Abstract
This paper is in the area of pseudonym-based enhancements of user identity privacy in mobile networks. Khan and Mitchell (2017) have found that in recently published pseudonym-based schemes an attacker can desynchronize the pseudonyms’ state in the user equipment and in its home network. In this paper, we first show that by exploiting this vulnerability a botnet of mobile devices can kick out of service a large portion of the users of a mobile network. We characterize this novel DDoS attack analytically and confirm our analysis using a simulation. Second, we explain how to modify the pseudonym-based schemes in order to mitigate the DDoS attack. The proposed solution is simpler than that in Khan and Mitchell (2017). We also discuss aspects of pseudonym usage in mobile network from charging and regulatory point of view.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Samfat, D., Molva, R., Asokan, N.: Untraceability in mobile networks. In: Proceedings of the 1st Annual International Conference on Mobile Computing and Networking, MobiCom 1995, pp. 26–36. ACM, New York (1995)
Strobel, D.: IMSI Catcher, July 2007. https://www.emsec.rub.de/media/crypto/attachments/files/2011/04/imsi_catcher.pdf
Ginzboorg, P., Niemi, V.: Privacy of the long-term identities in cellular networks. In: Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2016, ICST (2016)
Soltani, A., Timberg, C.: Tech firm tries to pull back curtain on surveillance efforts in Washington, September 2014. https://www.washingtonpost.com/world/national-security/researchers-try-to-pull-back-curtain-on-surveillance-efforts-in-washington/2014/09/17/f8c1f590-3e81-11e4-b03f-de718edeb92f_story.html?utm_term=.96e31aa4440b
Ney, P., Smith, J., Gabriel, C., Tadayoshi, K.: SeaGlass: enabling city-wide IMSI-catcher detection. In: Proceedings on Privacy Enhancing Technologies, PoPETs (2017)
Intelligence, P.E.: 3G UMTS IMSI Catcher. http://www.pki-electronic.com/products/interception-and-monitoring-systems/3g-umts-imsi-catcher/
Van den Broek, F., Verdult, R., de Ruiter, J.: Defeating IMSI catchers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015. ACM (2015)
Khan, M.S.A., Mitchell, C.J.: Improving air interface user privacy in mobile telephony. In: Chen, L., Matsuo, S. (eds.) SSR 2015. LNCS, vol. 9497, pp. 165–184. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27152-1_9
Norrman, K., Näslund, M., Dubrova, E.: Protecting IMSI and user privacy in 5G networks. In: Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2016, ICST (2016)
Muthana, A.A., Saeed, M.M.: Analysis of user identity privacy in LTE and proposed solution. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 1, 54–63 (2017). MECS Publisher
Khan, M., Mitchell, C.: Trashing IMSI catchers in mobile networks. In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, 18–20 July 2017. Association for Computing Machinery (ACM), United States, May 2017
3GPP: 3GPP TS 33.102 V14.1.0 Security architecture (Release 14), March 2017. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2262
3GPP: 3GPP TS 33.401 V15.0.0 Security architecture (Release 15), June 2017. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2296
3GPP: 3GPP TS 23.012 V14.0.0 Location management procedures (Release 14), March 2017. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=735
Ahlström, M., Holmberg, S.: Prototype Implementation of a 5G Group-Based Authentication and Key Agreement Protocol (2016). http://lup.lub.lu.se/luur/download?func=downloadFile&recordOId=8895975&fileOId=8895979
Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., McDaniel, P., La Porta, T.: On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 223–234. ACM, New York (2009)
Xiang, C., Binxing, F., Lihua, Y., Xiaoyi, L., Tianning, Z.: Andbot: towards advanced mobile botnets. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET 2011, p. 11. USENIX Association, Berkeley (2011)
Chen, W., Luo, X., Yin, C., Xiao, B., Au, M.H., Tang, Y.: MUSE: towards robust and stealthy mobile botnets via multiple message push services. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 20–39. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40253-6_2
Linuxbsdos: Geinimi a Sophisticated New Android Trojan Found in Wild (2010). http://linuxbsdos.com/2010/12/29/geinimi-sophisticated-new-android-trojan-found-in-wild/
KrebsonSecurity: ZeuS Trojan for Google Android Spotted (2011). https://krebsonsecurity.com/2011/07/zeus-trojan-for-google-android-spotted/
Jiang, X.: Security Alert: AnserverBot, New Sophisticated Android Bot Found in Alternative Android Markets (2011). https://www.csc2.ncsu.edu/faculty/xjiang4/AnserverBot/
Tung, L.: Android Dreamdroid two: rise of laced apps (2011). https://www.itnews.com.au/news/android-dreamdroid-two-rise-of-lacedapps-259147
Karim, A., Shah, S.A.A., Salleh, R.B., Arif, M., Noor, R.M., Shamshirband, S.: Mobile botnet attacks - an emerging threat: classification, review and open issues. KSII Trans. Internet Inf. Syst. 9(4), 1471–1492 (2015)
Muncaster, P.: Chinese cops cuff 1,500 in fake base station spam raid, March 2014. https://www.theregister.co.uk/2014/03/26/spam_text_china_clampdown_police/
Wikipedia: Data Retention Directive. https://en.wikipedia.org/wiki/Data_Retention_Directive
Acknowledgement
We thank Markku Antikainen for the useful discussion to characterize the DDoS attack and his help to optimize the code of the simulation of the DDoS attack.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix A
Let us consider \(\mathcal {M}\) bins, each labeled with a pseudonym or IMSI. Choosing m random pseudonyms with replacement and sending them in an attach request can be compared with the classic experiment of throwing m balls to \(\mathcal {M}\) bins. The number of affected users by sending m attach requests is the same as the number of bins that get two or more balls after throwing m balls to \(\mathcal {M}\) bins. The probability that a particular bin gets no balls is \(\left( 1-\frac{1}{\mathcal {M}}\right) ^m\). The probability that this bin gets exactly one ball is \(\left( {\begin{array}{c}m\\ 1\end{array}}\right) \frac{1}{\mathcal {M}}\left( 1-\frac{1}{\mathcal {M}}\right) ^{m-1}\). Consequently, the probability that the bin will get two or more balls is:
If n is the number of users in the HN, then by linearity of expectation, the expected number of affected user would be:
Consequently, the expected portion of affected user would be:
Appendix B
In the without replacement attack, the attacker sends all the pseudonyms incrementally starting from 0 across the whole MSIN space. Let us consider that the pseudonym x is the first attack on a user’s \(p'\). Once the user’s \(p'\) is attacked, HN updates \(p \leftarrow p'\) and choose a new unused \(p'\) randomly. If the attacker sends total m number of pseudonyms to the HN, then the probability that the user’s new \(p'\) will once again be attacked is: \(\frac{m-x}{\mathcal {M}}\). If n is the total number of subscribers in the HN and \(m \le \mathcal {M}\) (first round) then expected number of subscribers affected after sending m pseudonyms is:
Consequently, the expected portion of affected users would be \(\frac{m^2}{2\mathcal {M}^2}\) where \(m \le \mathcal {M}\).
Let us now consider the case where \(\mathcal {M} < m \le 2\mathcal {M}\) (second round). The attacker again sends all the pseudonyms incrementally starting from 0. Choosing a pseudonym x will affect a user (who has not yet been affected) only if x is the pseudonym of a user who was attacked only once in the first round. The probability of that event is: \(1 - \frac{x}{\mathcal {M}}\). So, after sending \(m = \mathcal {M} + m'\) number of pseudonyms, the expected number of affected user would be:
Consequently, the expected portion of affected users would be \(\frac{1}{\mathcal {M}} \left( 2m - \mathcal {M} -\right. \) \(\left. \frac{m^2}{2\mathcal {M}} \right) \) where \(\mathcal {M} < m \le 2\mathcal {M}\).
Even though x in the above derivation is a discrete variable, we have used integration. So, the result we have found here is an approximation since \(\mathcal {M}\) is large. We expect it to be a good approximation.
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Khan, M., Järvinen, K., Ginzboorg, P., Niemi, V. (2017). On De-synchronization of User Pseudonyms in Mobile Networks. In: Shyamasundar, R., Singh, V., Vaidya, J. (eds) Information Systems Security. ICISS 2017. Lecture Notes in Computer Science(), vol 10717. Springer, Cham. https://doi.org/10.1007/978-3-319-72598-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-72598-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72597-0
Online ISBN: 978-3-319-72598-7
eBook Packages: Computer ScienceComputer Science (R0)