International Journal of Computing and Business Research (IJCBR)



Similar documents
International Journal of Computing and Business Research (IJCBR) INSECURE GSM NETWORK AND SECURITY SOLUTIONS FOR MOBILE BANKING

2G/3G Mobile Communication Systems

Security features include Authentication and encryption to protect data and prevent eavesdropping.

Mobile Office Security Requirements for the Mobile Office

GSM Network and Services

Global System for Mobile Communication Technology

The GSM and GPRS network T /301

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

Mobile Banking in Developing Countries: Secure Framework for Delivery of SMS-banking Services MASTER THESIS

How To Understand The Gsm And Mts Mobile Network Evolution

Mobile Wireless Overview

An Example of Mobile Forensics

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

GPRS Network Security

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

The GSM Standard (An overview of its security)

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

Mobile Communications

Security in the GSM Network

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

Wireless Cellular Networks: 1G and 2G

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( ' 3 ' Giuseppe Bianchi

Wireless Telecommunication Systems GSM, GPRS, UMTS. GSM as basis of current systems Satellites and

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

IMT-2000 Network Architecture

GSM Architecture Training Document

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Chapter 7 Transport-Level Security

Security of phone communications

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Development of Wireless Networks

In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications

Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities

Worldwide attacks on SS7 network

Network Security. HIT Shimrit Tzur-David

Global System for Mobile Communication (GSM)

Mobile Phone Security. Hoang Vo Billy Ngo

Global System for Mobile Communications (GSM)

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study

Mobile Application Part protocol implementation in OPNET

IMSI Catcher. Daehyun Strobel. 13.Juli Seminararbeit Ruhr-Universität Bochum. Chair for Communication Security Prof. Dr.-Ing.

NAVAL POSTGRADUATE SCHOOL THESIS

Secure Sockets Layer

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

GPRS Overview. GPRS = General Packet Radio Service. GPRS Network

Wireless Mobile Telephony

SSL A discussion of the Secure Socket Layer

SFWR ENG 4C03 - Computer Networks & Computer Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 17. Transport-Level Security

Single Sign-On Secure Authentication Password Mechanism

Authentication and Security in IP based Multi Hop Networks

TELE 301 Network Management. Lecture 18: Network Security

2 System introduction

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

PICKPOCKETING MWALLETS. A guide to looting mobile financial services

2G Mobile Communication Systems

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Wireless and Mobile Communication

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

Cellular Network Organization

Network Infrastructure Security in Cellular Data Networks: An Initial Investigation

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Public-Key Infrastructure

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

CRYPTOGRAPHY AS A SERVICE

MOBILE CREDIT USING GSM NETWORK TOPUP FOR MOBILE PHONES

Authentication and Security in Mobile Phones

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Authentication in WLAN

Three attacks in SSL protocol and their solutions

Transcription:

AN INVESTIGATION OF GSM ARCHITECTURE AND OVERLAYING WITH EFFICIENT SECURITY PROTOCOL Karun Madan, Surya World Institute of Engg. & Technology, Rajpura, Punjab ABSTRACT The Global System for Mobile Communications (GSM) network is a standard structure used by most of the mobile phone networks all around the world. According to facts gathered by an organization known as the GSM Association, approximately 80 percent of all mobile phones all around the world are branch of this network. In recent years, M-banking has emerged as the main division of e-commerce and m-commerce. Nowadays, Mobile banking services comprises of information inquiry, notifications as well as alerts, payment transfer etc. Mobile application handset is used for linking customer handset with the server of the bank for all above mentioned services. Present Mobile-banking applications used by most banks are facing security challenges basically due to the security architecture of GSM network. The security architecture of the cellular network is not completely secure. Global System for Mobile communication network infrastructure is proven to be unsafe and many types of possible attacks have been exposed. So that sending sensitive banking information across the open mobile phone network is totally insecure. In this paper, we first discuss GSM architecture and then present SMS based secure mobile banking approach which improves security with lowest possible cost. In this method bank hides customer transaction data via secure SMS using AES symmetric cryptographic algorithm. Customer application decrypts data in safe manner. 1. INTRODUCTION In this project, first we investigate GSM architecture and then we will discuss security issues with the GSM architecture. Finally we will present method to improve security of M-banking using SMS based secure approach. The aim is to construct portable device applications that ensure client can securely send their banking information via the mobile network. The main

problem with the current mobile banking system is that they send data directly to clients in plain text form and compromising with the security. Present M-banking applications used by most of the banks are facing security challenges for payment transfer[1]. Mostly banks are using secure payment gateway as well as security measures, which increases their cost and infrastructure for their bank. But major day-to-day banking activities are not only payment transfer but inquiries, notifications and alerts as well. In section 2, we discuss GSM architecture and then in section 3, we will present security mechanisms in the GSM network. In section 4, we will present SMS based secure mobile banking approach to improve security on this GSM architecture. 2. GSM ARCHITECTURE As earlier stated, According to facts gathered by an organization known as the GSM Association, approximately 80 percent of all mobile phones all around the world are branch of this network. Phones on this type of GSM network actually use a Subscriber Identity Module (SIM) card. One of the main objectives of the GSM network is to facilitate effortless access to cellular and satellite systems across international lines. Using present digital technology, it makes use of both speech and data channels [2]. Figure 1 shows the fundamental structure of the GSM architecture; GSM offers both SMS and GPRS services. The GPRS is an integrated part of basic GSM network; it is encrusted over the underlying GSM network. GPRS also employ some of the already offered GSM network elements like Mobile Switching Centers (MSC), Base Station Subsystems (BSS), Home Location Registers (HLR) and Authentication Centers (AUC).

ISC SMS BSC MSC VLR HLR AUC EIR BSC MS OMC BTS Figure 1. GSM Architecture

BSC BASE STATION COTROLLER MSC MOBILE SWITCH CENTRE OMC- OPERATION AND MANAGEMENT CENTRE MS - MOBILE STATION BTS - BASE TRANSCEIVER STATION SMSC SHORT MESSAGE SERVICE CENTRE ISC INTERNATIONAL SWITCHING CENTRE EIR- EQUIPMENT IDENTITITY REGISTER AUC- AUTHENTICATION CENTRE HLR HOME LOCATION REGISTRY VLR - VISITOR LOCATION REGISTRY Key Terms The supplementary GPRS network elements to the already existing GSM network include; GPRS tunneling protocol (GTP), GPRS Support Nodes (GSN), (Packet Data Protocol) PDP Context as well as Access points. 3 SECURITY MECHANISMS IN THE GSM NETWORK GSM has techniques to authenticate and encrypt data exchanged on GSM network. The GSM network has some safety mechanism to check activities like Subscriber Interface Module (SIM) cloning, and to put off unlawfully used handsets. 3.1 GSM Authentication Center The SIM card authentication is performed when a mobile station in the beginning attempts to connect to the network, or in other words, when a terminal is switched on. The GSM authentication center is in operation to authenticate each SIM card which makes an attempt to

connect to GSM network. If in case, authentication fails then no services will be offered by the GSM network operator, otherwise the SGSN and HLR are allowed to administer the services associated with the SIM card. 3.2 Problems with the A3/A8 authentication algorithm A3/A8 is the algorithm used to authenticate a handset on a mobile network. In A3/ A8 the generally used algorithm is COMP128[3]. COMP128 was cracked by Wagner and Goldberg almost effortlessly. This raises apprehension of having GPRS as a secure mechanism. By cracking COMP128 Wagner and Goldberg proved that it is possible to attain the Ki value, so making it possible to achieve SIM cloning[4]. There has been a publish of COMP128-2 and COMP128-3 to deal with the SIM cloning issues, but still, the majority of the SIMs are using COMP 128. 3.3 Problems with A5 algorithm To prevent unfussy eavesdropping by encrypting the communications between mobile station (handset) and the BSS, the A5 algorithm is used. Kc is actually the Ki and RAND value put into the A5 algorithm[5]. This Kc value is basically a secret key used along with A5 algorithm for encryption in between the mobile station and BSS. 4. SMS SOLUTION FOR SECURE BANKING The secure messaging protocol overcomes the on hand security deficits in the GSM architecture. The solution for the above mentioned problems is to impart a secure messaging protocol which actually uses SMS. The secure messaging protocol has been integrated along with mobile banking system to improve the security of M-banking. 4.1 Protocol Sequences Secure SMS protocol is basically divided in two parts[6]. The first part is mainly message generation. The mobile handset generates the message and sends it to the server of the bank. The second part is basically message security checks. The server of the bank, examines the received message, decodes the contents, present in it and carries out security checks. The subsequent subsections describe each part of the protocol in detail.

Encryption using one time password USER ENTER BANKING DETAIL USER IDENTITY Message Digest CREATE SECURE SMS MESSAGE BANK SERVE R SEND SMS VIA GSM NETWORK 1. Check User Identity 2. Decrypt using one time password 3. Check the message Digest PERFORM TRANSACTIONS 4.Authenticate UPDATE DATABASE

4.2 Generating and Sending Secure SMS Messages User put all the required security information in mobile device. This information is used to create the secure SMS message for sending to the server. The mobile device has a preset version pattern of bytes[7]. This pattern is also inserted while creating the message. Hash value can ensure message integrity for the receiver side of the link[8]. Message integrity is needed to encrypt contents that are used for computing the message digest. Now the message is intercepted and the intruder cannot use the encrypted contents to construct another digest. The integrity validation will not pass if any part of the original message is altered. Some identification details should not be encrypted to let the receiver identify the account holder. The key used in this algorithm, for encryption is constructed from the one-time password of the client[9]. Only the server and the user have the knowledge of one-time passwords.

Figure 2. SMS based Protocol 4.3 Receiving and Decoding Secure SMS Message After receiving the message, server breaks the message and first checks the pattern of the version bytes. By doing this server come to know that message is fit for the secure SMS protocol[10]. Next, the server checks if the account identifier is exist in the server database as well. Now the server recovers the sequence number and checks if the sequence number recovered from the message matches with the seq. no. from the server s database. Now server gets the one-time password from the database. This password is indexed by sequence number and the account identifier. So the server uses this password as the decryption key to decipher the encrypted contents. After successful decryption, one-time password is discarded[11]. After all this, the server uses the secure contents required for the computing message digest. The message digest is computed using the same algorithm as used by mobile device. Now server compares the two digests for checking the message integrity[12]. After this, server takes the PIN from the message and then compares it with the account holder s PIN from the server s database. The server performs the requested transaction after all the above mentioned security checks. 5. CONCLUSION & FUTURE WORK There are many fields that would benefit from SMS based security measures. Security solutions were restricted because of physical infrastructure of GSM network. The security architecture of the cellular network is not completely secure, as we have seen so many loopholes in the GSM architecture. Many of the inherent disadvantages of such networks can be treated with the use of SMS based security. Secure SMS approach uses the concept of One time password, hashing function, PIN no. and message digest computing etc, to provide the clients secure transactions using mobile banking. Still a lot of work has to be done on the authentication process. In a nutshell, idea is to use secured messages over GSM networks in mobile banking without worrying about security concerns in order to take full advantage of the facility provided by the banking sector.

6. REFERENCES [1] Manoj V, Bramhe. Sms based Secure Mobile Banking. In International Journal of Engineering and Technology Vol.3 (6), 2011, 472-479 [2] Kelvin Chikomo and Ming Ki Chong. Security of mobile banking Project proposal [3] Biryukov, A. Shamir, A. Wagner, D. Real Time Cryptanalysis of A5/1 on a PC. In Fast Software Encryption Workshop, 2000 Stallings, W. Network Security Essentials Applications and Standards, international second ed. Prentice Hall, 2003. [4] Steve Lord, X-Force Security Assessment Services, and Internet: Trouble at the Telco When GSM goes bad. In Network Security, 2003(1):10 12, 2003 [5] Margrave, D. GSM Security and Encryption. Available from: http://www.hackcanada.com/blackcrawl/cell/gsm/gsmsecur/gsm-secur.html (1999); accessed 27 October 2006. [6] SMSSpoofing: Everything you ever wanted to know about SMS spoofing. http://www.smsspoofing.com, 2008. [7] Burak Bayoglu: Performance evaluation of WTLS handshake protocol using RAS and elliptic curve cryptosystems, 2004 [8]. Wagner, D. GSM Cloning. Smartcard Developer Association and ISAAC security research group. Available from: http://www.isaac.cs.berkeley.edu/isaac/gsm.html (1998); accessed 28 October 2006 [9] R. Chaudhri, G. Borriello, and W. Thies. FoneAstra: Making mobile phones smarter. In ACM Workshop on Networked Systems for Developing Regions. ACM, Oct. 2009 [10]. WAP Forum, Wireless Application Protocol Architecture Specification, Version 12-Jul-2001, from http://www.wapforum.org, 2001. [11] Kelvin Chikomo, Ming Ki Chong, Alapan Arnab, Andrew Hutchison. Security of Mobile Banking [12]. A. Chaia, A. Dalal, T. Goland, M. J. Gonzalez, J. Morduch, and R. Schiff. Half the world is unbanked. Financial Access Initiative Framing Note, Oct. 2009.