How to secure an LTE-network: Just applying the 3GPP security standards and that's it?



Similar documents
4G Mobile Networks At Risk

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

LTE Security How Good Is It?

Security in the Evolved Packet System

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

LTE Overview October 6, 2011

Security Analysis of LTE Access Network

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Diameter in the Evolved Packet Core

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

LTE and the Evolution to 4G Wireless

3GPP SAE/LTE Security

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

3GPP Long Term Evolution: Architecture, Protocols and Interfaces

Overview of the Evolved packet core network

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

Protocol Signaling Procedures in LTE

Evolutionary Trends towards Beyond 3G Mobile Networks

Delivery of Voice and Text Messages over LTE

Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

Authentication and Security in IP based Multi Hop Networks

UMTS security. Helsinki University of Technology S Security of Communication Protocols

On LTE Security: Closing the Gap Between Standards and Implementation

Architecture Overview NCHU CSE LTE - 1

Worldwide attacks on SS7 network

LTE Performance and Analysis using Atoll Simulation

Security considerations for IMS access independence

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Secure distribution of the device identity in mobile access network. Konstantin Shemyak senior security specialist, Nokia Siemens Networks

ETSI TS V8.9.0 ( )

Nokia Siemens Networks Flexi Network Server

3GPP TS V9.0.0 ( )

Security Engineering Part III Network Security. Security Protocols (II): IPsec

WHITE PAPER. WiMAX Security for Real-World Network Service Provider Deployments

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

Implementing LTE International Data Roaming

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

SAE and Evolved Packet Core

introduction to femtocells

3GPP TSG SA WG3 Security S3#25 S October 2002 Munich, Germany

Mobile Office Security Requirements for the Mobile Office

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Basics of Internet Security

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Evolution of the 3GPP Network Architecture, (the Evolved Packet Core)

ETSI TS V ( )

Femtocells: A Poisonous Needle in the Operator s Hay Stack

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks

Nokia Siemens Networks Flexi Network Gateway. Brochure

Telesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER

Securing the Interconnect Signaling Network Security

LTE CDMA Interworking

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Cisco Wireless Security Gateway R2

GSM services over wireless LAN

Authentication as a Service for LTE Base Stations

Technical white paper. Enabling mobile broadband growth Evolved Packet Core

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

Building A Secure Microsoft Exchange Continuity Appliance

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

ARIB STD-T V G Security; Network Domain Security; IP network layer security (Release 5)

3GPP TSG SA WG3 Security S Meeting S3#16 Sophia Antipolis, November, Abstract

Chapter 2 Network Architecture and Protocols

TLS and SRTP for Skype Connect. Technical Datasheet

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

FMC (Fixed Mobile Convergence)

Inter Technology Load Balancing Algorithm for Evolved Packet System

Study of Long Term Evolution Network, its Architecture along with its Interfaces

Secured VPN Models for LTE Backhaul Networks

A User s Perspective on Voice over WiFi Calling

SS7 & LTE Stack Attack

ARIB STD-T V G Security; Network Domain Security; IP network layer security (Release 6)

Using Entrust certificates with VPN

Securing an IP SAN. Application Brief

Mobility Management for All-IP Core Network

Security in LTE backhauling

Revenue Analytics for Long Term Evolution (LTE)

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

ITL BULLETIN FOR JANUARY 2011

Advanced SIP Series: SIP and 3GPP Operations

Project 25 Security Services Overview

Guidance Regarding Skype and Other P2P VoIP Solutions

Security MWC Nokia Solutions and Networks. All rights reserved.

Security vulnerabilities in the Internet and possible solutions

ehrpd Mike Keeley Market Segment Director

A Call Conference Room Interception Attack and its Detection

LTE Attach and Default Bearer Setup Messaging

Mobile network evolution A tutorial presentation

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Case Study for Layer 3 Authentication and Encryption

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols

Transcription:

How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012

Intro / Agenda answer the title question: not only a simple obviously not 3GPP security architecture of the Evolved Packet System, aka (SAE/)LTE-network, 4G mobile network IP network security, network element security for the EPS many names: 3GPP: 3.Generation Partnership Project LTE: Long Term Evolution SAE: System Architecture Evolution EPS: Evolved Packet System 4G Mobile Network (List of 3GPP specific abbreviations at the end) 2 Nokia Siemens Networks 2012

The Evolved Packet System (4G Mobile Network) 4G Mobile Core Network (Evolved Packet Core) Mobile 4G Radio Access Network SEG MME Charging Systems SAE-GW Internet enb Relay Node SeGW Serv.GW PDN-GW HeNB Trusted Non-3GPP Access Network Untrusted Non-3GPP Access Network epdg HSS 3GPP AAA Server PCRF IMS / Operator Services Corporate IP Networks 3 Nokia Siemens Networks 2012 Control plane User plane Control+user plane Trusted Untrusted

EPS Key Hierarchy and Radio Interface Security Mobile enb MME HSS USIM K The shared long term secret that never leaves the USIM or the AuC AuC K CK/IK CK/IK K ASME NAS signaling integrity K ASME K ASME K NASint NAS signaling encryption K NASint K NASenc K NASenc K enb RRC sign. integrity K enb K enb K enb-rrcint K enb-rrcenc K en-upenc RRC sign. encryption user plane encryption K enb-rrcint K enb-rrcenc K en-upenc key derivation key transport key usage ASME AuC CK Access Security Mgmt. Entity Authentication Centre Cipher Key enb IK MME Evolved Node B Integrity Key Mobility Management Entity NAS RRC USIM Non Access Stratum Radio Resource Control UMTS Subscriber Identity Module 4 Nokia Siemens Networks 2012

EPS Key Hierarchy and Radio Interface Security (continued) Authentication and Key Agreement (AKA) based on long term shared secrets (in USIM and AuC) key hierarchy providing key separation 5 independent 128bit keys binding of keys to serving network identities integrity and confidentiality protection of Non Access Stratum (NAS) and Access Stratum (AS) signaling strong algorithms: SNOW 3G, AES, optionally ZUC integrity protection mandatory, encryption recommended no integrity for the user plane (issue with transmission errors) user and terminal identity confidentiality (against passive attacks only) a sound concept, assumed to be strong enough for the next decade 5 Nokia Siemens Networks 2012

Backhaul Link Security S1 SEG MME enb X2 S1 IPsec Tunnels Serving GW enb Untrusted Network Control plane User plane IKEv2/IPsec with integrity and confidentiality protection mandatory for all traffic (control/user/management plane) well, not mandatory in all cases: In case S1 and X2 user plane interfaces are trusted (e.g. physically protected), the use of IPsec/IKEv2 based protection is not needed. [3GPP TS 33.401 V11.2.0 (2011-12)] and this holds also for control and management traffic 6 Nokia Siemens Networks 2012

Backhaul Link Security (continued) enb manufacturer key pair and manufacturer signed certificate pre-installed profiling of IKEv2/IPsec specified; IKEv2 based on certificates enb comes equipped with id, private/public key pair, manufacturer certificate, can be integrated into the operator PKI via certificate enrolment plug and play solution alternatively: pre-installed operator certificate for mutual authentication when initially connecting to the core network more secure and more expensive a highly secure backhauling solution is specified (but less secure ones are not excluded) obtain operator signed certificate and operator root certificate via CMPv2 CMPv2 IPsec Operator RA/CA manufacturer root certificate installed Security Gateway operator signed certificate and operator root certificate installed 7 Nokia Siemens Networks 2012

Security for Core Interfaces (NDS/IP Network Domain Security for IP) IKE/IPsec profiles specified similar as for backhaul link (IKEv2 or v1, peer authentication based on certificates, IPsec ESP in tunnel mode) IPsec mandatory to use for integrity protection of control traffic between security domains example: GTP-C traffic between serving network and home network when roaming in specific cases, also encryption is mandatory e.g. interface between core and 3G radio network controller, if they are in different security domains protects 3G radio interface keys sent to the controller seems that this has been forgotten (?) for the interface between MME in serving network and HSS in home network (S6a when roaming) all other IPsec protection is optional Security Gateways (SEGs) to be used at security domain borders terminate IKE/IPsec not specified: firewall functions (not required for interoperability) standard gives hints - but in the end the operator has to decide where and how to use NDS/IP 8 Nokia Siemens Networks 2012

enb (4G Base Station) Security enb Backhaul Link IPsec protection SEG Mobile Radio interface Control plane protection Management plane Control plane User plane encryption NAS signaling User plane Secure Environment User plane 9 Nokia Siemens Networks 2012

enb (4G Base Station) Security (continued) performs the crypto specified for radio interface and backhaul link has access to the cleartext in the user plane may be exposed to tampering that can result in compromise - and then: eavesdrop/modify user traffic, send maliciously crafted PDUs to the core, detach mobiles, discard traffic mostly applicable to the local cell (possibly also to neighboring cells) more to figure out 3GPP requires a secure environment inside the enb stores keys, executes crypto, helps to secure boot preserves integrity and confidentiality of its content only authorized access standardized requirements, but no standardized solution for the secure environment (not required for interoperability) 10 Nokia Siemens Networks 2012

HeNB (4G Femto Cell) Security relevant functions within the security architecture like the regular enbs even more exposed to tampering and compromise - and can be easily set up where required (increase transmission power if necessary) targeted attack against victim users, e.g. celebrity attack : eavesdrop the celebrity s calls plus attacks against the core network (see enb) 3GPP requires a Trusted Environment inside the HeNB built on a HW-based root of trust, secure boot, load only verified components assure the enb secure environment for crypto, key storage etc. a device integrity check on boot (in case of failure no access to credentials) standardized strong requirements, but no standardized solution (not relevant for interoperability) a typical operator business case requires cheap HeNBs, low TCO How secure will HeNBs be in practice? 11 Nokia Siemens Networks 2012

HeNB (4G Femto Cell) Security (continued) HeNB may be in closed mode (can only be used by a CSG Closed Subscriber Group) this can protect other subscribers (in Rel 11) mutual authentication with IKEv2 when connecting to the core optional hosting party authentication IPsec used to be mandatory for all communication with the core network (in Rel 9), but in Rel 11 the standard says: If the operator chooses not to use IPsec, mutual authentication between the H(e)NB device and the SeGW shall be performed and the interface between the H(e)NB and SeGW shall be secured with a mechanism that provides layer 2 security for confidentiality and integrity protection of communications. This mechanism then shall also bind this secure communications to device authentication... [3GPP TS 33.320 V11.4.0 (2011-12)] Would you like to implement it this way? most of the above holds also for 3G femto cells How secure do you consider today s 3G femto cell deployments? 12 Nokia Siemens Networks 2012

Other EPS Security Mechanisms cover usage of relay nodes non-3gpp access to the core network mobility intra LTE between LTE and 2G/3G networks between 3GPP and non-3gpp access networks security for the IP multimedia subsystem ( voice over LTE) generic bootstrapping architecture and more Buy you a good book to find out! 13 Nokia Siemens Networks 2012

Threat mitigation 3GPP addresses security of interfaces mainly security specified for radio interface, backhaul link, core interfaces protects traffic against interception, modification, replay subscriber authentication protects against theft of service, impersonation of other subscribers, fraud there s a new trend in 3GPP to cover also platform security by standardizing requirements (solutions are proprietary) this leaves a lot to address otherwise: flooding, crashing or compromising nodes by exploiting implementation flaws, compromising network elements via weak O&M procedures, IP network security, network element security out of scope here: physical site protection, organizational security measures (e.g. malicious insider threat) 14 Nokia Siemens Networks 2012

EPS Traffic Separation Example Mobile Station EPS Control Plane Charging MME HSS PCRF O&M IMS enb backhaul network SEG User Plane (intra PLMN) epdg Serv.GW SAE-GW PDN-GW LI Gateway LI Appl. Server IP Services The Internet Untrusted non 3GPP access GRX other PLMN / GRX LEA Corporate IP network 15 Nokia Siemens Networks 2012

EPS Perimeter Security Example Mobile Station EPS MME HSS PCRF IMS enb ACLs backhaul network SEG SAE-GW SGi ACLs Serv.GW FW PDN-GW ACLs Appl. Server epdg ACLs S8 FW LI Gateway The Internet Untrusted non 3GPP access other PLMN / GRX LEA Corporate IP network 16 Nokia Siemens Networks 2012

IP Network Security Measures traffic separation perimeter security secure operation and maintenance (O&M) secure operation of services/protocols like DNS, NTP, IP routing etc. additional, enhanced security measures if required to mitigate a specific threat scenario if enhanced security is part of the service the MNO offers to the subscribers examples: enhanced packet inspection, intrusion detection and prevention enhanced security support for IP based mobile stations (e.g. antivirus, antiphishing, parental control, health check etc.) 17 Nokia Siemens Networks 2012

Network Element Security threat and risk analysis per network element network element security architecture secure coding hardening security testing security audit security vulnerability monitoring process for timely patching This is really essential! but out of the scope of this presentation 18 Nokia Siemens Networks 2012

Summary: How to Secure an LTE-Network? Comply with the 3GPP recommendations and choose the good options! Do all the other stuff: use IP network security mechanisms use network elements designed and implemented with security in mind organizational security measures, physical site protection, monitor your network security is a process! 19 Nokia Siemens Networks 2012

Some Abbreviations 3GPP ASME AuC CA CMP CK enb enc EPC epdg EPS ESP GRX GTP-C GW HeNB HNB HSS IK IMS 3. Generation Partnership Project Access Security Management Entity Authentication Centre Certificate Authority Certificate Management Protocol Cipher Key Evolved Node B Encryption Evolved Packet Core Evolved Packet Data Gateway Evolved Packet System Encapsulating Security Payload GPRS Roaming exchange Network GPRS Tunneling Protocol - Control Gateway Home enb Home Node B Home Subscriber Server Integrity Key IP Multimedia System int Integrity K Key LEA Law Enforcement Agency LI Lawful Interception LTE Long Term Evolution MME Mobility Management Entity NAS Non Access Stratum PCRF Policy and Charging Rules Function PDN Packet Data Network PKI Key Infrastructure PLMN Land Mobile Network RA Registration Authority RRC Radio Resource Control SAE System Architecture Evolution SEG Security Gateway SeGW Security Gateway Serv.GW Serving Gateway UMTS Universal Mobile Telecomunication System UP User Plane USIM UMTS Subscriber Identity Module 20 Nokia Siemens Networks 2012