LM 7. Cellular Network Security

Slides:



Advertisements
Similar presentations
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Advertisements

Security Issues in Mobile Communication Systems
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Siyang Tian. TOPIC 1.SIM CARD card embedded with subscriber identity module 2. 3G network 3rd generation mobile telecommunications.
EAP AKA Jari Arkko, Ericsson Henry Haverinen, Nokia.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
GSM Security and Encryption
BY, ARITRA GAUTAM (05-275) & G.PAVANI (05-272).. OVERVIEW OF GSM GSM (group special mobile or general system for mobile communications) is the Pan-European.
LTE Security. Agenda Intro … Intro … The LTE System Radio Side (LTE – Long Term Evolution/Evolved UTRAN - EUTRAN) – Improvements in spectral efficiency,
Security of Mobile Banking
Long Term Evolution and its security infrastructure
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
Federated Authentication mechanism for mobile services Dasun Weerasinghe, Saritha Arunkumar, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group.
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
G53SEC 1 Mobile Security GSM, UTMS, Wi-Fi and some Bluetooth.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
Security in GSM/GPRS and UMTS
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
Chapter 4 Application Level Security in Cellular Networks.
Wireless Network Security and Interworking
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
Lecture 24 Wireless Network Security
Overview of cellular system
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
Features of Long Term Evolution (LTE)
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
助理教授:吳俊興 助教:楊文健 國立高雄大學 資訊工程學系
Analysis of secured VoIP services
Wireless Network PMIT- By-
GSM, UTMS, Wi-Fi and some Bluetooth
University of Maryland College Park
GSM SECURITY AND ENCRYPTION
Wireless Local Area Network (WLAN)
3G Security Principles Build on GSM security
Mobile Communications Mobile Security Fundamentals-3
Muhammad Taqi Raza, Fatima Muhammad Anwar and Songwu Lu
By Theodora Kontogianni
Name:Shivalila A H,Shima
WAP.
“I don’t have to be careful, I’ve got a gun.”
Virtual Private Networks
Cryptography and Network Security
WLAN Security Antti Miettinen.
Security Working Group
Antti Miettinen (modified by JJ)
Introduction to Cryptography
Cryptography and Network Security
Special Topic: Wireless Security
Key Exchange, Man-in-the-Middle Attack
LM 2. Information Security Essentials
LM 7. Mobile Network Overview
LM 5. Wireless Network Security
Chapter 10. Mobile Device Security
LM 4. Wireless Network Threats & Vulnerabilities
Security in Wide Area Networks
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

LM 7. Cellular Network Security Dr. Lei Li Wireless Security

Road Map Introduction WLAN Security Mobile Security Security Auditing & Risk Analysis Evolution of Wireless Network WLAN Overview Mobile Network Overview Infor. Security Essentials WLAN Threats & Vulnerabilities Cellular Network Security WLAN Security Mobile Security Threats WLAN Security Tools Mobile Devices Security

Learning Outcomes After this module, a student will be able to: Describe the security vulnerabilities present in 1G TWN Describe the security architecture of GSM Describe the existing issues in GSM security Discuss the security improvement of 3G and 4G LTE network comparing to GSM Describe the security features of UMTS (3G) and LTE (4G) Briefly describe Network Access Security and Network Domain Security. Discuss the l attacks on 3G and 4G network

1G Cellular Network No Security Electronic Serial Number (ESN) cloning

2G Cellular Network (GSM) https://www.sans.org/reading-room/whitepapers/telephone/gsm-standard-an-overview-security-317

GSM Security Functions Authentication of the registered subscribers only Secure data transfer through the use of encryption Mobile phones are inoperable without a SIM Duplicate SIMs are not allowed on the network Securely stored KI

GSM - Authentication https://www.sans.org/reading-room/whitepapers/telephone/gsm-standard-an-overview-security-317

GSM- Anonymity International Mobile Subscriber Identity (IMSI) Temporary Mobile Subscriber Identity (TMSI) IMSI is rarely transmitted after authentication unless it’s absolutely necessary

GSM – Encryption & Decryption Authentication Algorithm A3 Ciphering Algorithm A5 Ciphering Key Generating Algorithm A8

GSM Security Challenges Unilateral authentication and vulnerability to the man-in-the-middle attack Flaws in implementation of A3/A8 algorithms SIM card cloning Over-the-air cracking Flaws in cryptographic algorithms Etc.

3G (UTMS) Security Improvement The extension of encryption and integrity protection Protection of the signaling infrastructure in the core network The cryptographic keys derived on the User Services Identity Module (USIM) are longer in UMTS (128-bits) than in GSM (64-bits). Standard encryption algorithms used by 3G were openly published. The definition of standard UMTS authentication algorithms

4G LTE Security Improvement An extended key hierarchy Use even longer cryptographic keys (256-bits) and the inclusion of better cryptographic ciphers. Separation of control plane and user plane Integrated inter-working security for legacy and non- 3GPP networks. Greater protection for back-haul link since the physical security of an eNB cannot be trusted. Mutual authentication between a relay node and the network.  Requiring the use of the USIM and excluding the GSM SIM.

3G/LTE Security Architecture Image source: https://www.researchgate.net/publication/235339185_Security_of_3G_and_LTE

3G & 4G Security Features Network access security (NAS) Network domain security (NDS) User domain security (UDS) Application domain security (ADS) Visibility and configurability of security

Network Access Security User identity confidentiality Entity authentication and key agreement Data confidentiality and integrity

Network Domain Security Security of the communication between network nodes, located either in the same or in different networks  Protect the core network signaling protocols  confidentiality, integrity, authentication and anti-replay protection Standard procedures based on cryptographic techniques

Cyber Attacks to 3G & LTE Crypto-attack Denial of Service attack  Side-channel attack

Reference https://books.google.com/books?id=IHg0JBShDhEC&pg=PA369&lpg=PA369&dq=security+in+first+generation+traditional+wireless+networks&source=bl&ots=l41aXRqaZG&sig=oovVfZ5rO0fHByWNvBH2gxi1eG4&hl=en&sa=X&ved=0ahUKEwj3ysn71-rUAhXLdj4KHc9lBI8Q6AEIMTAC#v=onepage&q=security%20in%20first%20generation%20traditional%20wireless%20networks&f=false https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0ahUKEwjz6t612-rUAhXHzz4KHV7FAksQFghBMAM&url=https%3A%2F%2Fwww.sans.org%2Freading-room%2Fwhitepapers%2Ftelephone%2Fgsm-standard-an-overview-security-317&usg=AFQjCNEVQqhFN991Ei5NxPmDY5V_wCnSiA&cad=rja ( https://arxiv.org/pdf/1002.3175.pdf https://www.researchgate.net/publication/235339185_Security_of_3G_and_LTE https://www.researchgate.net/publication/235339185_Security_of_3G_and_LTE https://www.researchgate.net/publication/235339185_Security_of_3G_and_LTE https://www.researchgate.net/publication/235339185_Security_of_3G_and_LTE