GSM and UMTS security



Similar documents
UMTS security. Helsinki University of Technology S Security of Communication Protocols

Security protocols of existing wireless networks

Security Evaluation of CDMA2000

Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol

ETSI TS V3.6.0 ( )

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols

Mobile Office Security Requirements for the Mobile Office

Mobile network security report: Poland

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Wireless LAN Security Mechanisms

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Mobile Phone Security. Hoang Vo Billy Ngo

Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra

GSM Risks and Countermeasures

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

LTE Security How Good Is It?

IMSI Catcher. Daehyun Strobel. 13.Juli Seminararbeit Ruhr-Universität Bochum. Chair for Communication Security Prof. Dr.-Ing.

Security Awareness. Wireless Network Security

On the Security of 3GPP Networks

Wireless Security: Token, WEP, Cellular

ETSI TS V4.0.0 ( )

Mobile Network Security

Security in IEEE WLANs

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Security in the GSM Network

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

How To Secure Wireless Networks

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

TETRA Security. TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Keeping SCADA Networks Open and Secure DNP3 Security

Security Architecture Standardization and Services in UMTS

GSM security country report: USA

Network Security. Chapter 14. Security Aspects of Mobile Communications

Security in Wireless Local Area Network

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

SECURITY AND COOPERATION IN WIRELESS NETWORKS D R A F T

Authentication and Security in IP based Multi Hop Networks

Chapter 6 CDMA/802.11i

Problems of Security in Ad Hoc Sensor Network

Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities

Savitribai Phule Pune University

WiFi Security: WEP, WPA, and WPA2

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Authentication and Security in Mobile Phones

Mobile network security report: Greece

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Mobile network security report: Belgium

Security in Wireless and Mobile Networks

GSM security country report: Germany

Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME

TETRA Security for Poland

Security and Authentication Concepts

Wireless Encryption Protection

A Secure RFID Ticket System For Public Transport

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

Wireless Networks. Welcome to Wireless

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Linux Access Point and IPSec Bridge

Mobile network security report: Netherlands

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

chap18.wireless Network Security

Mobile network security report: Poland

CS 356 Lecture 29 Wireless Security. Spring 2013

Mobile network security report: Germany

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Networks Chapter 14: Security in WSNs

Global System for Mobile Communication Technology

CS549: Cryptography and Network Security

Content Teaching Academy at James Madison University

Security for 802 Access Networks: A Problem Statement

Information Security

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

IY2760/CS3760: Part 6. IY2760: Part 6

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Security Requirements for Wireless Networks and their Satisfaction in IEEE b and Bluetooth

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Security Issues in RFID. Kai Wang Research Institute of Information Technology, Tsinghua University, Beijing, China

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

SIM Card Security. Sheng He Seminar Work. Chair for Communication Security Prof. Dr.-Ing. Christof Paar

Authentication and Authorization Applications in 4G Networks

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Mobile network security report: Norway

Transcription:

2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages do not need physical access to the network infrastructure (cables, hubs, routers, etc.) broadcast communications wireless usually means radio, which has a broadcast nature transmissions can be overheard by anyone in range anyone can generate transmissions, which will be received by other devices in range which will interfere with other nearby transmissions and may prevent their correct reception (jamming) eavesdropping is easy injecting bogus messages into the network is easy replaying previously recorded messages is easy illegitimate access to the network and its services is easy denial of service is easily achieved by jamming 2/11

GSM Security main security requirement subscriber authentication (for the sake of billing) challenge-response protocol long-term secret key shared between the subscriber and the home network operator supports roaming without revealing long-term key to the visited networks other security services provided by GSM confidentiality of communications and signaling over the wireless interface encryption key shared between the subscriber and the visited network is established with the help of the home network as part of the subscriber authentication protocol protection of the subscriber s identity from eavesdroppers on the wireless interface usage of short-term temporary identifiers 3/11 The SIM card (Subscriber Identity Module) tamper-resistant protected by a PIN code (checked locally by the SIM) removable from the terminal contains all data specific to the end user which have to reside in the Mobile Station: IMSI: International Mobile Subscriber Identity (permanent user s identity) PIN TMSI (Temporary Mobile Subscriber Identity) i : User s secret key C : Ciphering key List of the last call attempts List of preferred operators Supplementary service data (abbreviated dialing, last short messages received,...) 4/11

GSM authentication and cipher key setup mobile phone + SIM card visited network home network IMSI IMSI PRNG (, SRES, C) A3 A8 A3 A8 SRES' SRES C SRES' C'? SRES = SRES' 5/11 Ciphering in GSM c FRAME NUMBER c FRAME NUMBER A5 A5 A5 A5 CIPHERING CIPHERING PLAINTEXT CIPHERTEXT PLAINTEXT Sender (Mobile Station or Network) Receiver (Network or Mobile Station) 6/11

Conclusion on GSM security focused on the protection of the air interface no protection on the wired part of the network (neither for privacy nor for confidentiality) the visited network has access to all data (except the secret key of the end user) generally robust, but a few successful attacks have been reported: faked base stations cloning of the SIM card 7/11 3GPP security design principles Reuse of 2 nd generation security principles (GSM): Removable hardware security module In GSM: SIM card In 3GPP: USIM (User Services Identity Module) Radio interface encryption Limited trust in the Visited Network Protection of the identity of the end user (especially on the radio interface) Correction of the following weaknesses of the previous generation: Possible attacks from a faked base station Cipher keys and authentication data transmitted in clear between and within networks Encryption not used in some networks open to fraud Data integrity not provided 8/11

3GPP authentication vectors PRNG SQN AMF f2 f3 f4 f5 f1 A SQN A AMF MAC XRES C I AUTN AMF: Authentication and ey Management Field 9/11 Processing in the USIM SQN A AUTN AMF MAC f5 f5 A SQN f1 f1 f2 f2 f3 f3 f4 f4 XMAC (Expected MAC) RES (Response) C (Cipher ey) I (Integrity ey) Verify that that SQN SQN is is in in the the correct correct range range Verify VerifyMAC = XMAC XMAC USIM: User Services Identity Module 10/11

Conclusion on 3GPP security Some improvement with respect to 2 nd generation Cryptographic algorithms are published Integrity of the signalling messages is protected Quite conservative solution Privacy/anonymity of the user not completely protected 2 nd /3 rd generation interoperation will be complicated and might open security breaches 11/11