On the Security of 3GPP Networks
|
|
|
- Loren Morgan
- 10 years ago
- Views:
Transcription
1 On the Security of 3GPP Networks Michael Walker Vodafone AirTouch & Royal Holloway, University of London Chairman 3GPP SA3 - Security Eurocrypt 2000 Security of 3GPP networks 1
2 Acknowledgements This presentation is based on the technical specifications and reports produced by the members of 3GPP SA3 and ETSI SAGE available from Much of the back ground work was done as part of the EU funded ACTS project USECA the partners are Vodafone, G&D, Panasonic, Siemens Atea, Siemens AG & Katholieke Universiteit Leuven Eurocrypt 2000 Security of 3GPP networks 2
3 Principles for 3G Security Build on the security of GSM adopt the security features from GSM that have proved to be needed and robust try to ensure compatibility with GSM in order to ease inter-working and handover Correct the problems with GSM by addressing its real and perceived security weaknesses Add new security features as are necessary to secure new services offered by 3G to take account of changes in network architecture Eurocrypt 2000 Security of 3GPP networks 3
4 SIM SIM Building on GSM Security - Architecture UE USIM Cu USIM USIM Cu USIM ME ME ME ME Uu Uu BS BS AN CN External Networks BSS MT MT Um BTS Abis BSC A RNS Iub RNS Iub RNC Iur RNC Iu EIR EIR SCF SCF HLR HLR GMSC GMSC AUC AUC UTRAN Eurocrypt 2000 Security of 3GPP networks 4 Iu Gb MSC MSC E, G MSC MSC F Gf SGSN SGSN Gd, Gp, Gn+ SGSN SGSN Gr D SMS- SMS- IWMSC IWMSC Gn+ GGSN GGSN SMS- SMS- GMSC GMSC H Note: Not all interfaces shown and named ISDN PSTN PSPDN CSPDN PDN: -Intranet -Extranet -Internet
5 Building on GSM Security, 2 Remain compatible with GSM network architecture User authentication & radio interface encryption SIM used as security module removable hardware terminal independent management of all customer parameters Operates without user assistance Requires minimal trust in serving network Eurocrypt 2000 Security of 3GPP networks 5
6 Limitations of GSM Security Problems with GSM security stem by and large from design limitations on what is protected rather than on defects in the security mechanisms themselves only provides access security - communications and signalling in the fixed network portion aren t protected does not address active attacks, whereby network elements may be impersonated designed to be only as secure as the fixed networks to which they connect lawful interception only considered as an after thought Eurocrypt 2000 Security of 3GPP networks 6
7 Limitations of GSM Security, 2 Failure to acknowledge limitations encryption needed to guard against radio channel hijack the terminal is an unsecured environment - so trust in the terminal identity is misplaced Inadequate flexibility to upgrade and improve security functions over time Lack of visibility that the security is being applied no indication to the user that encryption is on no explicit confirmation to the home network that authentication is properly used when customers roam Eurocrypt 2000 Security of 3GPP networks 7
8 Limitations of GSM Security, 3 Lack of confidence in cryptographic algorithms lack of openness in design and publication of A5/1 misplaced belief by regulators in the effectiveness of controls on the export or (in some countries) the use of cryptography key length too short, but some implementation faults make increase of encryption key length difficult need to replace A5/1, but poor design of support for simultaneous use of more than one encryption algorithm, is making replacement difficult ill advised use of COMP 128 Eurocrypt 2000 Security of 3GPP networks 8
9 Specific GSM Security Problems Encryption terminated too soon user traffic and signalling in clear on microwave links Clear transmission of cipher keys & authentication values within and between networks signalling system vulnerable to interception and impersonation Confidence in strength of algorithms failure to choose best authentication algorithms improvements in cryptanalysis of A5/1 Use of false base stations Eurocrypt 2000 Security of 3GPP networks 9
10 Used as IMSI Catcher for law enforcement Used to intercept mobile originated calls encryption controlled by network and user unaware if it is not on Dynamic cloning risk in networks where encryption is not used False Base Stations Eurocrypt 2000 Security of 3GPP networks 10
11 3GPP Security Architecture Overview User Application IV. Provider Application Application stratum TE III. MT USIM I. I. I. I. AN SN/ VLR/ SGSN I. II. Transport stratum HE/AuC Home stratum/ Serving Stratum I. Network access security II. Provider domain security III. User domain security IV. Application security Eurocrypt 2000 Security of 3GPP networks 11
12 Authentication & Key Agreement (AKA) Protocol Objectives Authenticate user to network & network to user Establish a cipher key CK (128 bit) & an integrity key IK (128 bit) Assure user and network that CK/IK have not been used before Authenticated management field HE USIM authentication key and algorithm identifiers limit CK/IK usage before USIM triggers a new AKA Eurocrypt 2000 Security of 3GPP networks 12
13 AKA Prerequisites AuC and USIM share user specific secret key K message authentication functions f1, f1*, f2 key generating functions f3, f4, f5 AuC has a random number generator AuC has scheme to generate fresh sequence numbers USIM has scheme to verify freshness of received sequence numbers Eurocrypt 2000 Security of 3GPP networks 13
14 AKA Variables and Functions RAND = random challenge generated by AuC XRES = f2 K (RAND) = expected user response computed by AuC RES = f2 K (RAND) = actual user response computed by USIM CK = f3 K (RAND) = cipher key IK = f4 K (RAND) = integrity key AK = f5 K (RAND) = anonymity key SQN = sequence number AMF = authentication management field MAC = f1 K (SQN RAND AMF) = message authentication code computed over SQN, RAND and AMF AUTN = SQN AK AMF MAC = network authentication token, concealment of SQN with AK is optional Quintet = (RAND, XRES, CK, IK, AUTN) Eurocrypt 2000 Security of 3GPP networks 14
15 AKA Message Flow USIM VLR or SGSN AuC Distribution of quintets from HLR/AuC to VLR/SGSN auth. data request Generate Quintets quintets (RAND, XRES, CK, IK, AUTN) Verify MAC, SQN Derive CK, IK, RES RAND, AUTN RES Over-the-air authentication and key agreement XRES = RES? Start using CK, IK Start using CK, IK Eurocrypt 2000 Security of 3GPP networks 15
16 Length of AKA Cryptographic Parameters K 128 bits RAND 128 bits RES bits CK 128 bits IK 128 bits AUTN 128 bits SQN Sequence number 48 bits AMF Authentication management field 16 bits MAC Message authentication code 64 bits Eurocrypt 2000 Security of 3GPP networks 16
17 Air-interface Encryption, 1 Applies to all user traffic and signalling messages Uses stream ciphering function f8 - with provision for different algorithms: UEA1 = Kasumi; UEA0 = no encryption COUNT-C DIRECTION BEARER LENGTH COUNT-C DIRECTION BEARER LENGTH CK f8 CK f8 KEYSTREAM BLOCK KEYSTREAM BLOCK PLAINTEXT BLOCK CIPHERTEXT BLOCK PLAINTEXT BLOCK Sender ME or RNC Receiver ME or RNC Eurocrypt 2000 Security of 3GPP networks 17
18 Air-interface Encryption, 2 Termination points user side: mobile equipment, network side: radio network controller Ciphering in layer 2 RLC sublayer non-transparent RLC mode (signalling, data) MAC sublayer transparent RLC mode (voice) Key input values to algorithm CK 128 bits Cipher key COUNT-C 32 bits Ciphering sequence number RLC sublayer HFN RLC (25/20)+ SN RLC (7/12) (SN RLC is transmitted) MAC sublayer HFN MAC (25) + CFN MAC (7) (CFN MAC is transmitted) Further input values BEARER 5 bits Bearer identity DIRECTION 1 bit Uplink/downlink LENGTH 16 bits Length of keystream block Eurocrypt 2000 Security of 3GPP networks 18
19 Air-interface Integrity Mechanism, 1 Applies to all except a specifically excluded signalling messages after connection and security mode set-up MS supervises that it is started Uses integrity function f9 - with provision for different algorithms: UIA1 = Kasumi COUNT- I DIRECTION MESSAGE FRESH COUNT- I DIRECTION MESSAGE FRESH IK f9 IK f9 MAC- I XMAC- I MESSAGE MAC- I MAC- I = XMAC- I? Sender ME or RNC Receiver ME or RNC Eurocrypt 2000 Security of 3GPP networks 19
20 Air-interface Integrity Mechanism, 2 Termination points user side: mobile equipment, network side: radio network controller Integrity protection: layer 2 RRC sublayer Key input values IK 128 bits Integrity key COUNT-I 32 bits Integrity sequence number consists of HFN RRC (28) + SN RRC (4) (SN RRC is transmitted) FRESH 32 bits Connection nonce MESSAGE Signalling message Further input values DIRECTION 1 bit Uplink/downlink Output values MAC-I/XMAC-I 32 bits message authentication code Eurocrypt 2000 Security of 3GPP networks 20
21 Connection Establishment Overview ME/USIM RNC VLR/SGSN 1. RRC Connection Establishment RRC 2. MM Initial L3 message MM 3. MM IMSI Interrogation MM 4. MM Authentication and key agreement MM 5. Security mode command RANAP 6. Security mode command RRC 7. RRC Security mode complete 8. RANAP Security mode complete 9. Response to initial L3 message MM 10. MM TMSI allocation MM Eurocrypt 2000 Security of 3GPP networks 21
22 Starting Ciphering & Integrity ME/USIM RNC VLR/SGSN Connection Establishment START; UEA MS, UIA MS Initial L3 message CKSN Authentication and key agreement Decide AKA / No AKA 5. Security mode command UEA CN, UIA CN, CK, IK Start of integrity protection Start of ciphering/deciphering RNC selects UEA and UIA; start of integrity protection 6. Security mode command UEA, UIA, UEA MS, UIA MS (first integrity protected message) FRESH Start of ciphering/deciphering 7. Security mode complete (first ciphered message) Eurocrypt 2000 Security of 3GPP networks 22
23 Security Parameters & Choices START(32bits) initial hyperframe number used to initialise COUNT-C/I assures user MAC-I is fresh START stored/updated USIM CKSN(3 bits) cipher key sequence number indicates the key set that is stored in USIM when START exceeds a certain threshold, CKSN can be used to trigger a new AKA FRESH(32 bits) network nonce assures network MAC-I fresh AKA is performed when the user enters a new SN the user indicates that a new AKA is required when the amount of data ciphered with CK has reached a threshold the serving network decides Otherwise integrity-key based authentication Selection of UEA and UIA by user/user s home environment Eurocrypt 2000 Security of 3GPP networks 23
24 Network Domain Security Overview Network X Network Y Layer 1 KAC X Key establishment KAC Y Key distribution Layer 2 Layer 3 NE X (1) KAC = Key administration Centre NE = Network entity NE X (2) NE X (3) Transport security NE Y (1) NE Y (2) NE Y (3) Eurocrypt 2000 Security of 3GPP networks 24
25 Network Security Features, 1 Layer 1 - Key Establishment KAC X generates and stores asymmetric key pair for X, and stores public keys from other networks - exchanged as part of roaming agreement generates, stores and distributes symmetric session keys for securing information sent from entities in X receives and distributes symmetric session keys for securing information sent from other networks Session key transport to ISO/IEC : Key Management - mechanisms using symmetric techniques Eurocrypt 2000 Security of 3GPP networks 25
26 Network Security Features, 2 Layer 2 - Key Distribution KAC X distributes session keys to nodes in X Layer 3 - Transport Security MAP signalling provided with encryption, origin authentication and integrity using standard symmetric techniques Protection limited to new messages in R 99 - includes authentication quintets Block cipher BEANO designed by ETSI SAGE for public network operators may be used Eurocrypt 2000 Security of 3GPP networks 26
27 Encryption & Integrity Algorithm Requirements Stream cipher f8 and integrity function f9 - parameters already described Low power, low gate-count hardware, as well as software No practical attack significantly more efficient than exhaustive key search No export restrictions on terminals (or SIMs); network equipment exportable under licence in accordance with Wassenaar Time for development - six months! Eurocrypt 2000 Security of 3GPP networks 27
28 General Approach to Design Robust approach to exportability - full strength algorithm and expect agencies to fall into line ETSI SAGE appointed as design authority Take existing algorithm as starting point Use block cipher as building block for both algorithms - MISTY1 chosen: fairly well studied, some provable security aspects parameter sizes suitable designed to be efficient in hardware and software offered by Mitsubishi free from royalty payments Eurocrypt 2000 Security of 3GPP networks 28
29 Design and Analysis Designed by SAGE team, led by Gert Roelofsen with external experts: SAGE design and evaluation teams joined by Mitsuru Matsui from Mitsubishi - designer of MISTY additional evaluators from Nokia, Ericsson and Motorola led by Kaisa Nyberg External evaluation by three teams: Leuven: Lars Knudsen, Bart Preneel, Vincent Rijmen, Johan Borst, Matt Robshaw Ecole Normale Superiere: Jacques Stern, Serge Vaudenay Royal Holloway: Fred Piper, Sean Murphy, Peter Wild, Simon Blackburn Open Publication - back on ETSI web site again in June? Eurocrypt 2000 Security of 3GPP networks 29
30 Kasumi Simpler key schedule than MISTY Additional functions to complicate cryptanalysis without affecting provable security aspects Changes to improve statistical properties Minor changes to speed up or simplify hardware Stream ciphering f8 uses Kasumi in a form of output feedback, but with: BLKCNT added to prevent cycling initial extra encryption added to protect against chosen plaintext attack and collisions Integrity f9 uses Kasumi to form CBC MAC with: non-standard addition of 2nd feedforward Eurocrypt 2000 Security of 3GPP networks 30
31 3GPP Stream Cipher f8 Eurocrypt 2000 Security of 3GPP networks 31
32 3GPP Integrity Function f9 Eurocrypt 2000 Security of 3GPP networks 32
33 Other Aspects of 3GPP Security Options in AKA for sequence management Re-authentication during a connection and periodic in-call Failure procedures Interoperation with GSM AKA+ and interoperation with 3GPP2 standards Formal analysis of AKA User identity confidentiality and enhanced user identity confidentiality (R00) User configurability and visibility of security features User-USIM, USIM-terminal & USIM - network (SAT) Terminal (identity) security Lawful interception Fraud information gathering Network wide encryption (R00) Location services security Access to user profiles Mobile IP security (R00+) Provision of a standard authentication and key generation algorithm for operators who do not wish to produce their own Eurocrypt 2000 Security of 3GPP networks 33
34 References to 3GPP Security Principles, objectives and requirements TS Security principles and objectives TS Security threats and requirements Architecture, mechanisms and algorithms TS Security architecture TS Integration guidelines TS Cryptographic algorithm requirements TS Personalisation of mobile equipment Lawful interception TS Lawful interception requirements TS Lawful interception architecture and functions Technical reports TR A guide to 3G security TR Criteria for cryptographic algorithm design process TR Formal analysis of the 3G authentication protocol TR General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms Algorithm specifications Specification of the 3GPP confidentiality and integrity algorithms Document 1: f8 & f9 Document 2: KASUMI Document 3: implementors test data Document 4: design conformance test data Eurocrypt 2000 Security of 3GPP networks 34
UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003
UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms
Security Evaluation of CDMA2000
Security Evaluation of CDMA2000 L. Ertaul 1, S. Natte 2, and G. Saldamli 3 1 Mathematics and Computer Science, CSU East Bay, Hayward, CA, USA 2 Mathematics and Computer Science, CSU East Bay, Hayward,
Security Architecture Standardization and Services in UMTS
Security Architecture Standardization and Services in UMTS Christos Xenakis and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications University of Athens, 15784
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
ETSI TS 133 102 V3.6.0 (2000-10)
TS 133 102 V3.6.0 (2000-10) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G Security; Security Architecture (3GPP TS 33.102 version 3.6.0 Release 1999) 1 TS 133 102 V3.6.0
Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra
Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra Reporte Técnico No. CCC-04-002 27 de febrero de 2004 Coordinación de Ciencias Computacionales
Mobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National
Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 10 Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography Wilayat Khan 1 and Habib Ullah 2 1 Department of Electrical
How To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
192620010 Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4]
192620010 Mobile & Wireless Networking Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4] Geert Heijenk Outline of Lecture 5 Cellular Systems (UMTS / LTE) (1/2) q Evolution of cellular
Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke [email protected] Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols Joe-Kai Tsay and Stig F. Mjølsnes Department of Telematics Norwegian University of Sciences and Technology, NTNU {joe.k.tsay,[email protected]}
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
Evolution of GSM in to 2.5G and 3G
CMPE 477 Wireless and Mobile Networks Evolution of GSM in to 2.5G and 3G New Data Services for GSM CMPE 477 HSCSD GPRS 3G UMTS IMT2000 UMTS Architecture UTRAN Architecture Data services in GSM I Data transmission
2G/3G Mobile Communication Systems
2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)
GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating
Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering
Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing
IMSI Catcher. Daehyun Strobel. 13.Juli 2007. Seminararbeit Ruhr-Universität Bochum. Chair for Communication Security Prof. Dr.-Ing.
IMSI Catcher Daehyun Strobel 13.Juli 2007 Seminararbeit Ruhr-Universität Bochum Chair for Communication Security Prof. Dr.-Ing. Christof Paar Contents 1 Introduction 1 2 GSM (Global System for Mobile
Chapter 2 Mobility Management for GPRS and UMTS
Chapter 2 Mobility Management for GPRS and UMTS Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 2.1 Network Architectures 2.2 Concepts
Global System for Mobile Communication (GSM)
Global System for Mobile Communication (GSM) Li-Hsing Yen National University of Kaohsiung GSM System Architecture Um (ME/SIM) C E C PSTN, ISDN, PSPDN, CSPDN A-bis A F A-bis C B BTS BSS BSC HLR VLR EIR
Security and Authentication Concepts
Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy
NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications
M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number
LTE Security How Good Is It?
LTE Security How Good Is It? Michael Bartock IT Specialist (Security) National Institute of Standards & Technology Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
Delivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
Mobile Network Security
Mobile Network Security Refik MOLVA Institut Eurécom B.P. 193 06904 Sophia Antipolis Cedex - France [email protected] Institut Eurecom 2005 Outline Wireless LAN 802.11 (WiFi) Mobile Telecommunications
UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen
UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014
Mobile Computing CSE 40814/60814 Fall 2014 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch
2G Mobile Communication Systems
2G Mobile Communication Systems 2G Review: GSM Services Architecture Protocols Call setup Mobility management Security HSCSD GPRS EDGE References Jochen Schiller: Mobile Communications (German and English),
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' "#$!!% "&'! #&'!%! () *+,, 3 & 5 &,! #-!*! ' & '.! #%!* //!! & (0)/!&/, 6 5 /, "! First system: NMT-450 (Nordic Mobile Telephone)
EDGE: The Introduction of High Speed Data in GSM / GPRS Networks
10 September 2003 EDGE: The Introduction of High Speed Data in GSM / GPRS Networks Wendy Florence Ericsson South Africa Rev A 10 September 2003 1 Agenda What is EDGE? Implementing EDGE Network and transmission
PDF vytvořeno zkušební verzí pdffactory www.fineprint.cz UMTS
UMTS Generations of mobile systems Generation 1 (1980-1995) 2 (1992-2000) 2,5 (1999-2010) 3 (2004-20?) Names NMT (Nordic Mobile Telephone); 450 MHz, 900 MHz AMPS (Advance Mobile Telephone System); USA
Overview of the Evolved packet core network
UNIVERSITY OF ALBERTA Overview of the Evolved packet core network Project report submitted to the Faculty of graduate studies and research University of Alberta In partial fulfillment of the requirements
Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab
Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:
(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks
(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks Christos Xenakis, Christoforos Ntantogian, Orestis Panos Department of Digital Systems, University of Piraeus Piraeus, Greece
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Market GSM Overview Services Sub-systems Components Prof. Dr.-Ing. Jochen
LTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07
Network Access Security in Mobile 4G LTE Huang Zheng Xiong Jiaxi An Sihua 2013.07 Outline Mobile Evolution About LTE Overview of LTE System LTE Network Access Security Conclusion Mobile Evolution Improvements
3GPP TSG SA WG3 Security S3#20 S3-010580 27-30 November, 2001 Sophia Antipolis, France
TSG SA WG3 Security S3#20 S3-010580 27-30 November, 2001 Sophia Antipolis, France Source : Subject : Gemplus ISIM Application The following document is a draft TS describing the ISIM characteristics. It
TETRA Security. TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England
TETRA Security TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England www.tetramou.com February 2006 TETRA Security Page 2 of 2 1 The TETRA security functions TETRA contains
3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. 3GPP TSG-CN1 Meeting #24 Tdoc N1-021455 Budapest, Hungary, 13. 17.
3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. NP-020155 Title: Liaison Statement on 3GPP Network Domain Name usage for IMS Source: CN1 Agenda item: 5.1 Document for: INFORMATION
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks MBS-W07 Selim Aissi, PhD Objectives Mobile Security Threat Landscape Mobile Network Security Cybersecurity Implications, Mitigations
Evolution from GSM to UMTS
Evolution from GSM to UMTS Outline of the lecture Evolutions form GSM to UMTS. 3G network architecture. Service provision in UMTS. Evolution types Technical Evolution 2G Network Evolution 3G Service Evolution
Mobile network security report: Poland
Mobile network security report: Poland GSM Map Project [email protected] Security Research Labs, Berlin February 2015 Abstract. Mobile networks differ widely in their protection capabilities against common
Chapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
2 System introduction
2 System introduction Objectives After this chapter the student will: be able to describe the different nodes in a GSM network. be able to describe geographical subdivision of a GSM network. be able to
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
DoS Attacks Exploiting Signaling in UMTS and IMS
DoS Attacks Exploiting Signaling in UMTS and IMS 1 Georgios Kambourakis, 1 Constantinos Kolias, 1 Stefanos Gritzalis, 2 Jong Hyuk Park 1 Laboratory of Information and Communication Systems Security Department
GSM Architecture Training Document
Training Document TC Finland Nokia Networks Oy 1 (20) The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation.
Mobility Management in UMTS
Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Prof. Dr. rer. nat. Otto Spaniol Mobility Management in UMTS Seminar: Datacommunication & Distributed Systems WS 2003/2004
Performance Estimation of a SIP based Push-to-Talk Service for 3G Networks
Performance Estimation of a SIP based Push-to-Talk Service for 3G Networks Eoin O Regan and Dirk Pesch Adaptive Wireless Systems Group Cork Institute of Technology Ireland Abstract Push-To-Talk (PTT) is
introduction to femtocells
.. introduction to femtocells Kévin Redon Technische Universität Berlin, Security in Telecommunications [email protected] OsmoDevCon 2012, Berlin, 24th March 2012 UMTS architecture SecT
Security protocols of existing wireless networks
Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ Security protocols of existing wireless networks cellular networks: - GSM; - UMTS; Bluetooth; WiFi LANs; 2007 Levente Buttyán and
Security Analysis of LTE Access Network
Security Analysis of LTE Access Network Cristina-Elena Vintilă, Victor-Valeriu Patriciu, Ion Bica Computer Science Department Military Technical Academy - Bucharest, ROMANIA [email protected],
Mobile Communication GSM, GPRS, EDGE, UMTS and beyond
Mobile Communication GSM, GPRS, EDGE, UMTS and beyond Ralf Keller Ericsson Research, Corporate Unit Ericsson Eurolab Deutschland GmbH [email protected] 1 Overview Services GSM GPRS & EDGE UMTS Beyond
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
ETSI TS 133 102 V12.2.0 (2015-01)
TS 133 102 V12.2.0 (2015-01) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); 3G security; Security architecture (3GPP TS
Security in cellular-radio access networks
Security in cellular-radio access networks Ravishankar Borgaonkar, Oxford University 5G Security Workshop Stockholm, Sweden 11 May 2016 Outline Radio Access Network Layered Security Emerging low cost attacks
Chapter 10 VoIP for the Non-All-IP Mobile Networks
Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256
Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities
Radboud University Nijmegen Bachelor Thesis Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities Author: Lars Lockefeer Supervisors: Engelbert Hubbers Roel Verdult
Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM
Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies
LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems
LTE Security Encryption and Integrity Protection in LTE 2012 Inc. 1 LTE Security: ey Concepts Authentication The LTE Network verifies the UE s identity by challenging the UT use the keys and report a result.
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
2G Cellular Data Networks
1 2 General Mobility Issues 2G Cellular Data Networks Registration and Authentication User Locate local service provider access point Obtain network access Service provider Locate mobile user within network
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
ETSI TS 133 203 V5.1.0 (2002-03)
TS 133 203 V5.1.0 (2002-03) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G security; Access security for IP-based services (3GPP TS 33.203 version 5.1.0 Release 5) 1 TS 133
Cellular Network Organization
Cellular Networks Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells o Each served by its own antenna o Served by base station consisting of transmitter,
In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications Dr. Cecilia Mascolo In this Lecture In this lecture we will discuss aspects related to the MAC Layer of wireless
GSM Network and Services
GSM Network and Services GPRS - sharing of resources 1 What is the problem? Many data applications are very bursty in its traffic pattern: http, smtp, pop, telnet,... Why reserve physical resources at
GSM BASICS GSM HISTORY:
GSM BASICS GSM HISTORY: In 1982 the Nordic PTTs sent a proposal to CEPT (Conference of European Postal & telegraph Administration) to study and to improve digital cellular technology by forming a team
Mobile Services (ST 2010)
Mobile Services (ST 2010) Chapter 2: Mobile Networks Axel Küpper Service-centric Networking Deutsche Telekom Laboratories, TU Berlin 1 Mobile Services Summer Term 2010 2 Mobile Networks 2.1 Infrastructure
GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010
Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure
GSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
IP Multimedia System: general aspects and migration perspectives
IMS TPC EPC IP Multimedia System: general aspects and migration perspectives Dr. Leo Lehmann Federal Office of Communication, Switzerland ITU Workshop on Developments regarding telecommunication network
GPRS Overview. GPRS = General Packet Radio Service. GPRS Network
GPRS - Overview GPRS Overview GPRS = General Packet Radio Service INTERNET/ INTRANET GPRS Network abcde X.25 Disclaimer: These overview slides are intended for informational purposes only. They have not
ETSI TS 123 251 V6.5.0 (2005-09)
TS 123 251 V6.5.0 (2005-09) Technical Specification Universal Mobile Telecommunications System (UMTS); Network sharing; Architecture and functional description (3GPP TS 23.251 version 6.5.0 Release 6)
Security in the GSM Network
Security in the GSM Network Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department, MSc. Student EE 588 NETWORK SECURITY TERM PROJECT Abstract: GSM is the biggest
Authentication and Authorization Applications in 4G Networks
Authentication and Authorization Applications in 4G Networks Abstract Libor Dostálek [email protected] Faculty of Science University of South Bohemia Ceske Budejovice, Czech Republic The principle of
Wireless Access of GSM
Wireless Access of GSM Project Report FALL, 1999 Wireless Access of GSM Abstract: Global System for Mobile communications (GSM) started to be developed by Europeans when the removal of many European trade
Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek
Mobile Security Practical attacks using cheap equipment Presented the 07/06/2016 Business France By Sébastien Dudek For Content Security measures Recent publications in the hacking community Practical
Outsourcing and network sharing: key considerations to solve the backhaul challenge
Outsourcing and network sharing: key considerations to solve the backhaul challenge Franck Chevalier Head of Broadband Sector, Operations Consulting September 2008 Contents 2 About Analysys Mason Market
Global System for Mobile Communications (GSM)
Global System for Mobile Communications (GSM) Nguyen Thi Mai Trang LIP6/PHARE [email protected] UPMC/PUF - M2 Networks - PTEL 1 Outline Principles of cellular networks GSM architecture Security
ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices
ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices Document ID: 119148 Contributed by Krishna Kishore DV, Sujin Anagani, and Parthasarathy M, Cisco TAC Engineers. Jun 12, 2015 Contents
GSM Architecture and Interfaces
GSM.05 Page 71 Monday, November 30, 1998 2:07 PM C H A P T E R 5 GSM Architecture and Interfaces 5.1 INTRODUCTION In this chapter we present an overview of the GSM as described in ETSI s recommendations.
Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA
Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Snehlata Barde Sujata Khobragade Rasmiprava Singh NIT Raipur(C.G.) MATS university, Raipur MATS university,raipur
