseth, Christian
dc.contributor.authorZhou, Xianyu Shelley
dc.contributor.authorMjølsnes, Stig Frode
dc.contributor.authorOlimid, Ruxandra-Florentina
dc.date.accessioned2019-06-27T11:12:40Z
dc.date.available2019-06-27T11:12:40Z
dc.date.created2019-02-28T15:34:50Z
dc.date.issued2018
dc.identifier.issn2331-8422
dc.identifier.urihttp://hdl.handle.net/11250/2602549
dc.description.abstractOver the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes vulnerabilities that attackers can exploit. This might be the case of paging messages, wake-up notifications that target specific subscribers, and that are broadcasted in clear over the radio interface. If they are not properly implemented, paging messages can expose the identity of subscribers and furthermore provide information about their location. It is therefore important that mobile network operators comply with the recommendations and implement the appropriate mechanisms to mitigate attacks. In this paper, we verify by experiment that paging messages can be captured and decoded by using minimal technical skills and publicly available tools. Moreover, we present a general experimental method to test privacy exposure by LTE paging messages, and we conduct a case study on three different LTE mobile operators.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.relation.urihttps://arxiv.org/abs/1807.11350
dc.titleExperimental Analysis of Subscribers' Privacy Exposure by LTE Pagingnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber11nb_NO
dc.source.journalarXiv.orgnb_NO
dc.identifier.doi10.1007/s11277-019-06585-7
dc.identifier.cristin1681526
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [Wireless Personal Communications] Locked until 15.5.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/s11277-019-06585-7nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel