Mobile Devices Security: Evolving Threat Profile of Mobile Networks



Similar documents
Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

3GPP SAE/LTE Security

LTE Security How Good Is It?

LTE Overview October 6, 2011

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Security in the Evolved Packet System

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

4G Mobile Networks At Risk

Security Analysis of LTE Access Network

Delivery of Voice and Text Messages over LTE

3GPP Long Term Evolution: Architecture, Protocols and Interfaces

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

TEPZZ 68575_A_T EP A1 (19) (11) EP A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Long Term Evolution - LTE. A short overview

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

How To Understand The Gsm And Mts Mobile Network Evolution

Introduction to Evolved Packet Core

LTE Performance and Analysis using Atoll Simulation

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

Evolutionary Trends towards Beyond 3G Mobile Networks

Chapter 6 Wireless and Mobile Networks

Mobile Services (ST 2010)

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

Diameter in the Evolved Packet Core

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Architecture Overview NCHU CSE LTE - 1

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

Overview of the Evolved packet core network

EE5406 Wireless Network Protocols Network Architectures

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

Protocol Signaling Procedures in LTE

EETS 8316 Wireless Networks Fall 2013

On LTE Security: Closing the Gap Between Standards and Implementation

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Evolution of the 3GPP Network Architecture, (the Evolved Packet Core)

The future of mobile networking. David Kessens

LTE CDMA Interworking

Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Mobile Office Security Requirements for the Mobile Office

Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS

GSM services over wireless LAN

LTE and the Evolution to 4G Wireless

IP Multimedia System: general aspects and migration perspectives

2G/3G Mobile Communication Systems

IPv6 and 4G. Christian Bonnet Michelle Wetterwald Institut Eurécom

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

Nokia Siemens Networks Flexi Network Server

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Security Requirements for Wireless Networking

INTERNATIONAL TELECOMMUNICATION UNION

Evolution of GSM in to 2.5G and 3G

Mobility Management for All-IP Core Network

2G Mobile Communication Systems

Security Architecture Standardization and Services in UMTS

LTE Control Plane on Intel Architecture

Study of Long Term Evolution Network, its Architecture along with its Interfaces

Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester

From GSM to LTE-Advanced. An Introduction to Mobile Networks and Mobile Broadband. Revised Second Edition

Product Description. HUAWEI E3372s-153 LTE USB Stick (Cat.4) HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Mobile network evolution A tutorial presentation

LTE Attach and Default Bearer Setup Messaging

Mobility and cellular networks

Contents. Continuity of services and mobility

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.

Security and Authentication Concepts

Product Description. HiLink E3531 HSPA+ USB Stick V100R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Telesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER

PDF vytvořeno zkušební verzí pdffactory UMTS

WHITE PAPER. WiMAX Security for Real-World Network Service Provider Deployments

Authentication and Security in IP based Multi Hop Networks

Emerging Standards for Mobility Management in Next-Generation All-IP Networks

Inter Technology Load Balancing Algorithm for Evolved Packet System

LTE X2 Handover Messaging

SAE and Evolved Packet Core

3GPP System Architecture Evolution. ATIS LTE Conference January 26, GPP TSG SA Chairman Stephen Hayes

Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks

Chapter 1 Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

Wireless & Mobile. Working Group

Security in cellular-radio access networks

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

Voice and SMS in LTE White Paper

Advanced SIP Series: SIP and 3GPP

Priority, Pre-Emption, and Quality of Service

Supporting mobility in the RAN cloud

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks

Abstraction of Mobile Network Topology Albert Codes Morales Supervised by: Dr. Toktam Mahmoodi King s College London March 2015

UNDERSTANDING CORE TELECOM SECURITY

Global System for Mobile Communication Technology

Transcription:

Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD

Objectives Introduction Mobile Network Security Cybersecurity Implications Mitigations & Future Developments 2

3 Introduction

Mobile Network Security Helicopter view Service Service Layer O&M, OSS/BSS Subscriber Identity Module (SIM) Mobile Equipment (ME) Radio Network Core Network Foreign Network User Equipment (UE) Internet Home subscriber subsystem (HSS) Other network e.g. WiFi New radio network Legacy radio networks Control plane User plane 4 Security, standardized or otherwise

5 Mobile Network Security

UMTS Security: Architecture Service (IV) Service Layer K HSS & USIM CK IK ME & Radio network ME (III) User Equipment (I) USIM (I) Radio Network Mutual authentication, confidentiality (optional) & integrity Separate keys for confidentiality & integrity Same keys for user and control planes HSS: Home Subscriber Subsystem; ME: Mobile Equipment; USIM: Universal Subscriber Identity Module 6 (I) (I) Core Network (I) (II) HSS Network access security (I) Network domain security (II) User domain security (III) Application domain security (IV) Visibility and configurability of security (V)

LTE Security: Architecture Service (IV) Service Layer ME (III) User Equipment (I) USIM (I) (I) Radio Network Mutual authentication, confidentiality (optional) & integrity Separate keys for each purpose (I) (I) (II) Core Network (I) (II) HSS Network access security (I) Network domain security (II) User domain security (III) Application domain security (IV) Visibility and configurability of security (V) USIM: Universal Subscriber Identity Module; ME: Mobile Equipment; HSS: Home Subscriber Subsystem 7

LTE Security: Mobility aspects Element 1 LTE Core Network Element 2 UMTS Core Network Base-Station Cell 1 Cell 2 LTE: Long-Term Evolution Forward & backward security: Cryptographically separate keys derived at each handover Keys mapped between different types of networks 8

Security Considerations Over-the-top services Service control, Authentication center, O&M, OSS/BSS etc. 1. Subscriber privacy 2. Fraudulent charging Core network 3. Protocol attack 4. Attack on network elements Radio network BSS: Billing Support System; DoS: Denial of Service; DDoS: Distributed DoS; O&M: Operations and Management; OSS: Operations Support System 9 5. Finding network topology 6. Overload network (DoS, DDoS): with botnets, malware, home made terminals etc.

10 Cybersecurity Implications, Mitigations, and Future Developments

Cybersecurity Implications GSM GPRS UMTS SAE/LTE Security Services Ciphering User authentication Equivalent to wired Ciphering User authentication Ciphering & integrity Mutual auth. Ciphering & integrity Mutual auth. Authentication Authentication: 3 values UMTS-AKA: 5 values EPS-AKA: 5 values Keys Derivation of a ciphering key after auth. Derivation of CK & IK Separate keys for each purpose Key Length Shared key 128 bits for auth. Derived 64 bits out of which 54 used for ciphering Shared key 128 bits for auth. Derived 64 bits for ciphering 128 bits 128 bits Key handling Changed on authentication Changed on each handover Algorithm End-Point Security A5/1 / 2 /3; specification is confidential. A5/3 is based on Kasumi GPRS Encryption Algorithm (GEA): GEA0/GEA1/GEA2/ GEA3 Kasumi from Rel. 4 SNOW 3G, AES and ZUC BTS SGSN RNC / SGSN enb for UP & RRC MME for NAS Network Security None None initially MAPsec and IPsec IPsec 11

Cybersecurity Implications Threat landscape and computational power have evolved much faster, with no significant updates in the overall security architecture Local DoS attack against the cell service Heterogeneous networks (Metrocells, Femtocells and WiFi) Local radio jamming attacks Complex DDoS threats targeting essential EPC elements, such as the HSS 12

Cybersecurity Implications Attack Mode Local (Femto/RAN/eNB/WiFi) EPC (Core) PDN (Global) DoS 1. Jamming Attack DL-LP UL-LP Femto-based 2. BS Vulnerabilities DDoS 1. LP Jamming Attack 2. BS saturation with SMS 3. Protocol Misbehavior Insider 1. Jamming with a BS 2. BS Shutdown 1. Femto-based Attack 2. Core Network Vulnerabilities in GW, MME 1. Botnet of MEs 2. Amplification Attacks 3. HSS Saturation 4. EPC Saturation 1. Node Damage 2. HSS Saturation 3. EPC Saturation 1. APT 2. Malware 1. Botnet of MEs 2. Attack against Internet Nodes 1. HSS Saturation 13

Mitigations & Future Developments HSS Saturation Attacks EPC Amplification Attacks Scalability Attacks Jamming Attacks Flexible/Distributed Load Balancing (SDN) X Flexible/Adaptive Management of the EPC (SDN) Advanced Anti-Jamming Techniques (e.g., Multi-Antenna Jamming Mitigation) Distribution/Optimization of EPC Functions X X X X X X Optimization of Radio Resource Management X X Advanced Data Mining Techniques to Detect Attacks X X X X 14

Summary Introduction Mobile Network Security Cybersecurity Implications Mitigations & Future Developments 15

Q&A Anand R. Prasad: anand@bq.jp.nec.com Selim Aissi: saissi@visa.com

Page 17 Appendices

References Security for Mobile Networks and Platforms, Selim Aissi, Nora Dabbous and Anand R. Prasad, Artech House, July 2006. Security in Next Generation Mobile Networks: SAE/LTE and WiMAX, Anand R. Prasad and Seung-Woo Seo, River Publishers, August 2011. 3GPP TS 33.210: "3G security; Network Domain Security (NDS); IP network layer security". 3GPP TS 33.401: "3GPP System Architecture Evolution (SAE); Security architecture". 3GPP TS 33.102: "3G security; Security architecture.

Definitions Definitions APT BS BTS DDoS DL DoS EDGE EPC GERAN GPRS GSM GW enb Advanced Persistent Threat Base Station Base Transceiver Station Distributed Denial of Service (Attack) Down Link Denial of Service (Attack) Enhanced Data rates for GSM Evolution Evolved Packet Core GSM EDGE Radio Access Network General Packet Radio Service Global System for Mobile Communications Gateway Evolved NodeB 19

Definitions Definitions EPS IMS KDF LP LTE ME MME NAS NCC NGMN NH Evolved Packet System IP Multimedia Subsystem Key Derivation Function Low Power Long Term Evolution Mobile Equipment Mobility Management Entity Non-Access Stratum Next hop Chaining Counter Next Generation Mobile Networks Next Hop 20

Definitions Definitions PCI PDG PDN PLMN PSTN RAT RNC RRC SAE SGSN SIM SMS Physical Cell Identity Packet Data Gateway Packet Data Network Public and Mobile Network Public Switched Telephone Network Radio Access Technology Radio Network Controller Radio Resource Control System Architecture Evolution (3GPP) Serving GPRS Support Node Subscriber Identity Module Short Message Service 21

Definitions Definitions UE UL UMTS USIM UTRAN User Equipment Upward Link Universal Mobile Telecommunications System Universal Subscriber Identity Module Universal Terrestrial Radio Access Network WiFi Wireless Fidelity, Wi-Fi is a trademarked term meaning IEEE 802.11x WLAN Wireless Local Area Network 22