On Security in All-IP Networks. Alcatel SEL AG Matthias Duspiva



Similar documents
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Security and Authentication Concepts

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Mobility and cellular networks

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

Mobile Office Security Requirements for the Mobile Office

Authentication, Authorization and Accounting (AAA) Protocols

Mobile Networking Concepts and Protocols CNT 5517

Authentication and Security in IP based Multi Hop Networks

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/ ; Suresh.Leroy@alcatel.be +32/3/ ; Guy.Reyniers@alcatel.

Diameter in the Evolved Packet Core

Voice over IP Implementation

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Evolutionary Trends towards Beyond 3G Mobile Networks

Mobile Wireless Overview

GSM services over wireless LAN

SS7 & LTE Stack Attack

A Proposed Model For QoS guarantee In IMSbased Video Conference services

Best Practices for Securing IP Telephony

WHITE PAPER. WiMAX Security for Real-World Network Service Provider Deployments

Mobile IP Part I: IPv4

VOICE OVER IP SECURITY

Advanced SIP Series: SIP and 3GPP Operations

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

SIP Roaming Server Product Overview. Mobile Convergence Technology

IP Telephony (Voice over IP)

How To Understand The Gsm And Mts Mobile Network Evolution

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

VoIP in the Wireless World

IJRDTM Kailash ISBN No Vol.20 Issue

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

GPRS and 3G Services: Connectivity Options

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

4G Mobile Networks At Risk

3GPP TS V6.3.0 ( )

Virtual Private Networks

Efficient evolution to all-ip

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Nokia Networks. Voice over Wi-Fi. White paper. Nokia Networks white paper Voice over Wi-Fi

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Delivery of Voice and Text Messages over LTE

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

Ingate Firewall/SIParator SIP Security for the Enterprise

LTE Overview October 6, 2011

Nokia Siemens Networks mobile softswitching Taking voice to the next level

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

VoIP Security regarding the Open Source Software Asterisk

Advanced SIP Series: SIP and 3GPP

Realising the Virtual Home Environment (VHE) concept in ALL-IP UMTS networks

End-2-End QoS Provisioning in UMTS networks

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Recommended IP Telephony Architecture

About Firewall Protection

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

GPRS / 3G Services: VPN solutions supported

All-IP Network Emergency Call Support

STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.

Gigabit SSL VPN Security Router

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

Securing SIP Trunks APPLICATION NOTE.

Technology Training Limited Module Portfolio for Customised Courses

Security considerations for IMS access independence

Review: Lecture 1 - Internet History

Mobile Communications

SIP Based Architecture for Integration of 1xRTT Femtocells

Convergence Technologies Professional (CTP) Course 1: Data Networking

3G/Wi-Fi Seamless Offload

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Index. Common Packet Channel (CPCH) 25 Compression 265, , 288 header compression 284

Session Border Controllers in Enterprise

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

Table of Content. Introduction Components Architectural Characteristics Concepts Protocols Service Examples Discussion. ToC

Juha Heinänen

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Current and Future Research into Network Security Prof. Madjid Merabti

Technical papers Virtual private networks

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Transcription:

On Security in All-IP Networks Alcatel SEL AG Matthias Duspiva

Agenda > On wireless security > What is AAA? > AAA in All-IP networks > Identity management > Selected solutions IP-VPNs for end-to-end security Context transfer for fast handover All-IP Security 2

The scenario > All terminals and services will be Internet compatible > Services in All-IP networks: Internet Services operated by Internet Service Providers (ISP), Application Services operated by Application Service Providers (ASP) e.g. in banking and commerce, Communication Services such as Unified Messaging or VoIP by Communication Providers and Media Services by Content Providers. > Revenue models develop from the pay-per-minute bill model in second generation networks to application and content based bill in third and fourth generation networks > The revenue models for personal applications are: 1. Fixed access fee based on the limited access resources. 2. Minute or kbyte bill model used in mobile telephony by mobile operators. 3. Application licensing or upgrade model, also possible as Application Service Provider (ASP) model. Microsoft has been one dominant player here. 4. Content delivery model, used in games and in audio or video distribution. Source: Necsom Ltd, Finland All-IP Security 3

What security is about > Prevention before it happened Authentication are they who they claim to be? Authorization do they have permission to do it? Accounting a log or history of what happened > Detection when it happens Intrusion detection Intrusion tolerance (new research area) > Reaction after it happened Damage assessment Recovery Forensics All-IP Security 4

Basic wireless security requirements > Confidentiality of exchanges make sure that nobody can listen in. > Authentication Certify the identities of the parties involved. > Data Integrity assurance that data is not tampered with on its journey. > Non-repudiation of transactions assure agreements are legally binding. > Availability make sure that services are available anytime. All-IP Security 5

Specific wireless security risks > In all-ip networks all of the Internet risks Identity theft, masquerade Theft of service DoS attacks (TCP, UDP, ICMP, GTP-U/C flood, HTTP request ) Viruses, worms, trojan horses Modification (Control flow GTP-C ; Management flow SNMP, User data flow), replay, > Especially eavesdropping (passive attacks from a distance): violation of privacy and confidentiality > Hardware limitations, such as low network bandwidth and limited battery power, also increases denial-of-service risk (a.k.a. resource depletion/exhaustion attacks) Source, partly: Kai Hwang, University of Southern California All-IP Security 6

Some Security Requirements of the IMS > User identity confidentiality (private ID not sent in clear) > Mutual authentication between the user and the network or service provider > Confidentiality protection of SIP messages (for payload on underlying layers) > Data integrity protection for SIP signaling > Visibility and configurability of security features (e.g. accept/reject non-ciphered sessions) > Protection of location information (external service providers) IMS: IP Multimedia Subsystem All-IP Security 7

Assumption > Extremely vulnerable interfaces are: Interface to the external Packet Data Network (Gi) Can be used to easily flood NEs Masquerade as NEs Integrity, Privacy violation of user traffic Interface to another PLMN (Gp) Can be used to masquerade and perform DoS attacks Flooding is also a concern but not very critical All-IP Security 8

Increasing Security Demand in M-Commerce and Pervasive Applications > LANs, clusters, Intranets, WANs, Grids, and the Internet all demand security protection hacker-proof operations, crucial to the acceptance of a trust-based digital society > Innovative mobile wireless services, E-transactions, telemedicine, and digital government; all demand high security, privacy protection, and data integrity. Source: Kai Hwang, University of Southern California All-IP Security 9

What is AAA? > Authentication who is who? > Authorization profile, permissions > Accounting who pays for what? > AAA servers: Home AAA Server AAA server in the home network. Visited AAA Server AAA server in the network providing service when user is roaming outside home network. Broker AAA Server Intermediate AAA server(s) having security associations with Home and Visited AAA Servers. All-IP Security 10

AAA architecture Foreign Provider Home Service Provider User Service Equipment AAA Broker AAA server AAA server AAA server Home Network Provider AAA Server Authorization Module Authentication Module Accounting Module All-IP Security 11

AAa? > RADIUS is the dominating AAA protocol in IP networks today, while Diameter is the successor of this well-known protocol. Diameter is currently standardized within the IETF AAA working group. Both RADIUS and Diameter are flexible and extensible protocols. Additionally, Diameter is built to be interoperable (backwards compatible) with RADIUS. Both the Diameter and the RADIUS protocols are and will be used for the fixed PSTN, cellular PPP kinds of dial-up users as well as roaming Mobile IP users. > AAA provides Internet roaming services i.e. the user is entitled the use of various access networks around the world, while keeping the users Internet service agreements with a home Internet service provider. All-IP Security 12

aaa > The aaa function acts as storage buffer for near real-time charging data collection from the IMS nodes. > Session Charging Function (SCF) > Bearer Charging Function (BCF) > Event Charging Function (ECF) Subscriber Content Charging Function (SCCF) Content Provider Charging Function (CPCF) PN-4935.7 (TIA-873.7): All-IP Core Network Multimedia Domain IP Multimedia Subsystem Accounting Architecture All-IP Security 13

Authentication > Online identity: IP address, phone no., Email address, IMSI, IMUI,? > Credentials used to prove the identity and role (have, know, be) > IP Multimedia Subsystem (IMS): strong user authentication in addition to network authentication makes it possible to access IMS from different access networks; SIP requires authentication at session level > Approach: Layered authentication for network and service access; 802.1x, EAP-SIM, Radius, Diameter, WIM/WTLS > EAP method used: the User Identity field carries the user identity composed by the Public User Identity and a Home Network Domain Name All-IP Security 14

Authorization > Authorization is a MMCS function, it aligns service requests with the service agreement (subscription profile) > Profile: subscriptions! Network/Service Access control! authorization for QoS > Policy-based Authorization: Dynamic Home IP Address Allocation (DHCP). Network Access Control (time-of-day controls). Differentiated Service Delivery. MMCS: Multimedia Call Server All-IP Security 15

Accounting > Variety of services (aaa in SGSN for bearer, in S-MMCS for call control): Communications (voice and data) Transactions (m-commerce, micro-payment) Value-added content (location based services, gaming, ) > Customer billing on a usage or flat rate basis: convert all usage/charging records into mobile format and maintain relation to IMSI > Wholesale billing between the network operator and content aggregators (portals, ), branding of the aggregator on the bill issued by the network operator > Goal: unified bill for all services, predictable charging mechanism for usage per transaction / flat rate / volume / duration > Problem: many subscriptions and connections to value-added service providers and content providers All-IP Security 16

Accounting, cont. > Billing challenge: In 2G networks are all services provided by the operator and billing is based on the service usage 2.5G architecture made 3 rd party services possible In all-ip 3G everybody can offer services to mobile users Amount of billing tickets increased: challenge to billing servers New billing model needed for 3G operators, not to end up just selling bandwidth Source: WFI All-IP Security 17

Charging in an All-IP network > The purpose of charging is to collect data on the network resource usage and services to enable the billing of the subscriber > Charging layers Access Layer: The charging for the usage of bearer resources (e.g. GPRS access services) IP Multimedia Layer: The charging of services provided by the IMS (e.g. multimedia sessions) Service and Application Layer: The charging of services provided by the service subsystem (e.g. games, location) Source: Kati Lehtinen All-IP Security 18

Charging in an All-IP network, cont d. > Two separate charging architectures: off-line and on-line charging architecture Off-line charging architecture provides a charging process where charging information does not affect, in real-time, the service rendered On-line charging architecture provides a charging process where charging information can affect, in real-time, the service rendered and therefore directly interacts with the session/service control Source: Kati Lehtinen All-IP Security 19

3GPP AAA server > The 3GPP AAA server is located within the 3GPP network. > The 3GPP AAA server : Retrieves authentication information and subscriber profile (including subscriber's authorisation information) from the HLR/HSS of the 3GPP subscriber's home 3GPP network; Authenticates the 3GPP subscriber based on the authentication information retrieved from HLR/HSS. The authentication signalling may pass through AAA proxies. Communicates authorisation information to the WLAN potentially via AAA proxies. Registers its (the 3GPP AAA server) address or name with the HLR/HSS for each authenticated and authorised 3GPP subscriber. May act also as a AAA proxy (see next slide). Source: WFI All-IP Security 20

3GPP AAA proxy (1) > The 3GPP proxy AAA functionality can reside in a separate physical network node > It may reside in the 3GPP AAA server or any other physical network node > It represents a Diameter proxying and filtering function that resides in the visited 3GPP network. WLAN Access Network (with or without an intermediate network) Wr/Wb 3GPP Visited Network 3GPP AAA Proxy Wr/Wb 3GPP Home Network 3GPP AAA Source: WFI All-IP Security 21

3GPP AAA proxy (2) > The 3GPP proxy AAA functions include: Relaying the AAA information between WLAN and the 3GPP AAA Server Enforcing policies derived from roaming agreements between 3GPP operators and between WLAN operator and 3GPP operator Reporting charging/accounting information to local Charging Collection Function(CCF)/Charging Gateway (CGw) for roaming users Service termination (O&M initiated termination from visited NW operator) Receiving authorisation information (Subscriber information) Forwarding authorisation information to WLAN Source: WFI All-IP Security 22

3GPP, 3GPP2 > 3GPP uses GGSN, SGSN nodes. > 3GPP does not allow heterogeneous access. > The HLR is likely to be used by the SGSN for authenticating data users. Thus, access and data network authentication are integrated. > 3GPP2 uses mobile IP and PSDN as FA/HA. > It allows heterogeneous access. > The PSDN uses an AAA infrastructure to authenticate data users. Access and data network authentication are separate. Source: Sridhar Machiraju, University of California at Berkeley All-IP Security 23

3GPP2 All-IP Network Architecture Model Application Databases EIR DSI Sub Poli Service Application Service Control Transport Position Server Position Determining Entity Subscription QoS Manager AAA! Network Capability Gateway Session Control Manager Core QoS Manager Roaming Signaling Gateway Trunk Signaling Gateway Media Gateway Control MAP 41 & GSM Signaling-Control Bearer Radio Access Net. BTS BSC + PCF MM Other Access Networks Access Gateway FA/ Attendant Media Resource Function Mobile IP Home Agent Media Gateway Border Router PSTN MS Legacy MS Domain Support IP Network Source: Sridhar Machiraju, University of California at Berkeley All-IP Security 24

Interfaces of the border gateway > The interfaces between the network elements are referred to in the specifications as reference points. They are: Wr: Connects WLAN AN to the 3GGP AAA server Wx: Located between the 3GPP AAA server and the HSS D /Gr : Located between the 3GPP AAA server and the HLR Wb: Located between the WLAN AN and the 3GPP network Wo: Used by a 3GPP server to communicate with the OCS Wf: Located between the 3GPP AAA server and the CCF/CGw Wn: Tunnels WLAN user data towards the 3GPP system Wi: Connects the PDGW and a Packet Data Network All-IP Security 25

And what about end-to-end security? > IMS mainly relies on PS network physical security: for more security use application security on top of IP > Use IPSec to establish end-to-end security associations, e.g. for corporate access; policies for Access control (access for trusted traffic only) Security coverage (nodes, domains, areas) Content access (for trusted Proxy, Intrusion Detection System) > Use SSL/TLS for point-to-point transactions > Authentication by shared keys (IKE) or PKI Digital Certificates > Use Intrusion Detection Systems, antivirus software, etc. All-IP Security 26

Security Model > The mobile networks implement with AAA the classical model of restricted access systems > SIP requires more mechanisms, e.g. phone or instant messaging spam control (black list / white list), in order not to end up like Email, or to help increase data privacy > Several stages of access control and access mobility require a lot of identities and credentials for Mobile network access, wireless network access MNO service access ISP network access Internet service access All-IP Security 27

Approaches for (user) identity management > Network access > Service access > Identity federation (Liberty Alliance): single sign-on, etc. smart card client identity access networks appli. Billing Identity provider end-to-end security Internet Applications, circle of trust Authentication Circles of trust All-IP Security 28

Identity Federation Token SIM Web Server service provider cgi / JSP /... user; browser, credentials access control... ID1 ID2 ID3 ID4 security assertion ID server Authentication IP IP gateway SS7 business processes token server LDAP MAP/SS7 user/psw device ID CCBS, etc. HLR All-IP Security 29

Issues > Fast and secure: the mobility scheme should support different levels of security requirements such as data encryption and user authentication, while limiting the traffic and time of security process e.g. key exchange. > From a handoff performance perspective, one of the key issues in the development of a multilayer mobility management scheme is minimizing the handoff delay while a mobile host is roaming across the homogeneous/heterogeneous networks. > AAA adds an undesired delay component. All-IP Security 30

Example of an Approach for fast HO > IST Evolute (FP5) proposes a context transfer mechanism to minimize and if possible eliminate the additional delay introduced due to AAA security provisioning. Context transfer forwards the AAA preestablished information to the new Access Router (nar). Context Transfer aims to contribute to the enhancement in handover performance. When a mobile node (MN) moves to a new subnet it needs to continue certain transport- or routingrelated services that have already been established at the previous subnet. Such services are known as context transfer candidate services, and examples include header compression, QoS policy, AAA profile and IPsec state. All-IP Security 31

Conclusion > Extremely complex architecture (Access, Core, IMS, Internet) > Not all domains under control of the Mobile Network Operator > Mobility follows AAA; fast horizontal and vertical HO > Limited bandwidth and requirements on spectrum efficiency influence the choice of the security protocols > Many research projects and standardization work ongoing to find solutions All-IP Security 32

References > IST-2001-32449 Evolute project > Nokia OMA, http://www.openmobilealliance.org/ > Microsoft.NET, http://www.microsoft.com/net/ > GRID Forum, http://www.gridforum.org/ > Liberty Alliance http://www.projectliberty.org/ > draft-kroeselberg-sip-3g-security-req-00.txt All-IP Security 33