2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 691410048, 李奇勇 691410051, 黃弘光 691430045, 林柏均 489410080.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Advertisements

U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Loading Welcome To My Presentation. Hybrid Next Generation Mobile System Analysis Based on Internet Applications A Presentation On Prepared by Abu Sayed.
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
EAP AKA Jari Arkko, Ericsson Henry Haverinen, Nokia.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
Research Seminar on Telecommunications Business IPSEC BUSINESS Henri Ossi.
World Class Standards ANFOV - Milano, 14 November 2007 – Paolo DE LUTIIS ANFOV - Milano, 14 November 2007 Autore:Paolo DE LUTIIS Telecom Italia Security.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
Doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 1 March 2004 WLAN Backend System Security and WLAN Interworking Security Andrew Myers British.
All IP Network Architecture 2001 년 12 월 5 일 통신공학연구실 석사 4 차 유성균
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Doc.:IEEE /106 Submission Jamshid Khun-Jush, Ericsson January, 2002 Slide 1 Integration of WLAN and Wide Area Mobile Networks Author: Jamshid.
Omniran OmniRAN Wi-Fi Hotspot Roaming Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Lucent Technologies – Proprietary Use pursuant to company instruction 1 3GPP2 Workshop MMD IMS Architecture June 28, 2005 Anne Y. Lee IMS Systems Engineering.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
Doc.: IEEE /229r0 Submission Tan Pek-Yew, Panasonic Slide 1 March 2003 Interworking – QoS and Authorization Tan Pek Yew & Cheng Hong Panasonic.
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Interworking of WiMAX and 3GPP Networks based on IMS Fangmin Xu, Luyong Zhang, and Zheng Zhou IEEE Communications Magazine, Volume 45, Issue 3, March 2007.
11/26 Integration of wireless LAN and 3G wireless - Interworking architecture between 3GPP and WLAN systems Ahmavaara, K.; Haverinen, H.; Pichna, R.; Communications.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
© NOKIADEFAULT.PPT / / AO page: 1 USIM requirements and structure NOKIA Mobile Phones TSGT3#3(99)082.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Chapter 4 Application Level Security in Cellular Networks.
Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks H. Haverinen, J. Mikkonen and T. Takamaki, Nokia Wei-Jen, Lin Advanced.
WLAN-GPRS INTEGRATION FOR NEXT-GENERATION MOBILE DATA NETWORKS 通訊工程所 蔡名岳
LTE Architecture KANNAN M JTO(3G).
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Wireless Network Security and Interworking
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
EAP Authentication for SIP & HTTP V. Torvinen (Ericsson), J. Arkko (Ericsson), A. Niemi (Nokia),
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
WLAN-GPRS Integration For Next-Generation Mobile Data Networks Wireless Communications IEEE 2002 報告者:陳崇凱.
Doc.: IEEE /209r0 Submission 1 March GPP SA2Slide 1 3GPP System – WLAN Interworking Principles and Status From 3GPP SA2 Presented.
Doc.: IEEE /843r0 Submission Cheng Hong, Tan Pek-Yew, Panasonic Slide 1 November 2003 Interworking – WLAN Control Cheng Hong & Tan Pek Yew Panasonic.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Wireless security Wi–Fi (802.11) Security
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Doc.: IEEE /0690r0 Submission Andrew Myers, BT Slide 1 July GPP SA3 Interworking Security Issues II Andrew Myers British Telecommunications.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
OmniRAN IEEE 802 OmniRAN Architecture Proposal Date: Authors: NameAffiliationPhone Yonggang Bo.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
1 Special Topics in Computer Engineering Supervised by Dr. Walid Abu-Sufah Jordan University Department of Computer Engineering.
BITS Pilani Pilani | Dubai | Goa | Hyderabad EA C451 Vishal Gupta.
History and Implementation of the IEEE 802 Security Architecture
Instructor Materials Chapter 6 Building a Home Network
Integration of and Third-Generation Wireless Data Networks
Network side issues in WLAN Interworking
Mobile Computing.
WLAN Interworking scenarios
WIEN Study Group Proposed Roadmap
Security Working Group
3GPP WLAN Interworking update
LM 7. Cellular Network Security
Presentation transcript:

2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均

2003/12/292 Why 3G-WLAN Interworking  WLAN systems offer bit rates surpassing those of 3G systems and are great for hot spot coverage , while 3G systems provide global coverage and the necessary network and management infrastructure to cater for security , roaming , and charging requirements.

2003/12/293 3G-WLAN Interworking  We want the subscription management , roaming , and security facilities of a 3G system and the hot spot capacity and low investment cost of WLAN systems.  An important challenge is to reconcile and consolidate the security architecture of the systems.

2003/12/294 Wireless Local Area Network  IEEE b deploys confidentiality and integrity protection through a scheme called WEP. WEP suffers from manual key management and is also cryptographically broken.HYPERLAN/2 and HiSWAN have more advanced confidentiality and encryption mechanisms.

2003/12/295 The 3GPP System  Cellular systems such as UMTS and GSM have excellent characteristics in terms of coverage and roaming.

2003/12/296 Interworking Solution  In ETSI Project BRAN resulted in two fundamentally different solutions regarding the level of interworking.  Tight and Loose interworking according to the level of integration required between the systems.

2003/12/297 Tight interworking  The tight interworking solution was based on the idea of making use of the WLAN radio interface as a bearer for UMTS with all network control entities in the core network integrated.  A tight interworking solution would mandate the full 3GPP security architecture and require the 3GPP protocol stacks and interfaces to be present in the WLAN system.

2003/12/298 Loose interworking  There was little need to make changes to the WLAN standard.This solution has the benefit of not needing a convergence layer , which is an important factor in development time and so on.  The loose interworking options merely require the 3GPP authentication method to be implemented.  Loose interworking was therefore adopted as the preferred solution in both the WLAN and 3GPP communities.

2003/12/299 Loose interworking  To avoid link layer modifications , the authentication protocol is allowed to run at the link layer using Internet protocols ─ EAP and AAA ─ as transport mechanisms.

2003/12/2910 3GPP-WLAN Interworking Architecture

2003/12/2911 Security concerns in 3G-WLAN Interworking  A fundamental requirement in 3GPP has been that 3GPP-WLAN interworking shall not compromise the UMTS security architecture.  Therefore , it is required that the authentication and key distribution be based on the UMTS AKA challenge- response procedure.

2003/12/2912 UICC & USIM  The UMTS AKA procedure relies on the availability of a tamper-resistant smartcard at the terminal.  The smartcard , called a UICC , in UMTS , will run an application called USIM.  The USIM application that runs the cryptographic algotithms during the execution of the UMTS AKA.

2003/12/2913 The Entities and Domains of 3GPP-WLAN architecture  HE ‧ HSS ‧ 3GPP AAA Server  SN ‧ 3GPP AAA proxy ‧ NAS ‧ AP  UE ‧ UICC/USIM ‧ MS ‧ Computing device

2003/12/2914 Simplified 3GPP-WLAN architecture

2003/12/2915 Trust Issues  Which entities do we trust ?  On what basis do we trust these domains/entities ?  What type of security features are needed to “ enforce ” the trust ?  What would be the goal of an adversary ?

2003/12/2916 Trust relationship  User HE  HE UICC/USIM  HE SN  SN WLAN access network  User user equipment

2003/12/2917 User Identity Privacy  Location Privacy is problematic since there is often a strong connection between the logical identity of the user and the routable address associated with the user device.  To mitigate this problem , one often turns to protected temporary identities.

2003/12/2918 Lawful Interception  Lawful interception functionality is a mandatory requirement for most 3G operators.There is no reason to expect the 3GPP-WLAN interworking architecture to be exempt from lawful interception requirements.

2003/12/2919 Authentication,Confidentiality,and Integrity  3GPP-WLAN architecture shall use the UMTS AKA procedure , the issue of authentication and key distribution is already taken care of.  Confidentiality is targeted at protecting the system and user data against passive attacks.3GPP-WLAN confidentiality services are provided by symmetric key encryption.  Cryptographic integrity protection is a security service aimed at protecting data against active attacks.3GPP-WLAN integrity service is implemented by symmetric keyed cryptographic checksum functions.

2003/12/2920 UMTS AKA sequence

2003/12/2921 3GPP-WLAN interworking AKA procedure  For the 3GPP-WLAN interworking scenario the AKA procedure is executed globally.  The drawback is that the signaling paths and thus the round-trip delay may increase.  The advantage is improved home control since there is no need to distribute AVs or authentication control to the SN.

2003/12/2922 UMTS AKA challenge-response mechanism

2003/12/2923 3GPP-WLAN security architecture  The two key glue components of the interworking solution are the AAA and EAP technologies.These are used to execute the UMTS AKA protocol from the 3G system ’ s home domain toward the WLAN user equipment.

2003/12/2924 A successful UMTS AKA procedure

2003/12/2925 The Role of the EAP  EAP is a key element in the 3GPP- WLAN security architecture.  EAP provides a generic peer-to-peer based request-response transaction environment for authentication dialogs , and supports multiple authentication mechanisms.

2003/12/2926 AAA  To manage roaming traffic , the AAA framework is chosen as the basis for the 3GPP-WLAN architecture.  Both Diameter and RADIUS are generic protocols and are intended to provide support for a diverse set of AAA applications , including network access , IP mobility , and interoperator roaming.

2003/12/2927 Summary and Conclusion  The idea of interworking between mobile systems and WLANs holds great promise.Security-wise the interworking is mostly unproblematic , but there are areas identified that contain weaknesses.  Identity privacy is important and will probably become even more important in the future as technology advances.