{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:33:40Z","timestamp":1769920420959,"version":"3.49.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030047610","type":"print"},{"value":"9783030047627","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04762-7_6","type":"book-chapter","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T05:13:48Z","timestamp":1542690828000},"page":"95-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Defeating the Downgrade Attack on Identity Privacy in 5G"],"prefix":"10.1007","author":[{"given":"Mohsin","family":"Khan","sequence":"first","affiliation":[]},{"given":"Philip","family":"Ginzboorg","sequence":"additional","affiliation":[]},{"given":"Kimmo","family":"J\u00e4rvinen","sequence":"additional","affiliation":[]},{"given":"Valtteri","family":"Niemi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,21]]},"reference":[{"key":"6_CR1","unstructured":"Soltani, A., Timberg, C.: Tech firm tries to pull back curtain on surveillance efforts in Washington, September 2014. https:\/\/www.washingtonpost.com\/world\/national-security\/researchers-try-to-pull-back-curtain-on-surveillance-efforts-in-washington\/2014\/09\/17\/f8c1f590-3e81-11e4-b03f-de718edeb92f_story.html?utm_term=.96e31aa4440b . Accessed 14 July 2017"},{"key":"6_CR2","unstructured":"PKI Electronic Intelligence: 3G UMTS IMSI Catcher. http:\/\/www.pki-electronic.com\/products\/interception-and-monitoring-systems\/3g-umts-imsi-catcher\/ . Accessed 6 July 2018"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., Weippl, E.: IMSI-catch me if you can: IMSI-catcher-catchers. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, pp. 246\u2013255. ACM, New York (2014)","DOI":"10.1145\/2664243.2664272"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Ney, P., Smith, J., Gabriel, C., Tadayoshi, K.: SeaGlass: enabling city-wide IMSI-catcher detection. In: Proceedings on Privacy Enhancing Technologies. PoPETs (2017)","DOI":"10.1515\/popets-2017-0027"},{"key":"6_CR5","unstructured":"3GPP: TS 22.261 Service requirements for next generation new services and markets (2018). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3107"},{"key":"6_CR6","unstructured":"3GPP: TS 33.501 Security architecture and procedures for 5G System, March 2018. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3169"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Van den Broek, F., Verdult, R., de Ruiter, J.: Defeating IMSI catchers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015. ACM (2015)","DOI":"10.1145\/2810103.2813615"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-319-27152-1_9","volume-title":"Security Standardisation Research","author":"MSA Khan","year":"2015","unstructured":"Khan, M.S.A., Mitchell, C.J.: Improving air interface user privacy in mobile telephony. In: Chen, L., Matsuo, S. (eds.) SSR 2015. LNCS, vol. 9497, pp. 165\u2013184. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27152-1_9"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Norrman, K., N\u00e4slund, M., Dubrova, E.: Protecting IMSI and user privacy in 5G networks. In: Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2016. ICST (2016)","DOI":"10.4108\/eai.18-6-2016.2264114"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Ginzboorg, P., Niemi, V.: Privacy of the long-term identities in cellular networks. In: Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2016. ICST (2016)","DOI":"10.4108\/eai.18-6-2016.2264410"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Khan, M., Mitchell, C.: Trashing IMSI catchers in mobile networks. In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, 18\u201320 July 2017. Association for Computing Machinery (ACM), United States, May 2017","DOI":"10.1145\/3098243.3098248"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-319-72598-7_22","volume-title":"Information Systems Security","author":"M Khan","year":"2017","unstructured":"Khan, M., J\u00e4rvinen, K., Ginzboorg, P., Niemi, V.: On de-synchronization of user pseudonyms in\u00a0mobile networks. In: Shyamasundar, R.K., Singh, V., Vaidya, J. (eds.) ICISS 2017. LNCS, vol. 10717, pp. 347\u2013366. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72598-7_22"},{"key":"6_CR13","unstructured":"3GPP: TS 23.003, 15.4.0 Numbering, addressing and identification, June 2018. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=729"},{"key":"6_CR14","unstructured":"3GPP: TS 23.501 System Architecture for the 5G System (2018). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3144"},{"key":"6_CR15","unstructured":"Khan, M., Ginzboorg, P., Niemi, V.: IMSI-based routing and identity privacy in 5G. In: Proceedings of the 22nd Conference of Open Innovations Association FRUCT, Jyvaskyla, Finland, May 2018"},{"key":"6_CR16","unstructured":"3GPP: TS 33.401 V15.0.0 Security architecture (Release 15), June 2017. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2296"},{"key":"6_CR17","unstructured":"3GPP: TS 23.012 V14.0.0 Location management procedures (Release 14), March 2017. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=735"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Krawczyk, H., Tsudik, G.: On travelling incognito. In: 1994 First Workshop on Mobile Computing Systems and Applications. IEEE Xplore (1994)","DOI":"10.1109\/WMCSA.1994.29"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Asokan, N.: Anonymity in a mobile computing environment. In: First Workshop on Mobile Computing Systems and Applications. IEEE, Santa Cruz (1994)","DOI":"10.1109\/WMCSA.1994.9"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"K\u00f8ien, G.M.: Privacy enhanced mutual authentication in LTE. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 614\u2013621, October 2013","DOI":"10.1109\/WiMOB.2013.6673421"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/978-3-319-64701-2_41","volume-title":"Network and System Security","author":"M Khan","year":"2017","unstructured":"Khan, M., Niemi, V.: Concealing IMSI in 5G network using identity based encryption. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) NSS 2017. LNCS, vol. 10394, pp. 544\u2013554. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64701-2_41"},{"key":"6_CR22","unstructured":"Certicom Research: SEC 1: Elliptic Curve Cryptography. Standards for Efficient Cryptography, Ver. 2.0, May 2009. http:\/\/www.secg.org\/sec1-v2.pdf"},{"key":"6_CR23","unstructured":"Certicom Research: SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography, Ver. 2.0, January 2010. http:\/\/www.secg.org\/sec2-v2.pdf"},{"key":"6_CR24","unstructured":"NIST: Advanced Encryption Standard (AES). FIPS PUB 197 (2001)"},{"key":"6_CR25","unstructured":"NIST: Recommendation for Block Cipher Modes of Operation: Methods and Techniques. SP 800\u201338A (2001)"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. RFC 2104, February 1997","DOI":"10.17487\/rfc2104"},{"key":"6_CR27","unstructured":"NIST: Secure hash standard (SHS). FIPS PUB 180-4 (2012)"},{"key":"6_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11745853_14"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Langley, A., Hamburg, M., Turner, S.: Elliptic Curves for Security. RFC 7748, January 2016","DOI":"10.17487\/RFC7748"},{"key":"6_CR30","unstructured":"Interactive digital media GmbH: Mobile Country Codes (MCC) and Mobile Network Codes (MNC). http:\/\/www.mcc-mnc.com\/"},{"key":"6_CR31","unstructured":"Wikipedia: List of mobile network operators. https:\/\/en.wikipedia.org\/wiki\/List_of_mobile_network_operators"},{"key":"6_CR32","unstructured":"3GPP: TS 33.106: 3G security; Lawful interception requirements (2018). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2265"},{"key":"6_CR33","unstructured":"3GPP: TS 33.126 V15.0.0 Lawful Interception requirements, June 2018. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3181"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04762-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T14:10:59Z","timestamp":1572963059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04762-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030047610","9783030047627"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04762-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssr2018.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"16","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}