Font Size: a A A

Research On The Method Of User Identity Hiding In 5G Network Based On Terminal

Posted on:2021-03-08Degree:MasterType:Thesis
Country:ChinaCandidate:H P HuFull Text:PDF
GTID:2428330611977335Subject:Engineering
Abstract/Summary:PDF Full Text Request
In 4G and 5G networks,the user's identity is uniquely identified mainly through the globally unique IMSI or signed permanent identifier(SUPI),which is then associated with the user's identity,location,phone number and other privacy information,and even serves as an important credential for various mobile payments.With the development of the mobile Internet and the Internet of things,the mobile communication network also needs to carry the key users and services that are important to the country and society.These users' information is sensitive,the leakage can cause serious consequences or economic losses,is the main target of organized attackers.Therefore,it is of great significance to protect the mobile communication identity of high-value users,IMSI/SUPI,for both individuals and countries.Based on 4G and 5G mobile communication standard of user IMSI/SUPI attacker could easily access problems by visiting mode,through to the 4G and 5G user identity protection mechanism and the analysis of the threat,put forward by the end user(UE)launched by the IMSI or SUPI identity hiding technology and its realization method,in meet the 4G/5G under the premise of related standards and processes,with fewer changes and customization,realize the user's identity hidden and dynamic update,increase the attacker by IMSI or SUPI difficult to track the identity of the users,To meet the needs of high security special users to user identity hiding.This paper firstly studies the IMSI/ SUPI identity hiding mechanism of 2G,3G,4G and 5G mobile communication,and focuses on the security threats and potential privacy leakage risks that may still exist after the introduction of user hidden identifier(SUCI)in 5G system.On this basis,through the 5G service in high security industry as a key to identity the specific requirements of the privacy protection analysis,this paper proposes a terminal side SUPI random transform the identity of the hidden method,from the perspective of possible threats,the possible mechanism of hidden ideas are analyzed,and puts forward the hidden identity must solve four problems:(1)of the mobile communication terminal,yuan protocol compatible and can modify the range;(2)SUPI transformation synchronization between terminal side and network side;(3)SUPI synchronous control information interaction channel between terminal side and network side;(4)the number space of SUPI corresponding to each user and its range of changes.In order to solve these problems,this paper designs an identity hiding scheme in which SUPI random changes are initiated by the terminal side.This scheme USES the cryptographic mechanism to generate new SUPI information with small probability of collision on the terminal side,and USES the new SUPI to generate attachment request.SUPI transformation is carried out synchronously on the network side,and collision is judged,and error correction is carried out in case of collision.In this way,the SUPI of terminal side and network side can change randomly simultaneously,and the identity hiding problem of SUPI in access network and core network visiting domain can be solved.The simulation results show that when the SUPI space that the user can transform is large,the user's identity can be effectively hidden,preventing the attacker from obtaining the user's privacy and communication information through the user's identity information.
Keywords/Search Tags:mobile communication system, 5G, IMSI/SUPI, Subscription identifier privacy, UE
PDF Full Text Request
Related items