A New Tracking-Attack Scenario Based on the Vulnerability and Privacy Violation of 5G AKA Protocol.
Ya-Chu ChengChung-An ShenPublished in: IEEE Access (2022)
Keyphrases
- authentication protocol
- security risks
- particle filter
- cryptographic protocols
- denial of service attacks
- rfid systems
- homomorphic encryption
- real time
- privacy preserving
- key exchange protocol
- mutual authentication
- lightweight
- object tracking
- attack graphs
- denial of service
- privacy violations
- smart card
- vertically partitioned data
- trusted third party
- personal information
- countermeasures
- multi party
- penetration testing
- security vulnerabilities
- public key
- security analysis
- privacy issues
- attack graph
- security properties
- privacy protection
- buffer overflow
- appearance model
- security issues
- rfid tags
- private information retrieval
- key distribution