3G Wireless Security By: Bill Barker. Overview What is 3G Wireless? What is 3G Wireless? HSPA HSPA Feistel Encryption/Decryption Feistel Encryption/Decryption.

Slides:



Advertisements
Similar presentations
Mobile Phone Technologies Evolution
Advertisements

© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. The Path to 4G April 2, 2008.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
4G-TECHNOLOGY. CONTENTS Introduction What is 4G? Evolution of 4G A look at fundamental requirements Evolution of processors and DSP Technology for 4G.
Cellular Phone and Data Standards Past, Present, and Future.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Clarkson University Forever Wired Annual Conference September 8, 2009.
UMTS / 3G Wireless ENGR 475 – Telecommunications November 7, 2006 Harding University Jonathan White.
Wireless Solutions Team 1.
WiMAX CS441 Dr. Kemal Akkaya 12/8/2011 By: Chun-Cheng Chuang.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Smith Micro & Wireless Data in 2006 Grove City College October 5, 2006.
1 Chapter 7 Networking: Computer Connections. Basic Components of a Network Sending device Communications link Receiving device.
SIP vs H323 Over Wireless networks Presented by Srikar Reddy Yeruva Instructor Chin Chin Chang.
ICS 454: Principles of Cryptography
WiMax Nadim Bohsali. What is WiMax? Worldwide Interoperability for Microwave Access Telecommunications technology that provides wireless transmission.
Jeremy Mayeres.  Cellphones  1G  2G  3G  4G/IMT-Advanced  LTE  WiMAX  4G Today  Future of 4G  Social/Ethical considerations.
Presentation on 4g.
WHAT IS W-CDMA Wideband code division multiple access (W– CDMA) is a CDMA channel that is four times wider than the current channels that are typically.
TECHNOLOGY.
A Review of the Insecurities Associated with 4G Cellular Data Networks and the Potential Repercussions for its Future Successors Presented by Scott Stappard.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
LTE ( Long TermEvolution ) student: Yi-Yun Shie Bing-Han Shen Teacher: Ru-Li Lin Southern Taiwan University of science and Technology.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter 7- Mobile and Wi-Fi Networks Taking signals on and off the air Connections to other networks Need to manage spectrum Managing and billing for services.
Aida BotonjićTieto1 WCDMA/HSPA Aida Botonjić. Aida BotonjićTieto st generation Analogue speech NMT, AMPS, TACS 2 nd generation Digital speech.
WiMAX, meaning Worldwide Interoperability for Microwave Access Emerging technology that provides wireless transmission of data using a variety of transmission.
5G MOBILE TECHNOLOGY.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Bandwidth. Learning Objectives: explain the importance of bandwidth when transmitting data; explain how different types of communication media govern.
4-G Cellular Systems. 2 What is 4-G? High data speed: 100 Mbps to 1Gbps anywhere, anytime Enable voice, data and streamed multimedia (enough speed for.
Feistel Cipher Structure
BZUPAGES.COM. Presented To: Sir Taimoor sb Presented By: M.Sheraz Anjum Bukhtyar Ali Khurram Shahzad BS(IT)5 th.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
MASNET GroupXiuzhen ChengFeb 8, 2006 Terms and Concepts Behind Wireless Communications.
The Future of Wireless Data Services By Jack Hanington.
Wireless Healthcare Applications Presented: Deng-Sing Yang Adviser: Chih-Kuo Liang Date:
Wireless Data Transmission. For wireless data transmission to occur you need three things A transmitter A receiver A wireless channel –The higher the.
Implementing VoIP in a wireless world Herman Abel Product Manager Aculab (booth 402) Phone:
WIRELESS SYSTEMS Adnan Iqbal MCS-MIT 1 1.
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
Chapter 2 Symmetric Encryption.
Looking for iPhone apps Development?. iPhone: An Introduction Designed by Apple Inc. the iPhone is an internet and multimedia enabled smartphone. Designed.
 Internet has become an integral part of our lives and our dependence on internet is increasing day by day. We used to access internet through Dial-up.
Network Management of Wireless Network Gerald Methé Bell Mobility.
MOHAMMED FAEZ ISKANDAR B OSMAN 2TSK1
Modern Mobile Technologies By: Vincent Verner. Overview Mobile hardware Generation speed standards How mobile networks work Current mobile security measures.
HSPA/HSDPA (Beyond 3G) PRESENTED BY- NEHA ANAND NUPUR ANAND ROLL NO-50 ROLL NO-55.
Long Term Evolution (LTE) By – Abhijit Kaul Nitin Khanna Sahana Mallya Vaibhav Malik.
The Online World DATA EXCHANGE. Introduction data devices/componentsperipheral Data exchange is the term used to cover all methods of passing data (including.
TECHNICAL SEMINAR S V Suresh 08731A1254 By. 1 st GENERATION:  Introduced in 1980  Analog cellular mobile,Data speed 2.4kbps  1G mobiles- AMPS,NMT,TACS.
By Chaitanya Sarma & E.Prashant
Week-4 (Lecture-1) 3G Technology: Offer broadband mobile communications with voice, video, graphics, audio and other information. 3 important Generations.
4G WIRELESS SYSTEM Presented By S. RAVINDER 06U61A0435.
LONG TERM EVOLUTION DANISH HASRAT (091042) DEEPAK SINGH (091043) GAURAV THAWANI (091052) NILESH SINGH (091079)
PRESENTED BY : P:MARREDDY07681A0453 WIRELESS SYSTEM WIRELESS SYSTEM.
The Evolution of Wireless Generations
5 G.
Wireless and mobile computing
Cellular Wireless Networks
GCSE ICT Revision Topic 2: Connectivity.
Long Term Evolution (LTE)
Feistel Cipher Structure
LM 7. Mobile Network Overview
Presentation transcript:

3G Wireless Security By: Bill Barker

Overview What is 3G Wireless? What is 3G Wireless? HSPA HSPA Feistel Encryption/Decryption Feistel Encryption/Decryption KASUMI KASUMI Future Advances/4G Future Advances/4G

What is 3G Wireless? 3G is the third generation of mobile phone standards 3G is the third generation of mobile phone standards 3G is intended for “smartphones” 3G is intended for “smartphones” Blackberry Blackberry iPhone iPhone Etc. Etc.

What is 3G cont. 3G increased bandwidth and transfer rates 3G increased bandwidth and transfer rates Web-based applications Web-based applications Phone-based audio and video files Phone-based audio and video files 3G’s uses: 3G’s uses: Sending and receiving large multimedia files Sending and receiving large multimedia files Downloading info from the internet Downloading info from the internet

What is 3G cont. 3G’s uses continued: 3G’s uses continued: Video Conferencing Video Conferencing Streaming video for the Web Streaming video for the Web Sending and receiving faxes Sending and receiving faxes December 2007: 190 3G networks in 40 countries with 200 million customers, only 6% of the 3 billion mobile phone customers December 2007: 190 3G networks in 40 countries with 200 million customers, only 6% of the 3 billion mobile phone customers

HSPA HSPA - High Speed Packet Access HSPA - High Speed Packet Access HSDPA - High Speed Downlink Packet Access HSDPA - High Speed Downlink Packet Access HSUPA - High Speed Uplink Packet Access HSUPA - High Speed Uplink Packet Access HSPA: HSPA: Increases peak data rates Increases peak data rates Provides more system capacity Provides more system capacity Reduces latency Reduces latency

HSDPA Peak data rate of 14 Mbps vs. 1.8 Mbps Peak data rate of 14 Mbps vs. 1.8 Mbps Download large files 20x faster Download large files 20x faster 5x system capacity 5x system capacity

HSUPA Peak data rate of 5.8 Mbps vs Mbps Peak data rate of 5.8 Mbps vs Mbps Upload large files 10x faster Upload large files 10x faster 2x system capacity 2x system capacity

HSPA Increased system capacity makes it cheaper for service provider to offer service Increased system capacity makes it cheaper for service provider to offer service Latency reduced from 70 ms to 50 ms Latency reduced from 70 ms to 50 ms Gives user faster responses in applications Gives user faster responses in applications

Feistel Encryption Encryption Encryption Plaintext split in half Plaintext split in half Sub-key applied with function F Sub-key applied with function F Output XOR Output XOR Two halves switched Two halves switched Repeated Repeated After last round halves not switched After last round halves not switched

Feistel Encryption

Feistel Decryption Decryption Decryption Ciphertext split in half Ciphertext split in half Sub-key applied with function F in reverse Sub-key applied with function F in reverse Output XOR Output XOR Two halves switched Two halves switched Repeated Repeated After last round halves not switched After last round halves not switched

Feistel Decryption

KASUMI Encryption used for confidentiality and integrity in 3G mobile devices Encryption used for confidentiality and integrity in 3G mobile devices Hardware based encryption Hardware based encryption Feistel structure with 8 rounds Feistel structure with 8 rounds

KASUMI 64-bit data blocks 64-bit data blocks 128-bit encryption key 128-bit encryption key 64-bit ciphertext 64-bit ciphertext

Future Advances/4G Fully IP-based Fully IP-based Higher speeds Mbps – 1 Gbps Higher speeds Mbps – 1 Gbps Verizon – LTE Verizon – LTE Sprint/Nextel - WiMAX Sprint/Nextel - WiMAX

LTE LTE – Long Term Evolution LTE – Long Term Evolution Peak Data Rates: Peak Data Rates: Downlink – 100 Mbps, Uplink – 50 Mbps Downlink – 100 Mbps, Uplink – 50 Mbps Latency 5 ms Latency 5 ms Projected for Projected for

WiMAX WiMAX – World Interoperability for Microwave Access (IEEE ) WiMAX – World Interoperability for Microwave Access (IEEE ) Peak Data Rate – 70 Mbps Peak Data Rate – 70 Mbps Range – 30 miles from base station Range – 30 miles from base station

WiMAX Cont. Vulnerable to Man-in-the-Middle attacks Vulnerable to Man-in-the-Middle attacks No base station authentication No base station authentication Vulnerable to DoS attacks Vulnerable to DoS attacks Available in some areas currently Available in some areas currently Baltimore Baltimore Washington DC Washington DC

Recap What is 3G? What is 3G? HSPA HSPA HSDPA – 14 Mbps HSDPA – 14 Mbps HSUPA – 5.8 Mbps HSUPA – 5.8 Mbps Latency – 70 ms to 50 ms Latency – 70 ms to 50 ms Feistel Encryption/Decryption Feistel Encryption/Decryption KASUMI KASUMI 8 round Feistel 8 round Feistel

Recap Cont. Future Advances/4G Future Advances/4G LTE – 100 Mbps LTE – 100 Mbps WiMAX – 70 Mbps WiMAX – 70 Mbps

Questions?