Dynamic ID randomization for user privacy in mobile network

Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile ne...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ETRI journal 2022-12, Vol.44 (6), p.903-914
Hauptverfasser: Arijet Sarker, SangHyun Byun, Manohar Raavi, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang
Format: Artikel
Sprache:kor
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 914
container_issue 6
container_start_page 903
container_title ETRI journal
container_volume 44
creator Arijet Sarker
SangHyun Byun
Manohar Raavi
Jinoh Kim
Jonghyun Kim
Sang-Yoon Chang
description Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.
format Article
fullrecord <record><control><sourceid>kyobo_kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO202250240528878</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4010036985682</sourcerecordid><originalsourceid>FETCH-LOGICAL-k602-fd18d945f052fd7a6cc8f47db91ce4ddee92517f8dd93e1dd2a13a380f84977c3</originalsourceid><addsrcrecordid>eNpNj0tLAzEYAIMouNT-h1w8LiRf3ngqrY9qoZfel2weEHY3keyq1F9vQQ-e5jIMzBVqABhrFQN5jRoKIFrJJbtF63lOPRGUUgVaNehhd852Sg7vd7ja7MuUvu2SSsaxVPwxh4rfa_q07oxTxlPp0xhwDstXqcMduol2nMP6jyt0eno8bV_aw_F5v90c2kESaKOn2hsuIhEQvbLSOR258r2hLnDvQzAgqIrae8MC9R4sZZZpEjU3Sjm2Qve_2SHNS-qyn8fudfN2BHLZIsAvXa2V_uedS1-6vpTBhbyE2nFCCWHSaCE1sB8GSVA1</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Dynamic ID randomization for user privacy in mobile network</title><source>DOAJ Directory of Open Access Journals</source><source>Wiley Free Content</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Arijet Sarker ; SangHyun Byun ; Manohar Raavi ; Jinoh Kim ; Jonghyun Kim ; Sang-Yoon Chang</creator><creatorcontrib>Arijet Sarker ; SangHyun Byun ; Manohar Raavi ; Jinoh Kim ; Jonghyun Kim ; Sang-Yoon Chang</creatorcontrib><description>Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.</description><identifier>ISSN: 1225-6463</identifier><identifier>EISSN: 2233-7326</identifier><language>kor</language><publisher>한국전자통신연구원</publisher><ispartof>ETRI journal, 2022-12, Vol.44 (6), p.903-914</ispartof><rights>COPYRIGHT(C) KYOBO BOOK CENTRE ALL RIGHTS RESERVED</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885</link.rule.ids></links><search><creatorcontrib>Arijet Sarker</creatorcontrib><creatorcontrib>SangHyun Byun</creatorcontrib><creatorcontrib>Manohar Raavi</creatorcontrib><creatorcontrib>Jinoh Kim</creatorcontrib><creatorcontrib>Jonghyun Kim</creatorcontrib><creatorcontrib>Sang-Yoon Chang</creatorcontrib><title>Dynamic ID randomization for user privacy in mobile network</title><title>ETRI journal</title><addtitle>ETRI journal</addtitle><description>Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.</description><issn>1225-6463</issn><issn>2233-7326</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>JDI</sourceid><recordid>eNpNj0tLAzEYAIMouNT-h1w8LiRf3ngqrY9qoZfel2weEHY3keyq1F9vQQ-e5jIMzBVqABhrFQN5jRoKIFrJJbtF63lOPRGUUgVaNehhd852Sg7vd7ja7MuUvu2SSsaxVPwxh4rfa_q07oxTxlPp0xhwDstXqcMduol2nMP6jyt0eno8bV_aw_F5v90c2kESaKOn2hsuIhEQvbLSOR258r2hLnDvQzAgqIrae8MC9R4sZZZpEjU3Sjm2Qve_2SHNS-qyn8fudfN2BHLZIsAvXa2V_uedS1-6vpTBhbyE2nFCCWHSaCE1sB8GSVA1</recordid><startdate>20221231</startdate><enddate>20221231</enddate><creator>Arijet Sarker</creator><creator>SangHyun Byun</creator><creator>Manohar Raavi</creator><creator>Jinoh Kim</creator><creator>Jonghyun Kim</creator><creator>Sang-Yoon Chang</creator><general>한국전자통신연구원</general><general>ETRI</general><scope>P5Y</scope><scope>SSSTE</scope><scope>JDI</scope></search><sort><creationdate>20221231</creationdate><title>Dynamic ID randomization for user privacy in mobile network</title><author>Arijet Sarker ; SangHyun Byun ; Manohar Raavi ; Jinoh Kim ; Jonghyun Kim ; Sang-Yoon Chang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-k602-fd18d945f052fd7a6cc8f47db91ce4ddee92517f8dd93e1dd2a13a380f84977c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2022</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Arijet Sarker</creatorcontrib><creatorcontrib>SangHyun Byun</creatorcontrib><creatorcontrib>Manohar Raavi</creatorcontrib><creatorcontrib>Jinoh Kim</creatorcontrib><creatorcontrib>Jonghyun Kim</creatorcontrib><creatorcontrib>Sang-Yoon Chang</creatorcontrib><collection>Kyobo Scholar (교보스콜라)</collection><collection>Scholar(스콜라)</collection><collection>KoreaScience</collection><jtitle>ETRI journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Arijet Sarker</au><au>SangHyun Byun</au><au>Manohar Raavi</au><au>Jinoh Kim</au><au>Jonghyun Kim</au><au>Sang-Yoon Chang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dynamic ID randomization for user privacy in mobile network</atitle><jtitle>ETRI journal</jtitle><addtitle>ETRI journal</addtitle><date>2022-12-31</date><risdate>2022</risdate><volume>44</volume><issue>6</issue><spage>903</spage><epage>914</epage><pages>903-914</pages><issn>1225-6463</issn><eissn>2233-7326</eissn><abstract>Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.</abstract><pub>한국전자통신연구원</pub><tpages>12</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1225-6463
ispartof ETRI journal, 2022-12, Vol.44 (6), p.903-914
issn 1225-6463
2233-7326
language kor
recordid cdi_kisti_ndsl_JAKO202250240528878
source DOAJ Directory of Open Access Journals; Wiley Free Content; EZB-FREE-00999 freely available EZB journals
title Dynamic ID randomization for user privacy in mobile network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T04%3A01%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kyobo_kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dynamic%20ID%20randomization%20for%20user%20privacy%20in%20mobile%20network&rft.jtitle=ETRI%20journal&rft.au=Arijet%20Sarker&rft.date=2022-12-31&rft.volume=44&rft.issue=6&rft.spage=903&rft.epage=914&rft.pages=903-914&rft.issn=1225-6463&rft.eissn=2233-7326&rft_id=info:doi/&rft_dat=%3Ckyobo_kisti%3E4010036985682%3C/kyobo_kisti%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true