"The geographic data and timestamps of subscribers held by mobile carriers have long been used by law enforcement and intelligence agencies to conduct legal investigations, largescale surveillance, or even unconstitutional search. Meanwhile, with the surge in popularity of Location-based Services (LBS) over the past decade, selling the geolocation information of average mobile users has become a lucrative enterprise. Many mobile carriers, the leading aggregators of user location data, have repeatedly breached user privacy agreements and sold users’ location history to third parties without user consent. Location privacy is exacerbated by the reality that cellular-connected mobile devices will inevitably be localized more precisely as a result of continual enhancements to the positioning and localization technologies of 5G, 6G, and beyond networks. To address these challenges, we propose AAKA, a privacypreserving anonymous mutual authentication and key agreement scheme that is compatible with the cellular architecture and SIM standardized by 3GPP.1 At its core, AAKA leverages anonymous credentials (AC) to offer anonymity, unlinkability, unforgeability, and accountability in addition to meeting 3GPP’s fundamental security requirements for the User Equipment(UE) authentication and key agreement process. The evaluation demonstrates that the scheme is practical, with a credential presentation taking ∼52 ms on a constrained host device equipped with a standard cellular SIM card. "
AAKA: An Anti-Tracking Anonymous Authentication Scheme for Next Generation Mobile Networks
AAKA: An Anti-Tracking Anonymous Authentication Scheme for Next Generation Mobile Networks
AAKA: An Anti-Tracking Anonymous Authentication Scheme for Next Generation Mobile Networks
Related Content
EdgeHaul, the world's first self-organizing millimeter wave Gbps transport system featuring adaptive phased array beam form technology.
MEC is a foundational network architecture concept, which will help 5G networks live up to their potential as “living networks”, while delivering significant capability gains required for IoT, enhanced mobile broadband, virtual reality, self-driving vehicles, and more. This e-book will review key aspects of MEC architecture and answer some common questions about…
This article proposes multiple multi-domain solutions to deploy private SG networks for vertical industries. Different models of deploying SG private networks are presented, covering deployment on local premises as well as their interconnection with public networks of mobile network operators. Building on a set of industry verticals (comprising Industry 4.0, …
Blog Post /Sep 2025
Blog Post /Aug 2025
Blog Post /Jul 2025