Location Privacy in the Era of 5G

dc.contributor.authorSchacht, Alexander
dc.contributor.authorFoster, Kayla
dc.contributor.authorRoth, John
dc.date.accessioned2020-12-24T20:25:59Z
dc.date.available2020-12-24T20:25:59Z
dc.date.issued2021-01-05
dc.description.abstractFifth Generation (5G) wireless technology is usher- ing in a new age of interconnectivity, and as it does definitions of privacy may well change with it. In this paper we will focus on the changing nature of location privacy, while aspiring to increase community cognizance of vulnerabilities within the 5G network that threaten end-user privacy. To this end, we will address the statistical efficacy of a multilateration attack utilizing timing advance commands within the 5G cloud radio access network, by showcasing that such an attack meets the Cramér-Rao Lower Bound across each subcarrier spacing. We will also demonstrate how position estimates within 5G can be further refined using methods previously shown to be effective in Long Term Evolution Networks. Lastly, we will demonstrate the attack in a simulated environment modeled after the conference grounds, using current real-world deployments of 5G on Kauai
dc.format.extent9 pages
dc.identifier.doi10.24251/HICSS.2021.826
dc.identifier.isbn978-0-9981331-4-0
dc.identifier.urihttp://hdl.handle.net/10125/71447
dc.language.isoEnglish
dc.relation.ispartofProceedings of the 54th Hawaii International Conference on System Sciences
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectCellular and Wireless Networks
dc.subject5g
dc.subjectc-ran
dc.subjectcrlb
dc.subjectlocation privacy
dc.subjecttiming management
dc.titleLocation Privacy in the Era of 5G
prism.startingpage6884

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
0673.pdf
Size:
15.79 MB
Format:
Adobe Portable Document Format