NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.

Slides:



Advertisements
Similar presentations
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Advertisements

Secure Mobile IP Communication
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
GSM Security and Encryption
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
Security of Mobile Banking
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Lecture 1: Overview modified from slides of Lawrie Brown.
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Overview of the Mobile IPv6 Bootstrapping Problem James Kempf DoCoMo Labs USA Thursday March 10, 2005.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
One-Pass GPRS and IMS Authentication Procedure for UMTS
GSM standard (continued)
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
G53SEC 1 Mobile Security GSM, UTMS, Wi-Fi and some Bluetooth.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Information Security for Managers (Master MIS)
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
WEBOK Tutorial Paul Kubik
IWD2243 Wireless & Mobile Security Chapter 2 : Security in Traditional Wireless Network Prepared by : Zuraidy Adnan, FITM UNISEL1.
Security in GSM/GPRS and UMTS
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cellular Mobile Communication Systems Lecture 8
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Chapter 4 Application Level Security in Cellular Networks.
Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks H. Haverinen, J. Mikkonen and T. Takamaki, Nokia Wei-Jen, Lin Advanced.
Wireless Network Security and Interworking
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lecture 24 Wireless Network Security
Overview of cellular system
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Network Layer Security Network Systems Security Mort Anvari.
WIRELESS FRAUD Detection & Prevention. Method of Fraud CLONING of SIM Card.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
Wireless Network PMIT- By-
GSM, UTMS, Wi-Fi and some Bluetooth
GSM SECURITY AND ENCRYPTION
Unlicensed Mobile Access (UMA )
3G Security Principles Build on GSM security
Mobile Phone Technology
LM 7. Cellular Network Security
Security in Wide Area Networks
Presentation transcript:

NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005 Author : Sandro Grech, Pasi Eronen Presented by : Ying Long Chen

page2Outline  Overview of UMA  Introduction  Background: GSM and GPRS security  UMA overview  Security Analysis  Protecting against the attack  Conclusion

page3Introduction  Why UMA  Indoor coverage issue for GSM  Bandwidth issue  The standardization work is continued by 3GPP

page4 GSM and GPRS Security  Authentication : avoid fraudulent access by a cloned MS  Encryption : avoid unauthorized listening  Parameters:  Ki : used to achieve authentication(128 bit)  Ki is stored in AUC and SIM  Ki is not known to the subscriber  Rand : 128-bit random number by the home system  SRES : 32-bit generated by Algorithm A3  Kc : generated by Algorithm A8 for the encryption  Frame number : a TDMA frame number encoded in the data bits

page5 GSM and GPRS Security  Authentication algorithm :  A3  Authentication function  Stored in AUC and SIM  Encryption algorithm :  A8  To generated the encryption key  Stored in AUC and SIM  A5  An algorithm stored in the MS (handset hardware) and the visit system  Used for data ciphering and deciphering

page6 GSM and GPRS Security

page7 UMA overview UMA security mechanisms

page8 UMA overview 1. Unlicensed Interface Security :  Outside the scope of UMA 2. Up Interface Security  Traffic between the phone and the UNC is protected by IPSec ESP tunnel, which is established and maintained using IKEv2 3. CN authentication, GPRS ciphering  The authentication between the phone and UNC does not replace the normal GSM authentication between the phone and MSC 4. Data application security  Outside the scope of UMA

page9 UMA Security Mechanisms  Authentication Mechanisms  UMA stage 2 states that mutual authentication between Mobile Station and UNC shall be accomplished using Internet Key Exchange (IKEv2) protocol and the Extensible Authentication Protocol (EAP)  Confidentiality Mechanisms  IPsec protect all signal and user traffic sent between MS and UNC-SGW over the Up interface.

page10 UMA Security Mechanisms  Integrity Mechanisms  As part of IPsec, messages could be integrity protected. IPsec use a hash with a secret key to provide integrity protection. This scheme is called an HMAC(Hashed Message Authentication Code)  User Credentials  All long-term security credentials used for subscriber and network authentication are stored on the SIM

page11 UMA overview

page12 UMA overview

page13 UMA Security Analysis  IKEv2  IMSI not protected enough  During the initial stage of the EAP-SIM and EAP-AKA procedures, when the Mobile Station sends IKE SA INIT, it will transfer its Network Access Identifier (NAI), containing the IMSI. This message is encrypted.  But an attacker intercepting traffic to the UNC-SGW could act as a false UNC-SGW and receive the NAI of the Mobile Station before it has to authenticate itself as a valid UNC. This information could be used to locate a mobile subscriber, hence violating the subscriber identity. This identity probing is a known issue caused by the IKEv2 protocol  Dos attack :  Before the responder authenticate the initiator , the responder will compute DH agreed key ( 指數運算 ) , so the attacker can make a lot of request to build IKE SA.

page14 UMA Security Analysis  Open Platform  Unauthorized access and identity spoofing  By virus or Trojan horse  Exploitation of implementation weakness  Such as buffer overflow  Denial of service  Attack from WLAN 、 internet  Eavesdropping  Location spoofing

page15 Protecting against the attack  Protecting non-malicious users’ terminals  Technical prevention of unapproved terminals  Legal prevention of unapproved terminals  Detecting and disabling misbehaving terminals  Increasing core network resistance to attacks

page16 Conclusion & Future Work  Since the UMA specifications have been published only recently, it is possible that they contain problems with potential security implications.  Future work is also required to determine the security impact of UMA in roaming situations, to identify better countermeasures against denial-of-service attacks, and to investigate mechanisms for detecting misbehavior and fraud