On the Security of Wireless Network Access with Enhancements
|
|
|
- Brice Ramsey
- 10 years ago
- Views:
Transcription
1 On the Security of Wireless Network Access with Enhancements Lein Harn Wen-Jung Hsin University of Missouri - Kansas City Kansas City, MO ABSTRACT The security of the current 3G wireless protocols addresses the problems faced by the 2G systems, in addition to fulfilling the higher 3G security requirements mated from operating in IP networks as well as voice networks. However, the approach adopted by the two most popular 3G mobile system forerunners, UMTS cdma2000, leaves many areas for improvement. In this paper, we improve the security of the 3G protocols in network access by providing strong periodically mutual authentication, strong key agreement, non-repudiation service in a simple elegant way. Categories & Subject Descriptors K.6.5 [Security Protection]: Authentication General Terms Security Keywords Security, 3G Mobile Network Security Authentication 1. ACRONYMS 2G,3G,4G The Second, Third, Fourth Generation 3GPP 3G Partnership Project 3GPP2 3G Partnership Project 2 A3 An authentication algorithm used in GSM A5 An encryption algorithm used in GSM A8 a key generation algorithm used in GSM Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage that copies bear this notice the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission /or a fee. WiSE 03, September 19, 2003, San Diego, California, USA. Copyright 2003 ACM /03/ $5.00. AES Advanced Encryption System AK Anonymity Key AKA Authentication Key Agreement AV Authentication Vector CK Cipher Key CDMA Code Division Multiple Access cdmaone IS-95 based CDMA cdma2000 IS-2000 based CDMA COUNT Call History Counter used in cdma2000 CS Circuit Switching ESA Enhanced Subscriber Authentication ESP Enhanced Subscriber Privacy FIPS Federal Information Processing Stards GSM Global System for Mobile communications HLR Home Location Register HMAC keyed-hash Message Authentication Code IK Integrity Key IMT-2000 International Mobile Telecommunications 2000 Key K A common secret key between MS HLR MS Mobile Station NIST National Institute of Stards Technology PS Packet Switching RAND A rom number SEQ Sequence Number used in UMTS AKA SSD Shared Secret Data UMTS Universal Mobile Telecommunications System VLR Visitor Location Register 2. INTRODUCTION In recent years, due to technology advances, we have seen a phenomenal increase in the number of cellular users. As the dem increases, so does the importance of security in the cellular systems. This can be seen from many highly publicized incidents, e.g., the plain text communication among allied pilots during Kosovo war as reported by Washington Post, the interception of House Speaker Newt Gingrich s cellular conference conversation. To provide protection, many different security areas are addressed, e.g., network access security provides users with secure access to the mobile services, network domain security provides secure exchanges of signaling data in the core network, application domain security provides users providers with secure exchanges of application data, etc. [6]. Our emphasis in this paper is in the area of network access security. For network access security, 2G mobile systems such as GSM cdmaone were designed to protect against external attacks. However, these designs have led to numerous interception attacks [5, 20, 24, 30]. The 3G wireless protocols must not only address the problems faced by the 2G systems but also provide strong security functionality to fulfill the 3G cellular requirements as defined in IMT-2000 [7], especially the required support over IP networks. Unfortu- 88
2 nately, the proposed security protocols for network access provided by the two most popular 3G cellular system forerunners, UMTS cdma2000 (the descendants of GSM cdmaone, respectively), still leave many areas for improvement. In this paper, we address some of these areas provide protocol enhancements on top of these two systems. For clarity, here we specify the security stards to which we will be referring in this paper. The security architecture stard for UMTS is defined in [6]. For cdma2000, the latest published documentation on network access security can be found in [8, 9, 10]. One of the areas for improvement is the way in which a subscriber authenticates a network. 3G systems provide mutual authentication between a subscriber a network, whereas 2G provides only subscriber authentication. To allow network authentication, UMTS uses a sequence number approach with which a subscriber can verify the freshness of an authentication request thus prevent an attacker s replay. Instead of sequence numbers, we propose to use Lamport s one-time password/hash chaining technique [19] in both directions, to from an MS, to establish periodically mutual authentication. Hash chaining provides strong periodical authentication is used in many applications [3, 16, 17, 21]. Thus, by using this technique, our enhancement is efficient, elegant, simple, our periodically mutual authentication is strong. Additionally, our enhancement can solve a billing dispute problem between an MS a VLR. Neither UMTS nor cdma2000 address the issue of billing disputes, thus there is no recourse to settle disputes when they arise. Note that a true non-repudiation service among HLR, MS, VLR can only be achieved via a public-key system using digital signatures. In this paper, following UMTS cdma2000, we adopt the symmetric key system with the assumption that both MS VLR must trust HLR. However, unlike UMTS cdma2000, our scheme can achieve nonrepudiation between an MS a VLR. That is, any dispute between an MS a VLR can be resolved in our scheme. Specifically, we use keyed-hash Message Authentication Code (HMAC) recently drafted by FIPS [14] on top of hash chaining to provide a non-repudiation service between an MS a VLR to explicitly address the billing issue without complicating the existing protocols. Previous work in this area includes a comparative study between UMTS cdma2000 for the entire systems, but with little emphasis in the area of security [2, 13]. Rose [28] offered a high level general overview of wireless security between UMTS cdma2000. Our detailed comparative study here emphasizes the subscriber authentication key agreement procedures, as this becomes the basis for building our protocol enhancements. Al-Muhtadi et al. [1] proposed a lightweight component in mobile devices a security server for authentication call setup for 3G/4G systems. Their work can benefit from our enhanced protocol mentioned here to provide strong periodically mutual authentication to simplify the implementation. The remainder of this paper is organized as follows. Sections 3 4 describe detailed AKA procedure in UMTS cdma2000, respectively. Section 5 describes our enhancements, hash chaining HMAC techniques that we adopt to achieve the improvements. Finally, section 6 provides conclusion summary. 3. UMTS AUTHENTICATION AND KEY AGREEMENT This section describes the registration AKA procedures in UMTS [6], shown in Figure 1. For ease of reference, each line in the figure is provided with a line identification number. UMTS maintains the same challenge response method as its 2G predecessor, GSM, to facilitate generation migration. In particular, during registration, an HLR prepares sends a list of authentication vectors (AV) to a VLR (see lines a2 toa12 in Figure 1.) During AKA, a VLR uses an AV (lines a13 a14) to authenticate an MS. Each AV is used once for each AKA invocation. If a VLR runsoutofavs,itcanrequestmorefromthehlr.when an MS roams out of a VLR, the old VLR should transfer the leftover AVs to the new VLR. The stard [6] assumes that the communication links between VLRs are adequately secure. The major differences in registration AKA procedures between UMTS GSM are (1) GSM allows only subscriber authentication, while UMTS provides both subscriber (line a22) network (line a19) mutual authentications, (2) UMTS can protect the integrity of signaling data (via IK i in line a24), while GSM can not. For the network authentication, UMTS employs a complicated sequence number (SEQ) technique. Specifically, UMTS achieves these two extra functionalities by adding two extra fields in the AV, namely an authentication token (AUTN, line a9) an integrity key (IK, line a5) on top of the triplet provided in GSM. An authentication token allows an MS to authenticate a VLR. The fields within the token include SEQ, anonymity key (AK), authentication management field (AMF), message authentication code (MAC). Each authenticationtokenisassignedauniqueseq.whenanmsreceives an authentication token, it verifies that the corresponding SEQ has not been accepted before (line a19), thereby precluding replay by an attacker. To allow for out-of-order SEQs due to simultaneous registration in both CS PS domains, MS maintains a list of SEQs that it has accepted. To prevent exposition of MS s identity location, key AK can be used to conceal the SEQ. AMF is an authentication management field which can be used for purposes such as specifying a particular authentication algorithm used, etc. MAC is used to ensure the authenticity integrity of the authentication token the rom challenge. The IK is used to protect the integrity of the control data. Readers are referred to the UMTS Security Architecture [6] for a detailed description of the AKA procedure. The generation, allocation, verification, management of SEQ is a complicated matter, especially with regard to the protection against an attack to force SEQ wrap around the compromise of user identity confidentiality. Furthermore, with the consideration of re-synchronization failure recovery, SEQ complicates both protocol implementation tremendously. (In re-synchronization failure recovery, an HLR an MS try to re-synchronize SEQ due to synchronization failure in various scenarios such as simultaneous registration in CS PS domains, user movement between VLRs which do not transfer leftover AVs, super-charged networks where the mobility of an MS among various VLRs is very high.) In fact, in the UMTS Security Architecture [6], a 6-page appendix is necessary to describe the generation, allocation, verification, management of SEQ. 89
3 Line Procedure MS VLR HLR a1 a2 a3 a4 a5 a6 a7 a8 a9 a10 a11 a12 Registration Distribution of Authentication Î ØÓÖ ÁÅËÁ Î ½Ò ÓÑÔÙØ Î ½Ò ÛÖ Ë Ð Ø Ê Æ Ã Ã Ê Æ µ ÁÃ Ã Ê Æ µ Ã Ã Ê Æ µ Ê Ë ¾ Ã Ê Æ µ Å ½ à ËÉÆÊ ÆÅ µ ÍÌ Æ ËÉÆ Ã Å Å Î Ê ÆÊ Ë ÃÁà ÍÌ Æ ÇÖÖ Î ÓÒ ËÉÆ a13 a14 a15 a16 a17 a18 ¾¼ ¾½ Authentication Key Agreement, Ø Ø Ø Ñ ÅË Ê Æ ÍÌ Æ ÛÖ Ó Ò ÓÒ Á Ç ÅË Ã Ã Ê Æ µ ËÉÆ ËÉÆ õ à Š½ à ËÉÆÊ ÆÅ µ Å Å Î ÖÝ Ö Ò Ó ËÉÆ Ý Ê Ë ¾ Ã Ê Æ µ Ê Ë ¾¾ ¾ ¾ Ã Ã Ê Æ µ ÁÃ Ã Ê Æ µ Ê Ë Ê Ë Ã Ã Ö ØÖÚ ÖÓÑ Î Áà ÁÃ Ö ØÖÚ ÖÓÑ Î Ý ÌÒ Ö Ø ÓÒ ÐÐÓ Ø ÓÒ Ú Ö Ø ÓÒ Ò Ñ Ò Ñ ÒØ Ó Ë É ÕÙ Ò ÒÙÑÖµ Ö Ö Ò ¹Ô ÔÔ ÒÜ Ò ÍÅÌË ÙÖ ØÝ ÖØ ØÙÖ Ø ÒÖ º Figure 1: Authentication Key Agreement in UMTS 4. CDMA2000 SUBSCRIBER AUTHENTICA- TION AND KEY AGREEMENT Cdma2000 is designed to be backward compatible with its predecessor cdmone, therefore it inherits most of the cdmaone security features. Specifically, for cdma2000, Figure 2 depicts the general registration the subscriber authentication key agreement procedures in the latest published documents on security [8, 9]. These stards show thesameproceduresasincdmaone. In particular, during registration (invoked by the SSD update procedure, lines b1tob12), the HLR selects a RANDSSD calculates a new SSD which can be shared with a VLR (lines b1 b2.) The VLR then sends the RANDSSD to an MS for it to derive the new SSD (lines b3 b4.) To authenticate the VLR, an MS sends a base station challenge order (line b6) to the VLR. It is only when the VLR passes the challenge does the MS update to the new SSD (line b12). During the subscriber authentication phase (lines b13 to b21), the MS invokes the global challenge procedure by first calculating a response AUT HR using a globally broadcast challenge RAND SSD A, the first portion of SSD. In line b15, the MS sends RANDC (the first 8 bits of RAND), COUNT (Call History counter used for clone prevention by keeping track the number of calls made by the MS), AUT HR to the VLR who will then verify the received values to authenticate the MS, (in lines b16 to b21). In case that the MS fails the global challenge, the VLR will invoke a unique challenge procedure with a unique rom number specifically generated to challenge the MS (readers are referred to [8] for the details of the unique challenge procedure). Note that the subscriber authentication here is only one-way (i.e., the VLR authenticates the MS, but not vice versa). Only when the MS is successfully authenticated can the encryption key be generated. In line b22, the encryption key is calculated based on the RAND SSD B, the second portion of SSD. The predominant difference in the network access security between GSM cdmaone, thus their descendants UMTS cdma2000, is how the authentication data is prepared. In UMTS, an HLR prepares sends a list of challenge response vectors to the VLR to authenticate an MS; while in cdma2000, a derived shared secret data (SSD) from a common secret key K canbesharedwitha VLR so that the VLR itself can authenticate an MS locally. The HLR total control method adopted by UMTS is secure in that the HLR is the one that an MS trusts, however it is not convenient for a VLR as the VLR has to rely on the HLR to generate challenges responses. On the other h, cdma2000 s VLR local method is convenient for a VLR but not as secure as UMTS, since an HLR does not have the total control in the communication between a VLR an MS. This is most evident when there is a dispute between an MS a VLR; an HLR has no easy way to settle the dispute as it has given the VLR the control. To lesson the degree of the problem, in cdma2000, an HLR can periodically change the value of the SSD (using the SSD Update procedure) to make the sharing with a VLR less problematic. 90
4 Line ½ ¾ Procedure Ê ØÖ Ø ÓÒ Ò ØÖÙØ ÓÒ Ó ÙØÒØØ ÓÒ ÁÒ ÓÖÑ Ø ÓÒ ËË ÍÔØ µ ½¼ ½½ ½¾ MS VLR HLR ËË Æ Ï Î Ê Æ ËË Ãµ ËË Æ Ï Ê Æ ËË Ê Æ ËË ËË Æ Ï Î Ê Æ ËËõ ÍÌ À Ë Î Ê ÆË ËË Æ Ïµ Ê ÆË ÍÌÀ Ë Î Ê ÆË ËË Æ Ïµ ÍÌÀ Ë ÍÌ À Ë ÍÌÀ Ë Fail Fail Confirmation Ö ËË Æ Ï Succeed Success Confirmation ËË ËË Æ Ï ËË ËË Æ Ï ½ Subscriber Authentication ¾¼ Key Agreement ¾½ ÐÓÐ ÐÐ Ò ÍÌ ÀÊ Î Ê Æ ËË µ Ê Æ Ê Æ ¼ µ Ê Æ ÇÍÆÌ ÍÌ ÀÊ Fail Î ÖÝ Ê Æ Fail Î ÖÝ ÇÍÆÌ ÍÌÀÊ Î Ê Æ ËË µ ÍÌ ÀÊ ÍÌÀÊ Fail Succeed MS is authenticated ÁÒÚÓ ÍÒ ÕÙ ÐÐ Ò ¾¾ Ã Ý Ò Ö Ø ÓÒ Ã Ý Ò Ö Ø Ã Ý Ê Æ ËË µ Note: In this figure, we only show the essential inputs to the CAVE algorithm. The detailed inputs can be found in [8] [9]. Figure 2: Cdma2000 Subscriber Authentication Key Agreement in documents C.S0004-A v6.0 [8] C.S0005-A v6.0 [9] To meet the 3G security challenges, cdma2000 will provide ESA ESP enhancements [11]. However, the detailed steps in achieving these enhancements are still being worked out, although 3GPP2 has approved the following: (1) the adoption of openly reviewed algorithms such as Rijndael Encryption algorithm [9], the AES chosen by NIST, (2) the adoption of 3GPP AKA with SHA-1 Message Authentication Code as the hash integrity functions for AKA operations [10]. SHA-1 is a hash function defined in FIPS Secured Hash Stard [15]. A message authentication code is generated by means of a hash function to ensure the authenticity integrity of the transmitted messages. With the adoption of 3GPP AKA, it remains to be seen as to how cdma2000 hles both authentication styles (i.e., UMTS HLR total control cdma2000 s VLR local control) smoothly. As of the writing of this paper, 3GPP2 has not published the details of this transaction. 5. ENHANCEMENTS As can be seen from section 3, the approach adopted by UMTS to provide 3G AKA complicates the already complex wireless protocol. Here, we provide an elegant approach to achieve strong AKA on top of UMTS as well as cdma2000. In the following, section 5.1 introduces a list of notations that we use in our enhanced protocol. Section 5.2 describes HMAC hash chaining techniques. Section 5.3 describes our enhanced protocol, the advantages, the time space analysis. 5.1 Notation t(x, y): HMAC with key x, message y p(x, y): Cipher key generation function with key x, rom data y q(x, y): Integrity key generation function with key x, rom data y r(x, y): Anonymity key generation function with key x, rom data y AK: AnonymityKey RAND H: A rom number selected by an HLR CK H: The Cipher Key generated by an HLR, using HLR-selected RAND H. An MS can also generate this when given a RAND H. IK H: The Integrity Key generated by an HLR, using HLR-selected RAND H. An MS can also generate this when given a RAND H. CK i,m: The Cipher Key with id (i, m) generated by an MS a VLR for use between the MS the VLR IK i,m: The Integrity Key with id (i, m) generated by an MS a VLR for use between the MS the VLR 91
5 f m (b i): One-way hash function with i th rom seed b i m th composition, where i I m M, for use in authenticating an MS M: The maximum number of f hash chaining composition I: The maximum number of rom seeds for f hash chaining g n (a j): One-way hash function with j th rom seed a j n th composition, where j J n N, for use in authenticating a VLR. N: The maximum number of g hash chaining composition J: The maximum number of rom seeds for g hash chaining? =: An equality comparison operator 5.2 Techniques To enhance the 3G AKA protocol, we adopt two major techniques: keyed-hash Message Authentication Code (HMAC) hash chaining. HMAC is very popular in the Internet community [25], has been recently drafted by FIPS [14]. It is used for message authentication by means of a cryptographic hash function a shared secret key. In a public-key system, a digital signature can be used to replace HMAC. The main components in HMAC are a hash algorithm a key, the most common form of HMAC is hash(key, hash(key, message)). Two of the most popular HMAC s are HMAC-MD5 [26] HMAC-SHA [27]. Lamport s one-time password/hash-chaining was proposed in 1981, has been used in many applications [3, 16, 17]. Let f(x) be a one-way function f M (x) =f(f( (f(x) ))) be the composition of Mfs. During registration, the claimant (i.e., the one wishes to be authenticated) romly selects an integer seed b, computes f M (b) HMAC of f M (b), sends f M (b) thehmac of f M (b) to the verifier (i.e., the one decides whether the claimant is who it is). Once registered, each hash chain can be used by the claimant to prove itself to the verifier M times. In the first visit, the claimant submits f M 1 (b) to prove itself. The verifier checks the equality f(f M 1 (b))? = f M (b). If passed, the verifier updates f M (b) storesf M 1 (b) forthenextvisit; otherwise, the claimant is not authenticated. The claimant reveals f M 1 (b), f M 2 (b),, f(b), b = f 0 (b) insequence to prove itself M times. The one-way hash chaining algorithm prevents all users, except the legitimate one, from computing backward values using the published oneway value. Straightforward implementations of a hash chain such as storing all chain elements or iteratively hashing from a seed have O(M) of combined memory computational complexity for an M element chain. Recently, Jakobsson [18], Coppersmith Jakobsson [12] proposed a log 2(M) space access time mechanism, especially desired for lowcost applications such as mobile hsets, micro-payments, smart dust, authentications, signatures (see [18, 12] for references therein.) For the purpose of non-repudiation, the combination of f M m (b) thehmac of f M (b) (that is provided by the claimant during registration) can be used as a nonrepudiation proof by the verifier as an evidence for all m visits made by the claimant. Specifically, for all m visits, the verifier only needs to store the most recently released f value (i.e., f M m (b)), does not need to keep all other values that it has received (i.e., f M (b), f M 1 (b),, f M m+1 (b)) before the m th visit. The verifier can produce a proof of the claimant s j th visit, where 1 j m 1, by simply computing f m j (f M m (b)). This desired feature is especially good for the applications (such as mobile hsets) with limited storage space. To prolong the life time of a hash chain, an additional dimension can be added to the above scheme as follows. The claimant (1) romly selects I seeds, b 1,b 2,, b I,(2) computes f M (b 1),f M (b 2),, f M (b I),anHMAC on the concatenated message f M (b 1) f M (b 2) f M (b I), (3) sends the computed values in (2) to the verifier. Note that by using the concatenation of I hash chaining values as one single message, one message authentication code between an MS an HLR is all that is needed for establishing the initial registration (see lines c1 c2 infigure 3). A general discussion on one-way functions one-way hash functions can be found in [29] the implementation of these functions can be found in [4]. 5.3 Protocol Enhancement Figure 3 provides our registration AKA enhancements on top of the two 3G forerunners, UMTS cdma2000. For clarity, a set of protocol steps composed to achieve a unique functionality are grouped into a procedure. These procedures mirror those in Figures 1 2. The significance of this grouping indicates that our procedures can be used to replace with ease the corresponding UMTS cdma2000 procedures Enhancement Details In the following, we specify the assumption explain each procedure the corresponding steps. Assumptions: Just like in UMTS Security Architecture [6], we also assume that (1) the communication link between an HLR a VLR is adequately secure, (2) an MS shares a common secret key K with its HLR. Procedure: Registration Distribution of Authentication Information This procedure is used when an MS first roams into a new visitor domain. The MS must send its HLR a set of data which is subsequently used by the VLR. Specifically, both MSG 1 HMAC 1 (in lines c1 c2) are sent from the MS via the VLR to the HLR. After the HLR verifies the authenticity of MSG 1,it then prepares MSG 2 to send to the VLR. In order for the MS to verify the authenticity of the VLR later on in the AKA phase, MSG 3 HMAC 3 is prepared sent by the VLR. 92
6 Line Procedure MS VLR HLR c1 c2 c3 c4 c5 c6 c7 c8 c9 c10 c11 c12 c13 c14 c15 c16 c17 c18 c19 c20 Registration Distribution of Authentication Information ÅË ½ ÁÅËÁ Å ½ µ Å Á µø Ñ Ø ÑÔ ÀÅ ½ Ø Ã ÅË ½ µ ÅË ½ ÀÅ ½ ÅË ÀÅ Ã Ö Ã Ê Æ À µ ÀÅ Ø Ã ÅË µ ÀÅ ÀÅ Ã À Ô Ã Ê Æ À µ Áà À Õ Ã Ê Æ À µ ÅË ¾ ÅË Ê Æ À Æ ½ µ Æ Â µ ÀÅ Ø Ã ÅË µ Å ½ Ø Ã ÅË ½ µ ÀÅ ½ ÀŽ Î ÖÝ Ø Ö Ò Ó Ø Ñ Ø ÑÔ Ë Ð Ø Ê Æ À à À Ô Ã Ê Æ À µ Áà À Õ Ã Ê Æ À µ Ã Ö Ã Ê Æ À µ ÅË ¾ ÁÅËÁ Å ½ µ Å Á µ Ê Æ À à à À Áà À c21 ÅË Å Ñ µ c22 c23 c24 c25 c26 Authentication Key Agreement for ѵ Ø Ø Ñ c27 where ½Á Ò c28 Ñ ½Å c29 c30 ÅË ÅË Æ Ò µµ Æ Ò ½ Ã Ñ Ô Ã À Æ Ò µ ÁÃ Ñ Õ Áà À Æ Ò µ Å Ñ µ Å Ñ µµ µµ Å Ñ µµ ÅË Æ Ò Å Ñ ½ µ µ Ã Ñ Ô Ã À Æ Ò µ Å Ñ µµ ÁÃ Ñ Õ Áà À Æ Ò µ Å Ñ µµ Figure 3: Enhanced Registration AKA procedures Procedure: Authentication Key Agreement This procedure is used by the MS the VLR to mutually authenticate each other. Since each authentication uses one chain position, the MS can prove its identity to the VLR at most I M times, whereas the VLR to the MS J N times. The indices (i, m) (j, n), where i I, m M, j J, n N, are independent of each other as each side steps through its own hash chains at its own pace. Within each set of hash chains, it can be agreed that the chain with lower id (i.e., i j) isused. Ifonesideencounters problems in authenticating the other side, the verifier should send an error message with the problematic chain id to the claimant. The claimant then tries to authenticate itself to the verifier starting from the next fresh chain. For example, if the problematic chain id in f series is 8, then the MS should reveal f M 1 (b 9)to the VLR to try to correct the authentication problem Advantages The following list summarizes the advantages of our enhancements. Non-repudiation: For cases such as billing dispute resolution between an MS a VLR, the combination of HMAC 1 in line c2f M m (b i) can serve as a nonrepudiation proof by a VLR as an evidence of m visits in the i th chain made by an MS, the combination of HMAC 3 in line c14 g N n (a j)canserveasa non-repudiation proof by an MS as an evidence of n visits in the j th chain made by a VLR. Note that due to the desired property of hash chaining, for each hash chain, the verifier only needs to keep the most recently released chain value (i.e., f M m (b i)keptbyavlr g N n (a j) kept by an MS) as an evidence, (see section 5.2 for explanation.) This is good for mobile hsets because of their limited space constraint. Stronger mutual authentication: To achieve mutual authentication between an MS a VLR, two hash chain sets are established, one for each direction. The one-way hash chaining algorithm prevents all users, except the legitimate one, from computing backward values using the published one-way value. Additionally, our method removes the assumption of secure channels between VLRs as there is no need to transfer leftover AVs. Therefore, this technique provides stronger mutual authentication than the current 3G protocols. Stronger periodical authentication: In UMTS [6], the periodical authentication is achieved by comparing a SEQ counter value between an ME a VLR periodically. The SEQ is susceptible to synchronization failure. In our enhanced protocol, either a VLR or an MS can periodically request to authenticate the other by having the other side prove itself. It is only when the submitted value satisfies the hash chain property, is the claimant successfully authenticated. This way is 93
7 stronger than simply comparing the counter value. Stronger key agreement to protect against compromised data: The composition of session keys CK i,m IK i,m for (i, m) th session are based on input values from all three entities involved, i.e, MS, VLR, HLR. Therefore, if any of these input values is compromised by an attacker, the session can not proceed. Mutual authentication with no need for synchronization: Since there are two hash chain sets, one for each direction, each side authenticates the other at its own pace, there is no need to synchronize these two chain sets. Authentication flexibility: Because of the feature of the mutual authentication with no need for synchronization, if it is necessary to provide only one-way authentication to function like a 2G system, one can simply omit the undesired set of chains. Simplicity Elegance: Our enhancements do not use SEQ (sequence number) as in UMTS, or COUNT (call history counter) in cdma2000. As briefly mentioned in section 3, the management record keeping of SEQ complicates both protocol implementation tremendously. The management of a hash chain is simple elegant compared to that of SEQ. Convenience Security: By using a VLR s own hash chaining set, the VLR has the convenience of the local control in authenticating an MS. Yet an HLR still has the total control in security by means of the HLR-generated master keys CK H IK H nonrepudiation services. Ease of hoff between VLRs: The roaming of an MS among VLRs is a case of macro mobility. Forthe roaming among base stations within the same VLR domain, known as micro mobility, methods such as Proactive Caching [22] can be used to reduce the connection delay. (We are currently working on extending the hash chaining technique to provide proactive caching for hoff in micro mobility.) In UMTS, when an MS roams out of a VLR domain, the old VLR must transfer the leftover authentication vectors to the new VLR. In our scheme, each MS VLR pair has two unique sets of hash chains, one for each direction. That is, when an MS roams out of a VLR domain, the MS will establish two new sets of hash chains with a new VLR. The MS the old VLR can still keep their old authentication states so that future connections can resume from the point where they leave each other. Thus, our scheme does not have leftover vector transferring problem as in UMTS. This feature is particularly attractive for a super-charged network where an MS moves around various VLRs frequently, or the cell sizes are small. For an MS who visits a VLR infrequently, an implementation of our enhancement can setup a time limit so that an established chain can be discarded due to a prolonged inactivity. Ease of re-synchronization: For any connection, if there is an authentication failure, the next fresh hash chain is used, thereby making re-synchronization between an MS a VLR a trivial task. 6. CONCLUSION AND SUMMARY Our main contributions in this paper are the enhancements on the authentication key agreement protocol in the 3G network access security. To underst the basis of our enhancements, we provide an evolutionary comparative study of this protocol in two most popular 3G cellular systems, UMTS cdma2000. The approaches adopted by the two 3G front runners aim to solve the 2G security problems satisfy the higher 3G security requirements. Specifically, UMTS uses a sequence number approach to provide network authentication, a feature not in 2G. Cdma2000 has approved the adoption of the same technique. The sequence number record keeping management complicate the already complex 3G implementation. In our study, we recommend to use a combination of hash chaining keyed-hash Message Authentication Code techniques instead. This combined approach not only simplifies both protocol implementation, but also provides strong periodically mutual authentication, strong key agreement, non-repudiation services in an elegant way. Future work will provide a performance analysis of our enhancement. Acknowledgement We wish to thank Dr. Lily Lidong Chen at Motorola, Inc. Dr. John Cigas at Rockhurst University for their constructive comments in the initial draft of this paper. 7. REFERENCES [1] Al-Muhtadi, J., Mickunas, D., Campbell, R. A Lightweight Reconfigurable Security Mechanism for 3G/4G Mobile Devices. IEEE Communications Magazine. vol 40. no. 10. April [2] Almaimani, M., Korsuwana, P., Twine, M., Mendelsohn, J. IMT-2000: A Comparative Analysis of cdma2000 UTRA. [3] Anderson, R., Manifavas, C., Southerl, C., NetCard - A Practical Electronic Cash System. Proc. International Workshop on security Protocols. Cambridge, UK. pp April 10-12, [4] Asokan, N., Tsudik, G., Waidner, M. Server-supported signature. Proc. 4 th European Symp. on Research in Computer Security (Lecture Notes in Computer Science). vol pp [5] 3GPP TS GPP: Technical Specification Group services System Aspects; 3G Security; Security Threats Requirements. [6] 3GPP TS GPP: Technical Specification Group services System Aspects; 3G Security; Security Architecture. [7] 3GPP TS GPP: Technical Specification Group services System Aspects; 3G Security; Security Principles Objectives. [8] 3GPP2 C.S0004-C v1.0. Signaling Link Access Control (LAC) Stard for cdma2000 Spread 94
8 Spectrum Systems - Release C. File C-S0004-C v1.0.pdf. May [9] 3GPP2 C.S0005-C v1.0. Upper Layer (Layer 3) Signaling Stard for cdma2000 Spread Spectrum Systems -Release C. File C.S0005-C v1.0.pdf. May [10] 3GPP2 S.S v1.0. Enhanced Cryptographic Algorithms. File S.S v1.0.pdf. January 21, [11] 3GPP2 S.R0032. Enhanced Subscriber Authentication (ESA) Enhanced Subscriber Privacy (ESP). Version 1.0. December 6, [12] Coppersmith, D. Jakobsson, M. Almost optimal hash sequence traversal. Proceedings of the fourth conference on Financial Cryptography (FC 02). Lecture Notes in Computer Science [13] Dalal, Neerav. A comparative study of UMTS cdma2000. IEEE METROCON [14] The Keyed-Hash Message Authentication Code (HMAC). Federal Information Processing Stards Publication. Draft [15] Secure Hash Stard. FIPS publication April 17, [16] Gennaro, R., Rohatgi, P. How to Sign Digital Streams. Advances in Cryptography - Crypto 97. pp [17] Harn, L., Lin, H. A Non-Repudiation Metering Scheme. IEEE Communications Letters. vol 5. no 12. December [18] Jakobsson, M. Fractal hash sequence representation traversal. Proceedings of the 2002 IEEE International Symposium on Information Theory (ISIT 02. pages July [19] Lamport, L. Password authentication with insecure communication. Communications ACM. vol. 24. no. 11. pp [20] Millan, William. Cryptanalysis of the alleged CAVE algorithm. ICISC pp [21] Lin, H.Y., Harn, L. Authentication Protocols with Non-Repudiation services in Personal Communication Systems. IEEE Communications Letters. vol 3. no 8. pp August [22] Mishra, A., Shin, M., Arbaugh, W., Lee, I., Jang, K. Proactive caching strategies for IAPP latency improvement during hoff. IEEE working group. IEEE r1-R. November [23] Niemi, Valtteri. UMTS security the rule of PKI. Eurescom Workshop. June pub/seminars/past/ 2001/SecurityFraud/11-Niemi/s1d001.htm [24] Pesonen, Lauri. GSM Interception [25] Krawczyk, H., Bellare, M., Canetti, R. Keyed-Hashing for Message Authentication. Internet Engineering Task Force, Request for Comments (RFC) February [26] Madson, C., Glenn, R. The use of HMAC-MD5-96 within ESP AH. Internet Engineering Task Force. Request for Comments (RFC) November [27] Madson, C., Glenn, R. The use of HMAC-SHA-1-96 within ESP AH. Internet Engineering Task Force. Request for Comments (RFC) November [28] Rose, G. Authentication Security in Wireless Phones. Qualcomm Australia. [29] Schneier, B. Applied Cryptography. New York: Wiley [30] Wagner, D., Schneier, B., Kelsey, J. Cryptanalysis of the Cellular Message Encryption Algorithm. 3/20/97. Crypto 97 Conference, August 17-21,
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan
Authentication and Security in Mobile Phones
Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia [email protected] ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after
Security Evaluation of CDMA2000
Security Evaluation of CDMA2000 L. Ertaul 1, S. Natte 2, and G. Saldamli 3 1 Mathematics and Computer Science, CSU East Bay, Hayward, CA, USA 2 Mathematics and Computer Science, CSU East Bay, Hayward,
UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003
UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 10 Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography Wilayat Khan 1 and Habib Ullah 2 1 Department of Electrical
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols Joe-Kai Tsay and Stig F. Mjølsnes Department of Telematics Norwegian University of Sciences and Technology, NTNU {joe.k.tsay,[email protected]}
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
Authentication and Authorization Applications in 4G Networks
Authentication and Authorization Applications in 4G Networks Abstract Libor Dostálek [email protected] Faculty of Science University of South Bohemia Ceske Budejovice, Czech Republic The principle of
C O M P U T E R S E C U R I T Y
NIST Special Publication 800-56C Recommendation for Key Derivation through Extraction-then-Expansion Lily Chen Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Mobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
Chapter 3. Network Domain Security
Communication System Security, Chapter 3, Draft, L.D. Chen and G. Gong, 2008 1 Chapter 3. Network Domain Security A network can be considered as the physical resource for a communication system. This chapter
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
An Overview of Communication Manager Transport and Storage Encryption Algorithms
An Overview of Communication Manager Transport and Storage Encryption Algorithms Abstract The following paper provides a description of the standard algorithms that are implemented within Avaya Communication
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Wireless Mobile Internet Security. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
Security and Authentication Concepts
Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
ETSI TR 133 919 V6.1.0 (2004-12)
TR 133 919 V6.1.0 (2004-12) Technical Report Universal Mobile Telecommunications System (UMTS); Generic Authentication Architecture (GAA); System description (3GPP TR 33.919 version 6.1.0 Release 6) 1
Deployment Scenarios
Deployment Scenarios Sun Cobalt Summary The Sun Cobalt is a network-based appliance for managing a large number of remote servers and for deploying services to these servers. A control station is deployed
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
MOBILE COMMUNICATION SYSTEMS AND SECURITY
MOBILE COMMUNICATION SYSTEMS AND SECURITY Man Young Rhee Endowed Chair Professor Kyung Нее University, Republic of Korea IEEE IEEE PRESS IEEE Communications Society, Sponsor John Wiley & Sons (Asia) Pte
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Certificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
Security Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
International Journal of Computing and Business Research (IJCBR)
AN INVESTIGATION OF GSM ARCHITECTURE AND OVERLAYING WITH EFFICIENT SECURITY PROTOCOL Karun Madan, Surya World Institute of Engg. & Technology, Rajpura, Punjab ABSTRACT The Global System for Mobile Communications
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Strong Security for Distributed File Systems
Strong Security for Distributed File Systems Ethan Miller Darrell Long William Freeman Benjamin Reed University of California, Santa CruzTRW IBM Research Abstract We have developed a scheme to secure networkattached
TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements
TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements Mar 3,2005 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
Recommendation for Applications Using Approved Hash Algorithms
NIST Special Publication 800-107 Recommendation for Applications Using Approved Hash Algorithms Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
A Secure RFID Ticket System For Public Transport
A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany
3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany Title: Response to: Source: To: Cc: Liaison on HTTP Security investigation within IMS LS S3-020475 (S2-022609) on Liaison on Security
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Fundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
TELECOMMUNICATION NETWORKS
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS
Efficient Implementation of Keyless Signatures with Hash Sequence Authentication
Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present new
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
KeyStone Architecture Security Accelerator (SA) User Guide
KeyStone Architecture Security Accelerator (SA) User Guide Literature Number: SPRUGY6B January 2013 Release History www.ti.com Release Date Description/Comments SPRUGY6B January 2013 Added addition engine
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke [email protected] Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
TETRA Security. TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England
TETRA Security TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England www.tetramou.com February 2006 TETRA Security Page 2 of 2 1 The TETRA security functions TETRA contains
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
ETSI TS 133 102 V3.6.0 (2000-10)
TS 133 102 V3.6.0 (2000-10) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G Security; Security Architecture (3GPP TS 33.102 version 3.6.0 Release 1999) 1 TS 133 102 V3.6.0
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
