Projects per year
Abstract
We present a thorough experimental and formal analysis of users’ privacy in mobile telephony systems. In particular, we experimentally analyse the use of pseudonyms and point out weak deployed policies leading to some critical scenarios which make it possible to violate a user’s privacy. We also expose some protocol’s vulnerabilities resulting in breaches of the anonymity and/or user unlinkability. We show these breaches translate in actual attacks which are feasible to implement on real networks and discuss our prototype implementation. In order to countermeasure these attacks, we propose realistic solutions. Finally, we provide the theoretical framework for the automatic verification of the unlinkability and anonymity of the fixed 2G/3G procedures and automatically verify them using the ProVerif tool.
Original language | English |
---|---|
Pages (from-to) | 491–523 |
Number of pages | 33 |
Journal | International Journal of Information Security |
Volume | 16 |
Issue number | 5 |
Early online date | 5 Jul 2016 |
DOIs | |
Publication status | Published - Oct 2017 |
Keywords
- Privacy
- Automatic verification
- ProVerif
- Mobile telephony
- Pseudonym
Fingerprint
Dive into the research topics of 'Analysis of privacy in mobile telephony systems'. Together they form a unique fingerprint.Projects
- 2 Finished
-
Leadership Fellowships 2009 : Analysing Security and Privacy Properties
Ryan, M. (Principal Investigator)
Engineering & Physical Science Research Council
1/04/10 → 30/09/15
Project: Research Councils
-
Verifying Interoperability requirements in Pervasive Systems
Ryan, M. (Principal Investigator) & Ritter, E. (Co-Investigator)
Engineering & Physical Science Research Council
8/10/08 → 7/03/13
Project: Research Councils