Location-privacy leakage and integrated solutions for 5G cellular networks and beyond

S Tomasin, M Centenaro, G Seco-Granados, S Roth… - Sensors, 2021 - mdpi.com
The fifth generation (5G) of cellular networks improves the precision of user localization and
provides the means to disclose location information to over-the-top (OTT) service providers …

[PDF][PDF] AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials

H Yu, C Du, Y Xiao, A Keromytis, C Wang… - Network and …, 2023 - angelosk.github.io
Mobile tracking has long been a privacy problem, where the geographic data and
timestamps gathered by mobile network operators (MNOs) are used to track the locations …

Privacy challenges with protecting live vehicular location context

M Bradbury, P Taylor, UI Atmaca, C Maple… - IEEE …, 2020 - ieeexplore.ieee.org
Future Intelligent Transport Systems (ITS) will require that vehicles are equipped with
Dedicated Short Range Communications (DSRC). With these DSRC capabilities, new …

Mobile tracking in 5g and beyond networks: Problems, challenges, and new directions

C Du, H Yu, Y Xiao, W Lou, C Wang… - 2022 IEEE 19th …, 2022 - ieeexplore.ieee.org
This paper explores mobile tracking as a privacy threat posed by 5G and beyond (5G&B)
cellular networks. We reviewed the mobile network operation and protocol design, with a …

P3LI5: Practical and confidEntial Lawful Interception on the 5G core

F Intoci, J Sturm, D Fraunholz… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Lawful Interception (LI) is a legal obligation of Communication Service Providers (CSPs) to
provide interception capabilities to Law Enforcement Agencies (LEAs) in order to gain …

DOLOS: Tricking the Wi-Fi APs with Incorrect User Locations

A Arun, V Anand, W Sun, R Ayyalasomayajula… - arXiv preprint arXiv …, 2024 - arxiv.org
Wi-Fi-based indoor localization has been extensively studied for context-aware services. As
a result, the accurate Wi-Fi-based indoor localization introduces a great location privacy …

Protecting locations with differential privacy against location-dependent attacks in continuous LBS queries

R Wen, R Zhang, K Peng… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
With the development of location-based services (LBS), concerns on location privacy
frequently arise. Location data often contains users' sensitive information, and direct release …

Quantifying Privacy in Cooperative Awareness Services Through Trajectory Reconstruction

A Daramas, V Kumar… - 2024 21st Annual …, 2024 - ieeexplore.ieee.org
Cooperatively creating awareness of the vehicle and its surroundings can improve the safety
of the transportation system. Creating such awareness involves frequently sharing the …

[PDF][PDF] Threats and protection on E-sim: a prospective study

AR Mathew - Novel Persp. of Eng. Research, 2022 - academia.edu
Threats include a variety of risks, and threats are associated with embedded SIM
technology, such as Internet of things (IoT) identity. IoT refers to the working capabilities that …

[PDF][PDF] Threats and protection on e-sim

A Mathew - Int. J. Recent. Technol. Eng, 2020 - academia.edu
Threats involve various risks and threats are associated with the embedded SIM technology,
for instance, the Internet of things (IoT) identity. IoT refers to the working capabilities …