G53SEC 1 Mobile Security GSM, UTMS, Wi-Fi and some Bluetooth.

Slides:



Advertisements
Similar presentations
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
Advertisements

6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Networks Olga Agnew Bryant Likes Daewon Seo.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
2002 년 2 학기이동인터넷프로토콜 1 Mobile IP:Overview 년 2 학기이동인터넷프로토콜 2 Mobile IP overview Is Mobile IP an official standard? What problems does Mobile IP solve?
SEMINAR ON “ GPRS “ GPRS- General Packet Radio Service provides a direct link into the Internet from a GSM phone Downloaded From Projectsbhangar.com.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
A History of WEP The Ups and Downs of Wireless Security.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Introduction Wireless devices offering IP connectivity
Wireless Network PMIT- By-
GSM, UTMS, Wi-Fi and some Bluetooth
Security Issues With Mobile IP
Wireless Protocols WEP, WPA & WPA2.
3G Security Principles Build on GSM security
Security Issues with Wireless Protocols
LM 7. Cellular Network Security
Security in Wide Area Networks
Presentation transcript:

G53SEC 1 Mobile Security GSM, UTMS, Wi-Fi and some Bluetooth

G53SEC 2 Today’s Lecture: Security in the mobile world GSM 3GPP / UTMS Mobile IPv6 Wi-Fi Bluetooth

G53SEC 3 Introduction: Mobile computing one of the fastest growing segments of the PC market What is a mobile network? Changing physical / geographical location Changing network topology Attached somewhere to a fixed network Wireless communication

G53SEC 4 Introduction: What is different about mobile networks? Low bandwidth – minimise message size and volume Increased risk of eavesdropping Security issues - Authentication - Privacy - Charging

G53SEC 5 Introduction: Mobile services pose new challenges Some derive from technology Some from applications Physical access – no longer a barrier to network - Wi-Fi access to corporate networks

G53SEC 6 Introduction: Current most active mobile technologies GSM 3GPP/UTMS Mobile IP IEEE Bluetooth

G53SEC 7 Introduction: Other areas of mobile networks with security implications WAP – Wireless Application Protocol -Malicious scripting, Infrastructure issues SMS – Short Messaging Service -Spam, spoofing, viruses MANETs – Mobile Ad-hoc Networks - Rogue nodes, Security only at academic stage

G53SEC 8 GSM – Cell Towers:

G53SEC 9 GSM: 1 st Generation Cell Phones Charge fraud – simple authentication Alibi creation – call forwarding GSM – Improvement from 1 st generation Good voice quality Cheap end-systems Low running costs etc..

G53SEC 10 GSM: Creation affected by political influences Differing national regulations and attitudes towards cryptography Law enforcement requested ability to wiretap GSM security goals Protection against charge fraud Protection of voice and signal traffic Phone theft tracking

G53SEC 11 GSM: Components GSM user – subscriber in home network Where service requested – serving network Mobile station comprises - Mobile equipment - Subscriber Identity Module (SIM) SIM card – smart card chip Performs cryptographic operations Stores keys Stores personal data

G53SEC 12 GSM: IMSI – International Mobile Subscriber Identity Unique subscriber identification TMSI – Temporary Mobile Subscriber Identity Used to avoid location tracking Served when device joins a new subnet IMSI catchers Device authenticates to network but not vice versa Catcher masquerades as a base station Collects IMSI numbers

G53SEC 13 GSM: Cryptography - Uses symmetric cryptography - 3 algorithms - A3 – authentication (Provider specific) - A5 – encryption (Standardised) - A8 – key generation (Provider specific) No official publication of algorithms exists Cryptanalytic attacks do exist

G53SEC 14 GSM: Location Based Services GSM network records location information of mobile equipment Used for various services (e.g. traffic info) Used for emergencies (Medical, Police, etc…) Obligatory in some countries (e.g. the US) Privacy implications

G53SEC 15 GSM Summary: GSM does not transmit secrets in the clear Voice traffic encrypted over radio but not after base station Some privacy protection through TMSI but IMSI catchers exist to avoid TMSI Law enforcement has access to recorded location data

G53SEC 16 GSM Summary: Criticism: Cryptographic algorithms not made public Unilateral authentication - Only mobile equipment authenticates to the network Fraud: Revenue flow attacked Roaming fraud Premium rate fraud

G53SEC 17 3GPP/UTMS: Universal Mobile Telecommunications System Next generation of GSM Besides technical advancements, contains some security enhancements Security architecture similar to GSM Avoids IMSI Catchers - Due to mutual authentication of mobile equipment to the network and vice versa

G53SEC 18 3GPP/UTMS: Authentication - Support for mutual authentication Privacy - Increased key sizes - Support for securing core network signalling data - Enhanced user identity confidentiality Other - Integrity of signalling - Cryptographic algorithms made public

G53SEC 19 Mobile IPv6: GSM & UTMS have problems with access control due to lack of pre-established relationship In IP if nodes move around: - When IP address kept, data will not reach node at new location - When IP address changes, communication has to be terminated and restarted Mobile IP deals with these issues

G53SEC 20 Mobile IPv6: Mobile node has two addresses permanent Home Address Care of Address – associated with network the node is visiting Addresses consist of location as well as interface identification

G53SEC 21 Mobile IPv6: Home agent – nodes with permanent address within agent's network Foreign agent – nodes visiting network When a node wants to communicate with another node, it uses its home address Packets sent are intercepted by Home agent Home agent uses care-of address advertised by Foreign Agent to communicate with destination node

G53SEC 22 Wi-Fi: Wireless technology generally based on a set of standards called IEEE A number of standards (a,b,g,n) exist depending on speed and technological improvements A number of security protocols proposed WEP WPA WPA2

G53SEC 23 WiFi:

G53SEC 24 Wi-Fi: Wi-Fi Increasingly used at home and as part of businesses New uses emerge frequently City wide Wi-Fi BT FON

G53SEC 25 Wi-Fi: Many Issues: - Incorrectly setup Access Points - Encryption - Access control - Wi-Fi not included in security policies in many institutions - Weak encryption standards used - Rogue Access Points - War-driving

G53SEC 26 Wi-Fi: WEP Key size a major security limitation Algorithm is susceptible to a cryptanalysis attack It uses the RC4 stream cipher algorithm WEP allows certain packet parts to be reused This allows attacker to obtain some known text The rest is only a matter of statistical analysis

G53SEC 27 Wi-Fi: WEP Original attack required hours of collected data to successfully find encryption key 2007 – WEP cracked under 60 seconds by researchers from Germany WPA A quick preliminary solution to WEP issues However vulnerable to a password guessing attack

G53SEC 28 Wi-Fi: WPA2 A complete redesign of WLAN security mechanisms Stream cipher RC4 replaced by AES but WPA2 requires new hardware To Remember: For Wi-Fi access points only use WPA2 or in worst case WPA WEP is totally broken!

G53SEC 29 Bluetooth: Technology for wireless ad-hoc networks For short range communications e.g. for keyboards, headsets, etc.. Contains cryptographic mechanism for traffic protection between devices Application level attacks exist Bluesnarf exploits flawed implementations of access control – retrieves personal information Viruses are beginning to appear

G53SEC 30 Summary: Security in the Mobile environment Current mobile technologies