introduction to femtocells



Similar documents
Femtocells: A Poisonous Needle in the Operator s Hay Stack

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunication

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

Dirty use of USSD codes in cellular networks

Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

GSM services over wireless LAN

ETSI TS V6.5.0 ( )

SpiderCloud E-RAN Security Overview

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Mobile network security report: Poland

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Mobile Communications

GSM security country report: USA

Advanced SIP Series: SIP and 3GPP Operations

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Security and Authentication Concepts

IJRDTM Kailash ISBN No Vol.20 Issue

Security in cellular-radio access networks

Delivery of Voice and Text Messages over LTE

LTE Security How Good Is It?

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

SS7 & LTE Stack Attack

Worldwide attacks on SS7 network

CPE WAN & FAP Management Protocols

3GPP TS V9.0.0 ( )

House intercoms attacks

Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Mobile network security report: Belgium

UMTS security. Helsinki University of Technology S Security of Communication Protocols

3GPP TSG CN Plenary Meeting #16 5 th - 7 th June Marco Island, USA. 3GPP TSG-CN1 Meeting #24 Tdoc N Budapest, Hungary,

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Mobile network security report: Netherlands

3GPP TSG SA WG3 Security S3#30 S October 2003 Povoa de Varzim, Portugal. Abstract

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Authentication and Security in IP based Multi Hop Networks

Mobile network security report: Poland

Mobile network security report: Germany

Project X Mass interception of encrypted connections

GSM security country report: Germany

UMA/GAN the next wireless revolution?

Mobile network security report: Greece

ETSI TS V ( )

Mobile Voice Off-Load

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

On LTE Security: Closing the Gap Between Standards and Implementation

Femto Cells: Current Status and Future Directions

1 Introduction Services and Applications for HSPA Organization of the Book 6 References 7

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

Radio Access Network Traffic Generation for Mobile Switching Center

Ravindranath Barathy 1, Dandavate Pushpak 2 and Das Bhumesh 3 ABSTRACT INTRODUCTION

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

4G Mobile Networks At Risk

Open access femtocell business feasibility with TV White Space usage

FMC (Fixed Mobile Convergence)

IPv6 and 4G. Christian Bonnet Michelle Wetterwald Institut Eurécom

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Security Analysis of Femtocell-Enabled Cellular Network Architecture

How To Understand The Gsm And Mts Mobile Network Evolution

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Locating Mobile Phones using Signalling System #7. Tobias Engel

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

Wi-Fi calling for business: ROGERS WHITE PAPER. An Executive Overview

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

Global System for Mobile Communication Technology

Mobility and cellular networks

Wi-Fi Calling (and Texting) For Mobile Operators

GSM System Architecture

Mobile Wireless Overview

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

HRPD Support for Emergency Services

Overview of VoIP Systems

How to hack your way out of home detention

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

Protocol Signaling Procedures in LTE

A Framework for Secure and Verifiable Logging in Public Communication Networks

SIP Roaming Server Product Overview. Mobile Convergence Technology

Mobile network security report: Norway

Topics in Network Security

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

SS7: Locate. Track. Manipulate.

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

CS Fallback Function for Combined LTE and 3G Circuit Switched Services

Transcription:

.. introduction to femtocells Kévin Redon Technische Universität Berlin, Security in Telecommunications femtocell@sec.t-labs.tu-berlin.de OsmoDevCon 2012, Berlin, 24th March 2012

UMTS architecture SecT / TU-Berlin 2 / 20

femtocells: offloading technology technical name in 3G: Home Node B (HNB) technical name in 4G: Home evolved Node B (HeNB) traffic offload from public operator infrastructure improve 3G coverage, particularly indoor cheap hardware compared to expensive 3G equipment the user provides prower, Internet connection, maintenance, and still pays for the communication different architecture (TS 25.467) more security required (TS 33.302, TR 33.820) SecT / TU-Berlin 3 / 20

small cells SecT / TU-Berlin 4 / 20

Home Node B Subsystem (HNS) SecT / TU-Berlin 5 / 20

SFR femtocell 39 femtocell offers over 24 countries target sold by SFR (2nd biggest operator in France) cost: mobile phone subscription hardware: ARM9 + FPGA for signal processing OS: embedded Linux kernel + proprietary services built by external vendors (in our case Ubiquisys), configured by operator SecT / TU-Berlin 6 / 20

Command and Control HNB is not only an Node B, but also includes a mini RNC (TS 22.220) cell configuration is done by the HMS (TS 32.581) HNB<->HMS communicatio is tr-069 (aka ACS), using SOAP/XML/HTTP cells asks HMS, but HMS can also push most data provided one time, check at every registration, with rare updates provisioning data: SeGW address, HNB-GW address, MNC, MCC, ARFCN, GSC,... SecT / TU-Berlin 7 / 20

3G IMSI-Catcher Howto build a 3G IMSI-Catcher: cell configuration is kindly provided as a feature of femtocells some comfort provided hidden web interface we can catch any phone user of any operator into using our box roaming subscribers are allowed by SFR the femtocell is turned into a full 3G IMSI-Catcher SecT / TU-Berlin 8 / 20

mutual authentication classical approach in GSM: IMSI-Catcher fake operator BTS (MCC/MNC) acts as MitM between operator and victim phone usually can't detect used to track and intercept communication UMTS standard requires mutual authentication mutual authentication is done with the home operator, not with the actual cell the femtocell forwards the authentication tokens mutual authentication is performed even with a rogue device SecT / TU-Berlin 9 / 20

HNB<->HNB-GW communication I u h protocols: I u p: I u b over IP IMS/SIP Generic Access Network (GAN) GAN: UMA specified by operators in 2004 standardized by 4GPP in 2005 into GAN (TS 44.318,TS 43.318) designed for MS<->MNO communication over IP (WiFi) borrowed for femtocells, but needs to be adapted SecT / TU-Berlin 10 / 20

Generic Access Network (GAN) device is communicating with operator via GAN protocol (UMA) TCP/IP mapped radio signaling encapsulates radio Layer3 messages (MM/CC) in GAN protocol one TCP connection per subscriber radio signaling maps to GAN messages are sent over this connection GAN usage is transparent for the phone SecT / TU-Berlin 11 / 20

but what about over-the-air encryption? only the phone femtocell OTA traffic is encrypted encryption/decryption happens on the box femtocell acts as a combination of RNC and Node-B: receives cipher key and integrity key from the operator for OTA encryption reversing tells us: message is SECURITY MODE COMMAND (unspecified RANAP derivate), which includes the keys SecT / TU-Berlin 12 / 20

SECURITY MODE COMMAND derived from RANAP, but spec unknown SecT / TU-Berlin 13 / 20

plain text OTA encryption optional traffic decoded in the HNB the only the SeGW access it used for authentication/encryption when connection all traffic in plain text same in HeNB (with stronger trusted core requirement) SecT / TU-Berlin 14 / 20

GAN proxy/client proxies all GAN connections/messages reconfigure femtocell to connect to our proxy instead of real GANC proxy differs between GAN message types attack client controls GAN proxy over extended GAN protocol SecT / TU-Berlin 15 / 20

MitM interception (SMS in GAN, voice over RTP) modification (because of the point to point design) injection (need the phone for authentication) SecT / TU-Berlin 16 / 20

return of the IMSI detach IMSI detach DoS discovered by Sylvaint Munaut in 2010 1 results in discontinued delivery of MT services (call, sms,...) network assumes subscriber went offline detach message is unauthenticated however, this is limited to a geographical area (served by a specific VLR) user can not receive calls 1 http://security.osmocom.org/trac/ticket/2 SecT / TU-Berlin 17 / 20

imsi detach in femtocell ecosystem proximity constraint not existent in femtocell network devices reside in various geographical areas but all subscribers meet in one back-end system and they are all handled by one femtocell VLR (at least for SFR) we can send IMSI detach payloads via L3 msg in GAN we can detach any femtocell subscriber, no proximity needed! SecT / TU-Berlin 18 / 20

the end thank you for your attention questions? SecT / TU-Berlin 19 / 20

contact us Nico Golde <nico@sec.t-labs.tu-berlin.de> @iamnion Kévin Redon <kredon@sec.t-labs.tu-berlin.de> Ravi Borgaonkar <ravii@sec.t-labs.tu-berlin.de> @raviborgaonkar or just femtocell@sec.t-labs.tu-berlin.de SecT / TU-Berlin 20 / 20