Automated key sharing in the authentication process of LTE base stations

  • Author(s) / Creator(s)
  • Sensitive information like the International Mobile Subscriber Identity has been a problem on all generations of mobile telecommunication networks, i.e., 2G, 3G and 4G. Many cases of compromising users' privacy in telecom networks have been reported. Cases of rogue base stations capable of tracking, intercepting and collecting the International Mobile Subscriber Identity without the users' knowledge have emerged. The Universal Subscriber Identity Module (USIM) of a mobile phone must reveal its International Mobile Subscriber Identity in plaintext when trying to establish connection with a base station for the first time. The International Mobile Subscriber Identity can be intercepted by attackers and this can amount to a passive or active attack. This paper proposes the use of a pre-shared key in the authentication process of Long Term Evolution (LTE) base stations to local users. This will result in a first hop authentication procedure to verify if the base station is legitimate by the User Equipment, this authentication will protect the International Mobile Subscriber Identity from been sent to a fake base station during the Evolved Packet System Authentication and Key
    Agreement authentication procedure.

  • Date created
    2018
  • Subjects / Keywords
  • Type of Item
    Research Material
  • DOI
    https://doi.org/10.7939/r3-75qm-r113
  • License
    Attribution-NonCommercial 4.0 International