TWC 2003 Copenhagen1 INTRODUCTION TO TETRA SECURITY Brian Murgatroyd.

Slides:



Advertisements
Similar presentations
An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption By Arpan Pal Wireless Group Center of Excellence for Embedded Systems.
Advertisements

Secure Mobile IP Communication
SCSC 455 Computer Security
Akshat Sharma Samarth Shah
Brian Murgatroyd UK Home Office
TETRA - Direct Mode Operation
GSM Security and Encryption
Su Youn Lee, Su Mi Lee and Dong Hoon Lee Current Trends in Theory and Practice of Computer Science Baekseok College of Cultural Studies GSIS.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
TETRA Inter System Interface (ISI)
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security Encryption and Management
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Security+ Guide to Network Security Fundamentals
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
TWC 2005 Frankfurt 1 INTRODUCTION TO TETRA SECURITY Brian Murgatroyd UK Police IT Organization.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Introduction (Pendahuluan)  Information Security.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Networks Olga Agnew Bryant Likes Daewon Seo.
Network Security Sorina Persa Group 3250 Group 3250.
TETRA Gateway and Repeater Applications for Voice and Data
The power of TETRA - Direct Mode Operation
The power of TETRA - Direct Mode Operation
Your Service The Security mechanisms designed into TETRA – a refresher
TETRA Security meeting needs of Military
TETRA Experience 2006 Sao Paulo July 18th 2006.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
TETRA Security Security mechanisms in TETRA and how to ensure that the
TETRA Security Security mechanisms in TETRA and how to ensure that the
Chapter 4 Application Level Security in Cellular Networks.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Network Security Overview
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Wireless Network PMIT- By-
3G Security Principles Build on GSM security
Introduction to TETRA Security
Angelo Benvenuto Leonardo Finmeccanica.
Security Of Wireless Sensor Networks
Security.
Security of Wireless Sensor Networks
Operating System Concepts
Security in Wide Area Networks
Presentation transcript:

TWC 2003 Copenhagen1 INTRODUCTION TO TETRA SECURITY Brian Murgatroyd

TWC 2003 Copenhagen2 Agenda Why security is important in TETRA systems Overview of TETRA security features Authentication Air interface encryption Key Management Terminal Disabling End to End Encryption

TWC 2003 Copenhagen3 Security Threats What are the main threats to your system? Confidentiality? Availability? Integrity?

TWC 2003 Copenhagen4 Message Related Threats interception Confidentiality –by hostile government agencies eavesdropping –by hackers, criminals, terrorists masquerading –pretending to be legitimate user manipulation of data.Integrity –changing messages Replay –recording messages and replaying them later

TWC 2003 Copenhagen5 User Related Threats traffic analysis Confidentiality –getting intelligence from patterns of the traffic-frequency- message lengths-message types observability of user behaviour. Confidentiality –examining where the traffic is observed - times of day-number of users

TWC 2003 Copenhagen6 System Related Threats denial of serviceAvailability –preventing the system working by attempting to use up capacity jamming Availability –Using RF energy to swamp receiver sites unauthorized use of resourcesIntegrity –Illicit use of telephony, interrogation of secure databases

TWC 2003 Copenhagen7 TETRA Air Interface security functions Authentication TETRA has strong mutual authentication requiring knowledge of secret key Encryption –Dynamic key encryption (class 3) Static key encryption (class2) Terminal Disabling Secure temporary or permanent disable Over the Air Re-keying (OTAR) for managing large populations without user overhead Aliasing/User logon To allow association of user to terminal

TWC 2003 Copenhagen8 User authentication (aliasing) Second layer of security Ensures the user is associated with terminal User logon to network aliasing server log on with Radio User Identity and PIN Very limited functionality allowed prior to log on Log on/off not associated with terminal registration Could be used as access control for applications as well as to the Radio system

TWC 2003 Copenhagen9 Security Classes ClassAuthentication EncryptionOther 1OptionalNone- 2OptionalStaticESI 3MandatoryDynamicESI

TWC 2003 Copenhagen10 Authentication Used to ensure that terminal is genuine and allowed on network. Mutual authentication ensures that in addition to verifying the terminal, the SwMI can be trusted. Authentication requires both SwMI and terminal have proof of secret key. Successful authentication permits further security related functions to be downloaded.

TWC 2003 Copenhagen11 Authentication process MobileBase station Authentication Centre K Random Seed (RS) RS KS Rand Expected Result K RS Rand Result TA11 TA12 TA11 KS ( Session key ) Same?

TWC 2003 Copenhagen12 Deriving DCK from mutual authentication DCK2 DCK1 DCK Infrastructure-MS authentication MS-Infrastructure authentication TB4

TWC 2003 Copenhagen13 Encryption Process Clear data in Encrypted data out Key Stream Generator (TEA[x]) Modulo 2 addition (XOR) Initialisation Vector (IV) ABCDEFGH y4Mv#Qt q c Traffic Key Key Stream Segments Combining algorithm (TB5) I CN LA CC

TWC 2003 Copenhagen14 Air Interface traffic keys Four traffic keys are used in class 3 systems:- Derived cipher Key (DCK) –derived from authentication process used for protecting uplink, one to one calls Common Cipher Key(CCK) –protects downlink group calls and ITSI on initial registration Group Cipher Key(GCK) –Provides crypto separation, combined with CCK Static Cipher Key(SCK ) –Used for protecting DMO and TMO fallback mode

TWC 2003 Copenhagen15 DMO Security Implicit Authentication Static Cipher keys No disabling

TWC 2003 Copenhagen16 TMO SCK OTAR scheme DMO SCKs must be distributed when terminals are operating in TMO. In normal circumstances, terminals should return to TMO coverage within a key lifetime A typical DMO SCK lifetime may be between 2 weeks and 6 months Key Management Centre TETRA Infrastructure

TWC 2003 Copenhagen17 Key Overlap scheme used for DMO SCKs The scheme uses Past, Present and Future versions of an SCK. System Rules –Terminals may only transmit on their Present version of the key. –Terminals may receive on any of the three versions of the key. This scheme allows a one key period overlap. PastPresentFuture Receive Transmit

TWC 2003 Copenhagen18 Disabling of terminals Vital to ensure the reduction of risk of threats to system by stolen and lost terminals Relies on the integrity of the users to report losses quickly and accurately. May be achieved by removing subscription and/or disabling terminal Disabling may be either temporary or permanent Permanent disabling removes all keys including (k) Temporary disabling removes all traffic keys but allows ambience listening

TWC 2003 Copenhagen19 End to end encryption End-to-end security between MS’s NetworkMS Air interface security between MS and network MS Protects messages across an untrusted infrastructure Provides enhanced confidentiality Voice and SDS services IP data services (soon)

TWC 2003 Copenhagen20 End to end encryption features Additional synchronization carried in stolen half frames Standard algorithms available or national solutions Key Management in User Domain

TWC 2003 Copenhagen21 Limitations of End to End Encryption Only protects the user payload (confidentiality protection) Requires a transparent network - no transcoding-All the bits encrypted at the transmitting end must be decrypted at the receiver Will not work outside the TETRA domain frequent transmission of synchronization vector needs to ensure good late entry capability but as frame stealing is used this may impact slightly on voice quality.

TWC 2003 Copenhagen22 End to end keys Traffic encryption key(TEK). Three editions used in terminal to give key overlap. Group Key encryption key(GEK) used to protection TEKs during OTAR. Unique KEK(long life) used to protect GEKs during OTAR. Signalling Encryption Keys (SEK) used optionally for control traffic

TWC 2003 Copenhagen23 Benefits of end to end encryption with Air Interface encryption Air interface (AI) encryption alone and end to end encryption alone both have their limitations For most users AI security measures are completely adequate Where either the network is untrusted, or the data is extremely sensitive then end to end encryption may be used in addition Brings the benefit of encrypting addresses and signalling as well as user data across the Air Interface and confidentiality right across the network

TWC 2003 Copenhagen24 Conclusions Security functions built in from the start! User friendly and transparent key management. Air interface encryption protects control traffic, IDs as well as voice and user traffic. Key management comes without user overhead because of OTAR.