Chapter 4 Application Level Security in Cellular Networks.

Slides:



Advertisements
Similar presentations
Security of Mobile Banking
Advertisements

Cellular Phone and Data Standards Past, Present, and Future.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Telefónica Móviles España GPRS (General Packet Radio Service)
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Basic radio frequency communications - 2 Session 1.
Security Issues in Wireless Networks Kumar Viswanath CMPE 293.
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Security Awareness: Applying Practical Security in Your World
SECURITY IN MOBILE NETWORKS BY BHONGIRI ANAND RAJ VENKAT PAVAN RAVILISETTY NAGA MOHAN MADINENI.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
SEMINAR ON “ GPRS “ GPRS- General Packet Radio Service provides a direct link into the Internet from a GSM phone Downloaded From Projectsbhangar.com.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Author: Bob Edwards, Edited by: Nic Shulver Applied Communications Technology Wireless Mobile Security Overview of needs Wireless security Attack types.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
A History of WEP The Ups and Downs of Wireless Security.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
TETRA Security Security mechanisms in TETRA and how to ensure that the
ACM 511 Introduction to Computer Networks. Computer Networks.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Wireless Network Security and Interworking
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
Doc.: IEEE /063 Submission May 2000 Y. Kuchiki, M. Ikeda Seiko Epson Corp. Slide 1 Yutaku Kuchiki, Masayuki Ikeda Seiko Epson Corporation May.
IM NTU Distributed Information Systems 2004 Security -- 1 Security Yih-Kuen Tsay Dept. of Information Management National Taiwan University.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
To ensure secure and dependable monitoring of rail cars transporting hazardous materials, providing resiliency against both random and malicious threats.
GPRS Part II Wireless and Mobile Network Architecture
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Security Distributed Systems Lecture # 14. Why care about security? Authentication Use another person’s ID for sending Non-repudiation E-commerce.
Ασύρματα Δίκτυα και Κινητές Επικοινωνίες Ενότητα # 8: Σύστημα 2.5 Γενιάς GPRS Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim.
 GPRS What’s in this slide?  Introduction to GPRS.  History  GPRS Service.  GPRS Speeds.  GPRS Mobile Devices.  Services of GPRS.  GPRS in practice.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Technische Universität München WISTP 2007 Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication 10 th May 2007 W. Bamberger, O. Welter.
General packet radio service (GPRS)
WAP.
Master in progettista di servizi radiomobili Web Based Overview
GPRS Architecture Ayan Ganguly Bishakha Roy Akash Dutta.
2.5 G Cellular Systems and Architecture
LM 7. Cellular Network Security
Presentation transcript:

Chapter 4 Application Level Security in Cellular Networks

 1G  2G and 2.5G  High-Speed Circuit-Switched Data (HSCSD)  General Packet Radio Service (GPRS)  Enhanced Data Rates for GSM Evolution (EDGE)  Cellular Digital Packet Data (CDPD)  3G Generations of Cellular Networks (1)

 4G  Push and Pull Services  Location-based Services  Entertainment Services Generations of Cellular Networks (2)

 Cellular Network limitations  Open wireless medium  Limited bandwidth  System Complexity  Limited Power  Limited Processing Power  Relativity Unreliable Network Connection Security Issues and Attacks in Cellular Networks (1)

 Security Issues in Cellular network  Authentication  Integrity  Confidentiality  Access Control  OS in Mobile Devices  Location Detection  Viruses and Malware Security Issues and Attacks in Cellular Networks (2)

 Downloaded Contents  Device Security  Attacks on Cellular Networks  Denial of Service (DoS)  Distributed Denial of Service (DDoS)  Channel Jamming  Unauthorized Access  Eavesdropping Security Issues and Attacks in Cellular Networks (3)

 Message Forgery  Message Replay  Man-in-the-Middle Attack  Session Hijacking Security Issues and Attacks in Cellular Networks (4)

 GSM Architecture  GSM Security Features  Anonymity or Subscriber Identity Confidentiality  Subscriber Identity Authentication  Encryption of User Traffic and User Control Data  Use of SIM as Security Module GSM Security for Applications (1)

 GSM Security Attacks  SIM/MS Interface Tapping  Attacks on the Algorithm A3/8  Flaws in A5/1 and A5/2 Algorithms  Attacks on the SIM Card  False Base Station GSM Security for Applications (2)

 GSM Security Solutions  GSM – Newer A3/A8 Implementation  GSM – A5/3 Ciphering  Public Key Infrastructure in Mobile Systems  Secure Browsing  Access to Enterprise Networks  Mobile Payment Authentication  Access Control GSM Security for Applications (3)

 Digital Signatures on Mobile Transactions  Messaging  Content Authentication  Digital ID GSM Security for Applications (4)

 Security Issues in GPRS  Related to ME and SIM card  Between ME and SGSN  Between SGSN and GGSN  Among different operators  Between GGSN and external connected networks (Internet) GPRS Security for Applications (1)

 Security Threats to the GPRS  Unauthorized Access to the data  Threats to Integrity  DoS  Attack from valid network  Randomly Changing Source Address  Unauthorized Access to Services GPRS Security for Applications (2)

 GPRS Security Solutions  Ciphering based on KASUMI added to GPRS called GEA3  Performed in higher layer LLC (Logical Link Control)  MAC messages are not ciphered  UMTS ciphering occurs at MAC layer GPRS Security for Applications (3)

 5 different sets of security features  Network Access Security  Network Domain Security  User Domain Security  Application Security  Visibility and Configurability of security UMTS Security for Applications (1)

 UMTS AKA Security Mechanism  UMTS Authentication and Key Agreement (UMTS AKA)  Authentication and Key Agreement using challenge/response mechanism  See figure 4.9 UMTS AKA Protocol  UMTS Network Authentication to Phone UMTS Security for Applications (2)

 3G Attacks  DoS  Overbilling Attack  Spoofed PDP Context  Signaling-level attacks  Some Security Solutions for 3G  A new authentication scheme with anonymity for wireless networks 3G Security for Applications (1)

 Manual authentication for wireless devices  Elliptic Curve Cryptography for Wireless Security  Channel Surfing and Spatial Retreats 3G Security for Applications (2)

 Protocol of Gong et al.  GSM User Authentication Protocol (GUAP)  One-time Password Schemes  Mobile ATP  ATP using GSM  OTP using GPRS  Web/Mobile Authentication System with OTP  Location-based Encryption  BioPasswords Some of Security and Authentication Solutions