Dynamic ID randomization for user privacy in mobile network
Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile ne...
Gespeichert in:
Veröffentlicht in: | ETRI journal 2022-12, Vol.44 (6), p.903-914 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | kor |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 914 |
---|---|
container_issue | 6 |
container_start_page | 903 |
container_title | ETRI journal |
container_volume | 44 |
creator | Arijet Sarker SangHyun Byun Manohar Raavi Jinoh Kim Jonghyun Kim Sang-Yoon Chang |
description | Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications. |
format | Article |
fullrecord | <record><control><sourceid>kyobo_kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO202250240528878</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4010036985682</sourcerecordid><originalsourceid>FETCH-LOGICAL-k602-fd18d945f052fd7a6cc8f47db91ce4ddee92517f8dd93e1dd2a13a380f84977c3</originalsourceid><addsrcrecordid>eNpNj0tLAzEYAIMouNT-h1w8LiRf3ngqrY9qoZfel2weEHY3keyq1F9vQQ-e5jIMzBVqABhrFQN5jRoKIFrJJbtF63lOPRGUUgVaNehhd852Sg7vd7ja7MuUvu2SSsaxVPwxh4rfa_q07oxTxlPp0xhwDstXqcMduol2nMP6jyt0eno8bV_aw_F5v90c2kESaKOn2hsuIhEQvbLSOR258r2hLnDvQzAgqIrae8MC9R4sZZZpEjU3Sjm2Qve_2SHNS-qyn8fudfN2BHLZIsAvXa2V_uedS1-6vpTBhbyE2nFCCWHSaCE1sB8GSVA1</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Dynamic ID randomization for user privacy in mobile network</title><source>DOAJ Directory of Open Access Journals</source><source>Wiley Free Content</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Arijet Sarker ; SangHyun Byun ; Manohar Raavi ; Jinoh Kim ; Jonghyun Kim ; Sang-Yoon Chang</creator><creatorcontrib>Arijet Sarker ; SangHyun Byun ; Manohar Raavi ; Jinoh Kim ; Jonghyun Kim ; Sang-Yoon Chang</creatorcontrib><description>Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.</description><identifier>ISSN: 1225-6463</identifier><identifier>EISSN: 2233-7326</identifier><language>kor</language><publisher>한국전자통신연구원</publisher><ispartof>ETRI journal, 2022-12, Vol.44 (6), p.903-914</ispartof><rights>COPYRIGHT(C) KYOBO BOOK CENTRE ALL RIGHTS RESERVED</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885</link.rule.ids></links><search><creatorcontrib>Arijet Sarker</creatorcontrib><creatorcontrib>SangHyun Byun</creatorcontrib><creatorcontrib>Manohar Raavi</creatorcontrib><creatorcontrib>Jinoh Kim</creatorcontrib><creatorcontrib>Jonghyun Kim</creatorcontrib><creatorcontrib>Sang-Yoon Chang</creatorcontrib><title>Dynamic ID randomization for user privacy in mobile network</title><title>ETRI journal</title><addtitle>ETRI journal</addtitle><description>Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.</description><issn>1225-6463</issn><issn>2233-7326</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>JDI</sourceid><recordid>eNpNj0tLAzEYAIMouNT-h1w8LiRf3ngqrY9qoZfel2weEHY3keyq1F9vQQ-e5jIMzBVqABhrFQN5jRoKIFrJJbtF63lOPRGUUgVaNehhd852Sg7vd7ja7MuUvu2SSsaxVPwxh4rfa_q07oxTxlPp0xhwDstXqcMduol2nMP6jyt0eno8bV_aw_F5v90c2kESaKOn2hsuIhEQvbLSOR258r2hLnDvQzAgqIrae8MC9R4sZZZpEjU3Sjm2Qve_2SHNS-qyn8fudfN2BHLZIsAvXa2V_uedS1-6vpTBhbyE2nFCCWHSaCE1sB8GSVA1</recordid><startdate>20221231</startdate><enddate>20221231</enddate><creator>Arijet Sarker</creator><creator>SangHyun Byun</creator><creator>Manohar Raavi</creator><creator>Jinoh Kim</creator><creator>Jonghyun Kim</creator><creator>Sang-Yoon Chang</creator><general>한국전자통신연구원</general><general>ETRI</general><scope>P5Y</scope><scope>SSSTE</scope><scope>JDI</scope></search><sort><creationdate>20221231</creationdate><title>Dynamic ID randomization for user privacy in mobile network</title><author>Arijet Sarker ; SangHyun Byun ; Manohar Raavi ; Jinoh Kim ; Jonghyun Kim ; Sang-Yoon Chang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-k602-fd18d945f052fd7a6cc8f47db91ce4ddee92517f8dd93e1dd2a13a380f84977c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2022</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Arijet Sarker</creatorcontrib><creatorcontrib>SangHyun Byun</creatorcontrib><creatorcontrib>Manohar Raavi</creatorcontrib><creatorcontrib>Jinoh Kim</creatorcontrib><creatorcontrib>Jonghyun Kim</creatorcontrib><creatorcontrib>Sang-Yoon Chang</creatorcontrib><collection>Kyobo Scholar (교보스콜라)</collection><collection>Scholar(스콜라)</collection><collection>KoreaScience</collection><jtitle>ETRI journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Arijet Sarker</au><au>SangHyun Byun</au><au>Manohar Raavi</au><au>Jinoh Kim</au><au>Jonghyun Kim</au><au>Sang-Yoon Chang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dynamic ID randomization for user privacy in mobile network</atitle><jtitle>ETRI journal</jtitle><addtitle>ETRI journal</addtitle><date>2022-12-31</date><risdate>2022</risdate><volume>44</volume><issue>6</issue><spage>903</spage><epage>914</epage><pages>903-914</pages><issn>1225-6463</issn><eissn>2233-7326</eissn><abstract>Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.</abstract><pub>한국전자통신연구원</pub><tpages>12</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1225-6463 |
ispartof | ETRI journal, 2022-12, Vol.44 (6), p.903-914 |
issn | 1225-6463 2233-7326 |
language | kor |
recordid | cdi_kisti_ndsl_JAKO202250240528878 |
source | DOAJ Directory of Open Access Journals; Wiley Free Content; EZB-FREE-00999 freely available EZB journals |
title | Dynamic ID randomization for user privacy in mobile network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T04%3A01%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kyobo_kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dynamic%20ID%20randomization%20for%20user%20privacy%20in%20mobile%20network&rft.jtitle=ETRI%20journal&rft.au=Arijet%20Sarker&rft.date=2022-12-31&rft.volume=44&rft.issue=6&rft.spage=903&rft.epage=914&rft.pages=903-914&rft.issn=1225-6463&rft.eissn=2233-7326&rft_id=info:doi/&rft_dat=%3Ckyobo_kisti%3E4010036985682%3C/kyobo_kisti%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |