Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.



Similar documents
Global System for Mobile Communication Technology

Mobile Communications

How To Understand The Gsm And Mts Mobile Network Evolution

Global System for Mobile Communications (GSM)

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR

2 System introduction

The GSM and GPRS network T /301

GSM and UMTS security

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

Wireless Cellular Networks: 1G and 2G

Provides a communication link between MS and MSC; Manages DB for MS location. Controls user connection. Transmission.

Mobile Office Security Requirements for the Mobile Office

2G/3G Mobile Communication Systems

CS Cellular and Mobile Network Security: GSM - In Detail

9.1 Introduction. 9.2 Roaming

GSM System Architecture

Wireless Mobile Telephony

Mobile Services (ST 2010)

GSM BASICS GSM HISTORY:

2G Mobile Communication Systems

GSM Architecture Training Document

Security in the GSM Network

Wireless and Mobile Network Architecture

GSM - Global System for Mobile Communications

The Global System for Mobile communications (GSM) Overview

UMTS security. Helsinki University of Technology S Security of Communication Protocols

What is telecommunication? electronic communications? What is telephony?

Wireless Telecommunication Systems GSM, GPRS, UMTS. GSM as basis of current systems Satellites and

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( ' 3 ' Giuseppe Bianchi

Mobile Phone Security. Hoang Vo Billy Ngo

Wireless and Mobile Network Architecture

What is telecommunication? electronic communications. service?

Cellular Network Organization

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Network Security. Chapter 14. Security Aspects of Mobile Communications

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014

Global System for Mobile Communication (GSM)

Mobile Wireless Overview

IMSI Catcher. Daehyun Strobel. 13.Juli Seminararbeit Ruhr-Universität Bochum. Chair for Communication Security Prof. Dr.-Ing.

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

MAP/C SEND ROUTING INFO FOR SM. Destination Mobile Number. Obtain the SS7 address of the MSC VLR currently serving the specified Mobile Number

Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities

Development of Wireless Networks

An Example of Mobile Forensics

Communication Infrastructure: GSM Communication

GSM Architecture and Interfaces

NAVAL POSTGRADUATE SCHOOL THESIS

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

Cellular Phone Systems

GSM Security Claude Castelluccia INRIA

In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications

GSM System. Global System for Mobile Communications

GSM Network Structure and Network Planning. Contents: Dipl.- Ing. Reiner Stuhlfauth, ROHDE & SCHWARZ; Training Centre

Global System for Mobile Communication (GSM)

Mobility and cellular networks

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

MRN 6 GSM part 1. Politecnico di Milano Facoltà di Ingegneria dell Informazione. Mobile Radio Networks Prof. Antonio Capone

Mobile Communications Chapter 4: Wireless Telecommunication Systems

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

Chapter 2 Mobility Management for GPRS and UMTS

Locating Mobile Phones using Signalling System #7. Tobias Engel

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

How To Understand The Performance Of A Cell Phone Network

1. Introduction: The Evolution of Mobile Telephone Systems

Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol

Bölüm 8. GSM. 6 Milyar mobil telefon kullanıcısı (2011 sonu)* Dünya nüfusu 7 Milyar!

ETSI ETR 363 TECHNICAL January 1997 REPORT

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

ETSI TR V8.0.0 ( )

ETSI TS V6.5.0 ( )

Telecommunication Systems (GSM) Mobile Communications (Ch 4) John Schiller, Addison-Wesley

International Journal of Computing and Business Research (IJCBR)

Chapter 10 VoIP for the Non-All-IP Mobile Networks

The GSM Standard (An overview of its security)

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Security Evaluation of CDMA2000

Evolution of the SIM to esim

Mobile SCTP Transport Layer Mobility Management for the Internet

Transcription:

Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke uwe@iig.uni-freiburg.de Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/ Uwe Jendricke, 11/2001 IT-Security: Theory and Practice Mobile Communication 1 IT-Security: Theory and Practice Mobile Communication 2 Location Retrieval starting... Location Retrieval locked Area: Hamburg Mapping... IT-Security: Theory and Practice Mobile Communication 3 IT-Security: Theory and Practice Mobile Communication 4

Location Retrieval locked Area: Hamburg Map: zooming Location: Participant Hack in City: Hamburg Location Retrieval locked Area: Hamburg Map: zooming Location: Participant Hack in City: Hamburg Area: Inner City IT-Security: Theory and Practice Mobile Communication 5 IT-Security: Theory and Practice Mobile Communication 6 Participant: Hack arrested Location Retrieval locked Area: Hamburg Map: zooming Location: Participant Hack in City: Hamburg Area: Jungfernstieg/ Neuer Wall LAI: 1837HH483NJ MSISDN:0179-208394242 Aus dem Film `Blues Brothers` IT-Security: Theory and Practice Mobile Communication 7 IT-Security: Theory and Practice Mobile Communication 8

Characteristics of Mobile Communication Security aspects Moving participants and devices Limited power (HF, CPU, display, etc) of devices Devices change networks (roaming) Radio transmission: - Air interface (broadcast) - Interferences - Limited bandwidth More risks than in fixed networks Location retrieval Movement profiles Adversarial environment Misuse by third parties Wireless interface Electromagnetic compatibility (EMC) IT-Security: Theory and Practice Mobile Communication 9 IT-Security: Theory and Practice Mobile Communication 10 Example: GSM Cell Structure of GSM Global System for Mobile Communication High mobility, even internationally (roaming) Size depending on local conditions and # of users High reachability with only one call number High capacity High availability Integrated security mechanisms: Picocell Mikrocell Makrocell Hypercell Overlaycell d < 100m d < 1 km d < 20 km d < 60 km d < 400 km Encryption of transmitted data Authentification (PIN, Smart Card) Base station for >= 1 cells Temporary identification (pseudonyms) IT-Security: Theory and Practice Mobile Communication 11 IT-Security: Theory and Practice Mobile Communication 12

Frequency Usage Architecture (1/2) Efficiency Problems with over range Efficiency decreases with cell size Downsizing cells: Precise location determination More confidentiality Lower transmission power Four subsystems of GSM Mobile Station (= Mobile Equipment + Subscriber Identity Module) Base Station Sub-System Network Sub-System Mobile Switching Center Home Location Register Visitor Location Register Authentication Center Equipment Identity Register Network Management Center Operation and Maintenance Center IT-Security: Theory and Practice Mobile Communication 13 IT-Security: Theory and Practice Mobile Communication 14 Architecture (2/2) AUC Authentication Center EIR Equipment Identity Register BS Base Station GMSC Gateway MSC MS Mobile Station PSTN Public Switched Telephone Network Example: Calling from fixed network Caller Guest MSC Home MSC Routing to GMSC Connecting to home-msc Reading of HLR VLR-address Guest-MSC address IMSI Connecting to guest-msc Reading from VLR (IMSI -> TMSI) Connecting to MS (with TMSI) Authentication of the MS by challenge-response (with AuC) Call setup Location Areas IT-Security: Theory and Practice Mobile Communication 15 Location AuC Authentication Center BS Base Station EIR Equipment Identity Register GMSC Gateway Mobile Switching Center Location Areas TMSITemporary Mobile Subscriber Number IT-Security: Theory and Practice Mobile Communication Subscriber Identity Module 16

Subscriber Identity Module Smart Card in Mobile Station (Mobile Phone) Stores private user data Splitting device- and user mobility K i (user specific, symmetric key) Algorithm A3 for challenge-response-authentication Algorithm A8 for generation of K c LAI PIN IMSI TMSI user specific symmetric session key MS Mobile Station PIN Personal Identification Number TMSI Temporary Mobile Subscriber Number LAI Location Area Identification Home Location Register HLR HLR stores data of the user IMSI (International Mobile Subscriber Number) MSISDN (Mobile Subscriber International ISDN Number) Personal data (name, address, bank account, etc.) Service profile (priorities, call forwarding, restrictions) VLR-address, guest-msc-address Billing data Security conflict: Reachability location information MSISDN Mobile Subscriber International ISDN Number TMSI Temporary Mobile Subscriber Number IT-Security: Theory and Practice Mobile Communication 17 IT-Security: Theory and Practice Mobile Communication 18 Visitor Location Register VLR VLR stores data of the user used at the MSC IMSI, MSISDN TMSI (Temporary Mobile Subscriber Identity) MSRN (Mobile Station Roaming Number) LAI (Location Area Identification) Home-MSC-address, HLR-address Billing data TMSI Temporary Mobile Subscriber Number MSISDN Mobile Subscriber International ISDN Number Authentication Center AuC Stores user key K i Generates session key K c from K i and random number Authentication with challenge-response AuC sends random number to mobile AuC receives response (generated on the by A3 (with challenge as input)) AuC compares response to self generated value Algorithm A3 Not standardized Defined by telecommunication company (telco) Secret algorithm: security by obscurity Subscriber Identity Module symmetric user key, in and in AuC IT-Security: Theory and Practice Mobile Communication 19 IT-Security: Theory and Practice Mobile Communication 20

Repeat: Call from fixed network Guest MSC Location Caller Home MSC Location Areas Routing to the GMSC Connecting to home-msc Reading from HLR VLR-address Guest-MSC address IMSI Connecting to guest-msc Reading from VLR (IMSI -> TMSI) Connecting to MS (with TMSI) Authentication of MS by challengeresponse (with AuC) Call setup AUC Authentication Center BS Base Station EIR Equipment Identity Register TMSITemporary Mobile Subscriber Number Subscriber Identity Module User Authentification Mobile Station A3 Initiated at: Location registration Location update with VLR-switching Call setup (in both directions) Activation of additional services Short Message Service (SMS) Authentication Request RAND Unilateral Authentication! AuC RandomGenerator A3 Authentication Response SRES 32 bit = True? 32 bit A3 secret algorithm AuC Authentication Center user specific symmetric key Subscriber Identity Module IT-Security: Theory and Practice Mobile Communication 21 IT-Security: Theory and Practice Mobile Communication 22 Pseudonymization of the user Mobile Station TMSI old IMSI TMSI new (Message with TMSI) old LAI, old TMSI When TMSI not known: identity request identity response(imsi) TMSI reallocation command {new TMSI} TMSI reallocation complete TMSI (Temporary Mobile Subscriber Identity) No linkability of user s actions Algorithm for generation: by telco Transmission of IMSI at first login or after error (attack: IMSI-Catcher) Network VLR: relation TMSI - IMSI VLR: generation of TMSI VLR: storing TMSI BSC:encryption with Deleting old TMSI BSC Base Station Controller user specific symmetric session key LAI Location Area Identification Subscriber Identity Module TMSITemporary Mobile Subscriber Number Link Encryption (1/2) Mobile Station A8 stored in used in MS Key generation Authentication Request RAND AuC RandomGenerator A8 64 bit 64 bit is session key Algorithm A8 In and in authentication center AuC parameterized one way function Standardized interfaces, non-standardized algorithm A3/A8 known as COMP128 stored in HLR used in BSC AuC Authentication Center BSC Base Station Controller user specific symmetric session key MS Mobile Station Subscriber Identity Module IT-Security: Theory and Practice Mobile Communication 23 IT-Security: Theory and Practice Mobile Communication 24

Link Encryption (2/2) 64 bit Mobile Station 114 bit + 114 bit Cleartext xor block Cleartextblock TDMA- Frame Number Key block 22 bit Transmission Ciphering Mode Command (Encryption Mode) Encrypted text (Ciphering Mode Complete) Algorithm In the mobile station, not in! Worldwide standardization Weak algorithm * or /2 in some countries Netz TDMA- Frame- Number 22 bit 114 bit + xor 64 bit AuC Authentication Center BSC Base Station Controller user specific symmetric session key MS Mobile Station Subscriber Identity Module TDMA Time Division Multiple Access Security in GSM: Overview Mobile Station Base Station (BS) Guest-MSC Home-MSC A3 A8 Encrypted radio transmission BS-Controller RAND SRES Non-encrypted directed radio transmission VLR generatestmsi AuC RandomGenerator = IMSI A3 A8 Non-encrypted transmission by wire HLR IT-Security: Theory and Practice Mobile Communication 25 IT-Security: Theory and Practice Mobile Communication 26 Security Relevant Functionality for access control (PIN) and authentication Unilateral authentication (MS network) by challenge-response Pseudonymization of the participants on the air interface (TMSI) Link encryption on the air interface Security Problems in GSM Confidentiality of location information only against outsider Radio-bearing of MS possible No bit transparency no end-to-end encryption possible No end-to-end authentication Some secret crypto algorithms Only symmetric crypto algorithms Key management without user control No anonymous activity possible Users must trust the billing data IT-Security: Theory and Practice Mobile Communication 27 IT-Security: Theory and Practice Mobile Communication 28

Protection of location information Further Information Hannes Federrath: Mobile Communication http://www.inf.tu-dresden.de/~hf2/publ/#mob Database request Database request GSM Security and Links http://www.brookson.com/gsm/contents.htm Distribution service Hack by german Chaos Computer Club (in german) Trusted Area http://www.ccc.de:8080/thema/gsm/ Personal Trusted Area Exercise on Thursday, 20.12.01 in Building 051, SR 00-031 Source: Hannes Federrath IT-Security: Theory and Practice Mobile Communication 29 IT-Security: Theory and Practice Mobile Communication 30