248,716 research outputs found
On Security Research Towards Future Mobile Network Generations
Over the last decades, numerous security and privacy issues in all three
active mobile network generations have been revealed that threaten users as
well as network providers. In view of the newest generation (5G) currently
under development, we now have the unique opportunity to identify research
directions for the next generation based on existing security and privacy
issues as well as already proposed defenses. This paper aims to unify security
knowledge on mobile phone networks into a comprehensive overview and to derive
pressing open research questions. To achieve this systematically, we develop a
methodology that categorizes known attacks by their aim, proposed defenses,
underlying causes, and root causes. Further, we assess the impact and the
efficacy of each attack and defense. We then apply this methodology to existing
literature on attacks and defenses in all three network generations. By doing
so, we identify ten causes and four root causes of attacks. Mapping the attacks
to proposed defenses and suggestions for the 5G specification enables us to
uncover open research questions and challenges for the development of
next-generation mobile networks. The problems of unsecured pre-authentication
traffic and jamming attacks exist across all three mobile generations. They
should be addressed in the future, in particular, to wipe out the class of
downgrade attacks and, thereby, strengthen the users' privacy. Further advances
are needed in the areas of inter-operator protocols as well as secure baseband
implementations. Additionally, mitigations against denial-of-service attacks by
smart protocol design represent an open research question.Comment: Survey: 198 citations, 25 pages, 4 tables, 3 figure
Individual Privacy vs Population Privacy: Learning to Attack Anonymization
Over the last decade there have been great strides made in developing
techniques to compute functions privately. In particular, Differential Privacy
gives strong promises about conclusions that can be drawn about an individual.
In contrast, various syntactic methods for providing privacy (criteria such as
kanonymity and l-diversity) have been criticized for still allowing private
information of an individual to be inferred. In this report, we consider the
ability of an attacker to use data meeting privacy definitions to build an
accurate classifier. We demonstrate that even under Differential Privacy, such
classifiers can be used to accurately infer "private" attributes in realistic
data. We compare this to similar approaches for inferencebased attacks on other
forms of anonymized data. We place these attacks on the same scale, and observe
that the accuracy of inference of private attributes for Differentially Private
data and l-diverse data can be quite similar
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
- …
