Mobile Office Security Requirements for the Mobile Office



Similar documents
Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

How To Understand The Gsm And Mts Mobile Network Evolution

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

GSM and UMTS security

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

HANDBOOK 8 NETWORK SECURITY Version 1.0

Authentication and Security in IP based Multi Hop Networks

Security in Wireless Local Area Network

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Cornerstones of Security

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Global System for Mobile Communication Technology

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

ICANWK406A Install, configure and test network security

Mobility and cellular networks

Security and Authentication Concepts

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

International Journal of Computing and Business Research (IJCBR)

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Fundamentals of Network Security - Theory and Practice-

Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities

United States Trustee Program s Wireless LAN Security Checklist

Mobile Phone Security. Hoang Vo Billy Ngo

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Packet Level Authentication Overview

Key Management (Distribution and Certification) (1)

Content Teaching Academy at James Madison University

2G/3G Mobile Communication Systems

GSM Risks and Countermeasures

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Chapter 6 Wireless and Mobile Networks

The GSM and GPRS network T /301

NAVAL POSTGRADUATE SCHOOL THESIS

Security Requirements for Wireless Networking

Wireless Security: Token, WEP, Cellular

Global System for Mobile Communications (GSM)

Authentication in WLAN

Mobile Services (ST 2010)

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

White Paper. Bearer Independent Protocol (BIP)

How To Understand And Understand The Security Of A Key Infrastructure

Topics in Network Security

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

LTE Overview October 6, 2011

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

m-trilogix White Paper on Security in Wireless Networks

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

TETRA Security for Poland

Wireless Sensor Networks Chapter 14: Security in WSNs

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

Security vulnerabilities in the Internet and possible solutions

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

SHORT MESSAGE SERVICE SECURITY

Chapter 8. Network Security

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Problems of Security in Ad Hoc Sensor Network

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Securing VoIP Networks using graded Protection Levels

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

GPRS Network Security

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Network Access Security. Lesson 10

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

Remote Access Security

Steelcape Product Overview and Functional Description

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Mobile Wireless Overview

ISM/ISC Middleware Module

Recommended Wireless Local Area Network Architecture

Securing an IP SAN. Application Brief

How To Pass A Credit Course At Florida State College At Jacksonville

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Configuring connection settings

Virtual Private Networks

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures

Common Remote Service Platform (crsp) Security Concept

Wireless Networks. Welcome to Wireless

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Wireless Local Area. Network Security

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( ' 3 ' Giuseppe Bianchi

Nokia E61i Configuring connection settings

Transcription:

Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001

Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used for Network Access Security Requirements Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 2

Mobile Networks Security Concepts in Mobile Networks GSM WAP UMTS Applications in Mobile Networks Mobile Terminal used for Network Access Security Requirements Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 3

Security Concepts in GSM mobile / fixed network Air Interface BTS BTS BSC MSC/VLR PLMN/PSTN HLR/AuC BSC encrypted BTS AuC HLR BTS BSC MSC VLR Authentication Center Home Location Register Base Transceiver Station Base Station Controller Mobile Switching Center Visitor Location Register subscriber authentication encrypted air interface anonymous identity Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 4

Authentication in GSM MSC/VLR PLMN/PSTN MS ME SIM Air Interface signed response ciphering key 3 2 BTS 1 challenge BSC =? RAND SRES Kc A3 A8 3 HLR/AuC Ki Ki A8 A3 Authentication triplets generated in AuC and collected in MSC: RAND SRES Kc random number, signed response, ciphering key Ki ME MS SIM Individual secret Key Mobile Equipment Mobile Station = ME+SIM Subscriber Identity Module Challenge/response authentication from MSC to SIM Enter ciphering mode without transmitting Kc on the air Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 5

Transport encryption in WAP WAP gateway Web server WAP browser mobile network WTLS Internet SSL Main risks handled: eavesdropping on the air and in the Internet Internet and Mobile Network encrypted WTLS: network-independent technology Operates on GSM, CDMA, GPRS, Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 6

UMTS network Node B RNC 3G MSC/VLR Circuit Core Network 3G SGSN 3G GGSN UICC: USIM,... Node B IP intranet IP Network MSC RNC SGSN GGSN UICC USIM circuit traffic packet traffic Mobile Switching Center Radio Network Controller Serving GPRS Support Node Gateway GPRS Support Node UMTS Integrated Circuit Card User Service Identity Module Improved network security New interfaces to be secured: Internet and Multimedia Services Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 7

Security Concepts in UMTS Compatibility with GSM security features and network Address the security weaknesses of GSM: access security only: security between mobile and switch, i.e. microwave links now encrypted subscriber authentication only: mutual authentication of subscriber and network vulnerable for active attacks: encrypted signaling messages short keys: increased key length clear transmission of cipher keys and authentication values within and between networks in case of roaming: session keys for roaming (transport security) lack of confidence in cryptographic algorithms: well-studied open algorithms Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 8

Mobile Network Summary GSM - GSM + plain text transmitted in the network subscriber authentic. encrypted air interface no end-to-end WAP security full transport layer encr. WAP choice of algorithms, no end-to-end security elliptic curve cryptogr. efficient for mobiles plain text in WAP UMTS gateway network authentication UMTS exposed to attacks from the Internet data privacy problem in location based services Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 9 protected access network encrypted messages increased key lengths secure interface between networks

Mobile Applications Security Concepts in Mobile Networks Applications in Mobile Networks Application in the Terminal: WAP or SAT Application in PDA or Notebook Mobile Terminal used for Network Access Security Requirements Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 10

Applications in the terminal SMS, USSD GSM 11.14 SAT: SIM Application Toolkit Mobile is used as a primitive I/O-terminal Interface between mobile and SIM standardized, i.e. independent from mobile equipment Communication uses SMS or USSD for transport Applications are specific for the card used, programming by experts only Applications limited in size by card memory and performance SAT browser incl. security plug-ins instead of WAP Mature technology, widely supported by terminals Slow transmission: mainly for small messages SMS USSD Short Message Service Unstructured Supplementary Service Data Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 11

Applications in the terminal SMS, USSD JavaCard SMS USSD GSM 11.14 Short Message Service Unstructured Supplementary Service Data Mobile terminal is an Internet access terminal which can be used for phone calls in special cases, Mobile is used as a primitive I/O-terminal Performance of Smart Cards rapidly increasing In addition to the SIM application, e.g. Java Interpreter and (remotely) loaded Java applets can execute in the Smart Card User interactive applications run on the Card Functionality of the mobile terminal can be controlled by the Smart Card Payload in a SMS is sent to the Smart Card without user intervention Serious security issues to be solved (signed applets, verification of arriving applets ) Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 12

Network Access Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used for Network Access Security Requirements Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 13

Mobile Terminal used as Network Access Ca. 500 Mio. GSM terminals in use world-wide can be always online, i.e. 3 times more than Internet hosts Network access from PDA or Notebook via mobile terminal using cable, Infrared, Bluetooth, ad-hoc-networks Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 14

Mobile Terminal used as Network Access Bluetooth: local wireless connection to devices, speed: up and down 433 kbits/s each or up 58 kbits/s and down 721 kbits/s, 8 devices, multipoint Bluetooth security symmetric payload encryption (8 128 bits key length) optional authorization (permission to use services) challenge-response authentication to check that both sides of a pair of devices use the same encryption key frequency hopping Bluetooth provides basic security for simple networks needs application level support and end-to-end security for serious, security sensitive work Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 15

Mobile Terminal used as Network Access IrDA: point-to-point ad-hoc transmissions for up to ca. 1m with at up to 4 Mbits/s (16 Mbits/s under development) requires optical visibility uses the same upper layer protocol as Bluetooth for point-and-shoot style of operation in a narrow angle (ca. 30 ), easy choice of recipient IrDa security: no link layer security relies on application level security security mechanisms Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 16

Mobile Equipment used as Network Access Wireless LAN (IEEE 802.11b) security frequency hopping; access control lists data security: Wired Equivalent Privacy (WEP) encrypts data, but leaves the headers intact, weak algorithm 40 bits RC4, shared key; this is not an end-to-end privacy challenge-response authentication no access barriers inside the network defined shares the same vulnerabilities with wired LAN (Internet access, sniffing, ) plus vulnerability for jamming (Denial of Service attack) Internet requires careful handling of security issues on upper layers Access Point Intranet Appli. Server Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 17

Ad-hoc networks Ad-hoc networks: mutual communication among wireless clients no network structure Ad-hoc network security: Authenticity to be implemented by signed certificates Access control lists sophisticated key agreement necessary to defend eavesdropping during the key agreement phase (secure authentication and encryption) Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 18

Security Requirements Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used for Network Access Security Requirements Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 19

Security Requirements Challenge Security threats for the Mobile Office are not new, but PDAs, WAP, Bluetooth present unique and urgent security challenges when connected to critical/sensitive enterprise systems or used for commercial transactions how to guarantee secure host access and secure transactions from mobile terminals using a variety of protocols? Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 20

Security Requirements for the Mobile Office Mandatory security requirements confidentiality cryptography authentication certificates integrity signatures non-repudiation signatures+certificates easy and strong user authentication explicit transaction authorization end-to-end encryption accepted log-on security (biometrics ) instead of several PINs, passwords, etc. intrusion detection and audit-trail Define a security policy that states the rules for access and plan mechanisms and countermeasures Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 21

Summary Standard challenges of e-commerce Denial-of-Service attacks virus code modification, replay, etc. in gateway systems Additional challenges for m-commerce easy eavesdropping on air interface Denial-of-Service attacks : jamming limited performance of mobile devices in terms of memory and throughput means limited cryptographic performance variety of protocols to be supported high risk that mobile equipment is stolen or lost, i.e. user authentication is critical and the shared secret should not be compromised in that case Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 22

Summary Authentication and end-to-end encryption crucial Problem of secure key handling to be solved without complicating the handling Networks provide at best basic security; PKI (Public Key Infrastructure) required for commercial use and for access to sensitive data: cryptography, digital signatures, digital certificates: under defin. by Radicchio, Msign, GMCIG, Met,... SIM+SIM Application Toolkit, Java Card or UICC with security applications can host security software in a mobile terminal; smart card and cryptographic software to be used in a PDA or notebook Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 23

Recommendations build security in from the beginning build a complete security solution incl. intrusion detection, anti-virus scanners (content), firewalls, access control, logging, handle gateways (e.g. WAP gateway) as if they were application servers fully support wireless networks by central IT or outsource the construction of a secure infrastructure to avoid creation of distributed less secure networks monitor security regularly (operate and maintain (!) intrusion detection, process access logs, ) and prepare to react Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 24

Alcatel s role Alcatel is a network manufacturer covering the complete range of products Alcatel offers consulting services Alcatel is a partner in cooperations e.g. with KeySoft for mobile-based Extranet access solutions based on the MOBEX product: mobile access to mail, files, calendar, secured applications, etc. Gemplus to guarantee the compatibility of the USIM smart card with the UMTS network Certicom, RSA et al. for security technology used in mobile, VPN and PABX solutions Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 25

contact: alcatel.consulting@alcatel.de Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 26