Syed Rafiul Hussain*, Mitziu Echeverria†, Ankush Singla*,

Slides:



Advertisements
Similar presentations
Giuseppe Bianchi Lecture 6.1: Extras: Merkle Trees.
Advertisements

CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Cryptography for Backup Navigation
Security Issues In Sensor Networks By Priya Palanivelu.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
1 Timed Efficient Stream Loss-tolerant Authentication.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Wireless and Security CSCI 5857: Encoding and Encryption.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure emergency communication of cellular phones in ad hoc mode Authors: Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, and Leonard Barolli. Sources: Ad.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Lecture 24 Wireless Network Security
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
Security for Broadcast Network
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Key Establishment Protocols for Secure Mobile Communications
Presented by Edith Ngai MPhil Term 3 Presentation
Chapter 5 Network Security Protocols in Practice Part I
Packet Switching Networks & Frame Relay
Introduction Wireless devices offering IP connectivity
Reporter :Chien-Wen Huang
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Cryptography and Network Security
Packet Leashes: Defense Against Wormhole Attacks
A secure and traceable E-DRM system based on mobile device
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Muhammad Taqi Raza, Fatima Muhammad Anwar and Songwu Lu
WAP Public Key Infrastructure
Defending Against DDoS
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
TRUST:Team for Research in Applied Cryptography
SPINS: Security Protocols for Sensor Networks
BROADCAST AUTHENTICATION
SPINS: Security Protocols for Sensor Networks
Public Key Infrastructure
Install AD Certificate Services
SPINS: Security Protocols for Sensor Networks
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Security in Wide Area Networks
Presentation transcript:

 Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil Syed Rafiul Hussain*, Mitziu Echeverria†, Ankush Singla*, Omar Chowdhury†, Elisa Bertino* Purdue University, University of Iowa

Initial Connection Setup with a Base Station in 4G and 5G Networks Time & Frame Synchronization System Info. Block Master info. Block Frame Synch.

Fake Base Station in 4G and 5G Networks How can we prevent cellular devices from connecting to Fake Base Stations? IMSI Response Authentication Reject Registration Reject IMSI Request IMSI: International Mobile Subscriber Identity

Potential Defense Techniques Against Fake Base Station Attack Specific Defense Prevent Spoofing of Individual Messages Generic Defense Prevent Spoofing of Broadcast Messages IMSI Request Registration Reject Authentication Reject IMSI Request Registration Reject Authentication Reject

Preventing Broadcast Spoofing Symmetric Key Based Broadcast Authentication TESLA-based Broadcast Authentication msg 2, MAC2, Key 1 Secure Channel msg 3, MAC3, Key 2 Secure channel establishment Delayed key disclosure

1. Certificate chain length 2. Certificate Revocation PKI-based Mechanism MME UE Base Station Core Network 1. Certificate chain length 2. Certificate Revocation 3. Signature Generation Overhead 4. MitM Relay Self-signed MME-signed CN-signed MIB, 𝐒𝐈 𝐆 𝐁𝐒 , 𝐜𝐞𝐫 𝐭 𝐌𝐌𝐄 , 𝐜𝐞𝐫 𝐭 𝐂𝐍 SIB1, 𝐒𝐈 𝐆 𝐁𝐒 , 𝐜𝐞𝐫 𝐭 𝐌𝐌𝐄 , 𝐜𝐞𝐫 𝐭 𝐂𝐍 6

Optimized PKI Scheme (1/3) A Lightweight Design of Certificate for Cellular Network Propose a specialized certificate format Base Station’s Public Key Cell ID location expiration time signature of MME

Protocol-Level Optimizations Which messages require authentication? Which SIBs require authentication? Frame Synch. Sys. Info. Block Type 1 Master info. Block Sys. Info. Block Type 2 System Info. Block Minimize certificate chain’s transmission SIB 1, SIGN_SIB1 CERT CHAIN SIB2, SIGN_SIB2 Aggregating Authentication

Cryptographic Scheme-level Optimization Reduce the size of the signatures Aggregate SIGN SIB1, SIGN_BS, SIGN_MME, SIGN_CN Compute the expensive crypto operations at offline

Countermeasure for Relay Attacks Distance Bounding Protocol Allow a bootstrapping message to be valid for a short time SIB1, Aggregate SIGN, Timestamp, ∆t, location t rcvd − t gen < ∆ t

Evaluation Results End-to-end delay induced by different digital signature schemes against baseline

Conclusion Prevents devices to connect to malicious base stations. Moderate Overhead (Max: 220 bytes, 28 ms). Backward compatibility.

Thank You

Syed Rafiul Hussain Purdue University hussain1@purdue.edu Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil Syed Rafiul Hussain Purdue University hussain1@purdue.edu