ITU-T Workshop on Security, Seoul (Korea) 13-14 May, 2002 1 Security in cdma2000 Frank Quick QUALCOMM, Incorporated Chair, 3GPP2 TSG-S WG4 (Security)

Slides:



Advertisements
Similar presentations
Fostering worldwide interoperabilityGeneva, July 2009 Use of cdma2000 ® Femto Cells for Home Network Applications Home Networking Global Standards.
Advertisements

Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
1 3GPP2 IP Based Emergency Calls IETF/3GPP Hosted SDO Emergency Services Coordination Workshop Columbia University, New York 5-6 October, 2006 Deb Barclay.
GSM Security and Encryption
Sun Microsystems, Inc. Security for Mobile IP in the 3G Networks Pat R. Calhoun Network and Security Center Sun Microsystems, Inc.
Fostering worldwide interoperabilityGeneva, July 2009 Global Standards Collaboration (GSC) 14 DOCUMENT #:GSC14-GTSC7-005R1 FOR:Presentation SOURCE:TIA.
SC-AllIP A- PathsTwdsAllIP_A Ericsson1 All-IP Evolution Paths Towards an All-IP network Ericsson.
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
GSM standard (continued)
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
G53SEC 1 Mobile Security GSM, UTMS, Wi-Fi and some Bluetooth.
All IP Network Architecture 2001 년 12 월 5 일 통신공학연구실 석사 4 차 유성균
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
1 CDMA/GPRS Roaming Proposals Raymond Hsu, Jack Nasielski Feb
3GPP2 Vision: System Release 6 & 7 Jane Brownley Chair, Vision Ad Hoc
3GPP2 Vision: System Release 6 & 7 Jane Brownley Chair, Vision Ad Hoc
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
3GPP2 Wireless Networks Evolution to IP and IP v6
Wireless and Security CSCI 5857: Encoding and Encryption.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
Cdma2000 Card Environments and Provisioning Doug Dunn TSG-C WG 1 Chair
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
Fostering worldwide interoperabilityGeneva, July 2009 cdma2000 ® Femto Activities Wireless access including RLANs and ad-hoc Networking Global Standards.
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Chapter 4 Application Level Security in Cellular Networks.
Wireless Network Security and Interworking
TSG-S PMT Work Program & Status 3GPP2 Evolution Workshop Nick Yamasaki, Chair TSG-S June 27-28, 2005.
Lecture 5 Intersystem Operation. Basic AMPS Gives air interface between tower and mobile phone Does not provide capability to deliver roaming between.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
Dr. Kalyani Bogineni “The Operator Perspective” June 27, 2005 Evolving to Future Wireless Telecommunications Technology Seoul, South Korea.
3GPP2 Vision: System Release 6 & 7 Jane Brownley Chair, Vision Ad Hoc 1.
1 17 February 2009 Subject:Draft Presentation for Femto Conference, March 2009 Date: 17 February 2009 Source: Airvana Contact: Doug Knisely
3GPP2 Organization Structure and Roles in Femtocell-Related Work
Cdma2000 Femto Standardization Activities in 3GPP2 Presenter: Douglas Knisely Airvana, Inc. Femtocell World Congress June 2009 Heathrow, UK.
Lecture 24 Wireless Network Security
Doc.: IEEE /635r1 Submission November 2001 Peter A. Dahl, Verizon WirelessSlide 1 CDMA2000 [the other 3G Standard] Peter Dahl Verizon Wireless.
1 3GPP2 TSG-X All IP Multimedia Domain Bjorn Hjelm Alltel IMS MMD 2007 Dallas, TX Nov. 6-7, 2007.
3GPP2 Charging Betsy Kidwell Chair, 3GPP2 TSG-X Lucent Technologies OMA-MCC Bangkok, Thailand June 2004.
Cdma2000 Femto Standardization Activities in 3GPP2 … Femtocell World Summit June 21 st -23 rd, 2011 London, UK.
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
TSG-C Overview Dr. Edward G. Tiedemann Chair, TSG-C Working Group 3 Q UALCOMM Incorporated CDMA450 Evolution Seminar Hosted by 3GPP2,
eHRPD (evolved High Rate Packet Data)
Cdma2000 Femto Standardization Activities in 3GPP2 Presenter: Peerapol Tinnakornsrisuphap Qualcomm Femtocell Americas November 16 th -17 th, 2009 San Diego,
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
Introduction to 3GPP2 cdma2000 Technology Workshop Ms. Jane Brownley Chair, 3GPP2 Steering Committee
TSG-S PMT Work Program & Status 3GPP2 Evolution Workshop Nick Yamasaki, Chair TSG-S June 27-28, 2005.
Welcome Ms. Cheryl Blum Chair, 3GPP2 Steering Committee
3GPP2 – From Geneva to San Francisco Dr. Hideo Okinaka KDDI Corporation Chair, 3GPP2 Steering Committee 2nd Informal Forum Summit
CDMA X EV-DO by S.Vidhya. CDMA 2000 CDMA2000 (also known as C2K or IMT Multi ‑ Carrier (IMT ‑ MC)) is a family of 3G[1] mobile technology standards,
3G Seminar at ITU-T IMT-2000 Rapporteur’s Meeting Edinburgh, Scotland June 5, 2000 Building Global Perspective and Understanding - Current Status and Work.
Introduction to 3GPP2 cdma2000 Technology Workshop Ms. Jane Brownley Chair, 3GPP2 Steering Committee
1 On 3GPP2 Femto Security Anand Palanigounder Qualcomm Inc. Notice: Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
Cryptography CSS 329 Lecture 13:SSL.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
1 Rogue Mobile Shell Problem Verizon Wireless October 26, 2000 Christopher Carroll.
1 BCMCS Framework TSG-X BCMCS Adhoc August 20, 2003.
1 Notice Contributors grant a free, irrevocable license to 3GPP2 and its Organization Partners to incorporate text or other copyrightable material contained.
Wireless Network PMIT- By-
GSM SECURITY AND ENCRYPTION
3G Security Principles Build on GSM security
Wireless Communication CDMA EVDO Systems
Security in Wide Area Networks
Presentation transcript:

ITU-T Workshop on Security, Seoul (Korea) May, Security in cdma2000 Frank Quick QUALCOMM, Incorporated Chair, 3GPP2 TSG-S WG4 (Security)

ITU-T Workshop on Security, Seoul (Korea) May, Overview The 3GPP2 organization The cdma2000 family of standards Wireless Security Security Architectures in cdma2000

ITU-T Workshop on Security, Seoul (Korea) May, GPP2 Membership ARIBAssociation of Radio Industries and Business (Japan) CWTSChina Wireless Telecommunication Standard Group (China) TIATelecommunications Industry Association (NAFTA countries: USA, Canada, Mexico) TTATelecommunications Technology Association (Korea) TTCTelecommunication Technology Committee (Japan)

ITU-T Workshop on Security, Seoul (Korea) May, Membership, cont’d Market Representation Partners –CDMA Development Group –MWIF –IPv6 Observers –TSACC –ACIF –ETSI

ITU-T Workshop on Security, Seoul (Korea) May, Purpose of 3GPP2 The purpose of 3GPP2 is to prepare, approve and maintain globally applicable Technical Specifications and Technical Reports for a 3rd Generation Mobile System based on the evolving ANSI-41 Core Network and the cdma2000 radio access technologies. These specifications include support for 3G Networks based on both Internet Protocol and evolved ANSI-41, including interoperability between these networks and mobile station. 3GPP2 also takes into account the emerging ITU recommendations on interworking between IMT-2000 family members. Serving the CDMA Community via Smooth Evolution of cdma2000 from 2G to 3G while Expanding 2.5G Capabilities

ITU-T Workshop on Security, Seoul (Korea) May, Process 3GPP2 publishes technical specifications as a cooperative effort of all partner members –TSGs develop technical specifications –TSGs’ outputs reviewed and approved by Steering Committee per 3GPP2 procedures Partners apply national standardization processes to standardize results of work –Ownership and copyright of these output documents is shared between the Organizational Partners. Resulting in globally developed standards for use on a region by region basis

ITU-T Workshop on Security, Seoul (Korea) May, GPP2 Organizational Structure

ITU-T Workshop on Security, Seoul (Korea) May, History Prior to 2001, 3GPP2 relied on the TIA’s Ad Hoc Authentication Group (AHAG) for security needs. –AHAG was formed in 1991 to handle encryption-related work in accordance with US and Canadian law. –Recent changes in export laws make international meetings on security much simpler. TSG-S WG4 (Security) was formed in August –WG4 will assume most of the work previously done by AHAG. –AHAG continues as a TIA support group.

ITU-T Workshop on Security, Seoul (Korea) May, CDMA Air Interface Standards (TIA) J-STD-008 TSB74 J-STD-008 TSB74 IS-2000 (CDMA2000 Rev 0) IS-2000 (CDMA2000 Rev 0) July 1999 IS-2000-A (CDMA2000 Rev A) IS-2000-A (CDMA2000 Rev A) IS-856 (1xEV-DO) October 2000 March 2000 IS-2000-C (CDMA2000 Rev C) (Summer 2002) IS-2000-B (CDMA2000 Rev B) (Spring 2002) IS-95-A IS-95-B May 1995 March 1999 Systems in Commercial Operation Standard Completed Standard Development in Progress (expected date of completion)

ITU-T Workshop on Security, Seoul (Korea) May, cdma2000 Overview IS-2000 through revision B (alias 1x, 3x): –Unified operation on 1 or MHz channels –Improved voice and data performance IS-856 (alias HDR, HRPD, 1xEV-DO) –Up to 2.4 Mb/s burst data rate on a 1.25 MHz channel –Direct Internet access Future: –IS-2000-C and later: improved data and voice (EV-DV) –Enhanced HDR

ITU-T Workshop on Security, Seoul (Korea) May, IS-2000 (1x-3x) Direct sequence spreading: –1.25 MHz bandwidth per physical channel, 1 or 3 channels. Forward Link –Orthogonal modulation using 64 or 128 Walsh codes (depending on rate set in use). Reverse Link –Pilot-aided coherent modulation, spreading sequence offset channelization. General voice and data services –up to 307 kb/s (1x), 1.04 Mb/s (3x) per supplemental data channel Network –PSTN and Internet service connections –ANS-41 MAP for mobility management and security

ITU-T Workshop on Security, Seoul (Korea) May, x-3x Network Home SystemVisited System Home Location Register Home Location Register Authentication Center Authentication Center PSTN Switch + VLR PSTN Switch + VLR Security Parameters Key Management Subscription profiles Authorization control Location registration Local authentication Mobility management Radio Access Network Radio Access Network SS7 (voice and other circuit-switched services)

ITU-T Workshop on Security, Seoul (Korea) May, Future All-IP Network Not just a replacement for SS7. Internet-based network signaling, likely including: –Mobile IP for location registration and data delivery. –Presence servers may replace HLRs. –SIP for call/session establishment. –Internet security protocols. New security challenges: –The network is directly exposed to Internet attacks. –Weak security in one operator’s system may jeopardize the entire system. TSG-S WG4 is establishing security requirements for the all-IP Network.

ITU-T Workshop on Security, Seoul (Korea) May, IS-856 (1xEV-DO) IS-2000 Compatible RF parameters and components. –Network planning. –Dual-mode 1x/1xEV-DO terminals supported. High-performance data service. –CDMA/TDMA hybrid with demand assignment. –Up to Mb/s FL burst rate, kb/s RL. Network: direct Internet access –Mobile IP for mobility with fixed IP address. –“simple IP” for mobility with locally assigned IP address. –AAA/Radius security model.

ITU-T Workshop on Security, Seoul (Korea) May, xEV-DO Network Home SystemVisited System MIP Home Agent MIP Home Agent AAA-H PDSN + MIP Foreign Agent PDSN + MIP Foreign Agent Subscription data Authorization Security Parameters Key Management Location registration PDSN access control Mobility management Radio Access Network Radio Access Network Internet RAN-AAA RAN access control AT PDA, laptop, etc.

ITU-T Workshop on Security, Seoul (Korea) May, Security Elements Access Control (bilateral) Key management Data and identity privacy Provisioning

ITU-T Workshop on Security, Seoul (Korea) May, Access Control Protection of System Resources against Unauthorized Use. Authentication –Terminal authentication Prevent fraudulent use of the network –Proof of subscription identity –Proof of sender identity and message integrity –Network authentication Prevent false base station attacks on user information Authorization –Authentication is a pre-requisite for Authorization. –Service Access Rights based on Subscription data are passed from home system (HLR or AAA) to serving system

ITU-T Workshop on Security, Seoul (Korea) May, Key Management IS-2000: –Relies on symmetric keys for all security. –A root authentication key forms the base security association. –Session keys are derived from the root key during authentication. IS-856: –Uses public-key agreement to establish airlink session keys. –Uses symmetric keys for Radius authentication.

ITU-T Workshop on Security, Seoul (Korea) May, Authentication Methods Message authentication –A method where each message includes identification and proof of identity. –This method is required on random-access channels. –Requires a long-term security association Connection authentication –A method where identity is proven once, and all subsequent data includes proof that it comes from the same source. –Useful where a connection is established, including a session- related security association.

ITU-T Workshop on Security, Seoul (Korea) May, IS-2000 Authentication Challenge-Response Authentication –Rev B and earlier: Legacy authentication based on IS-95. –Rev C and later: AKA (same as UMTS authentication), plus: Optional UIM authentication procedure to prove presence of a valid UIM, preventing rogue shell attacks. Message Integrity Checks –Keyed SHA-1-based hash of message contents. –Cryptosync based on time and other data to prevent replay attacks.

ITU-T Workshop on Security, Seoul (Korea) May, IS-2000-C Authentication (AKA) mobilevisited systemhome system Registration request Authentication vector request AV(challenge, response, BS Challenge, BS authentication Response Registration request authentication, CK, IK, UAK) Compute response, CK, IK, UAK using root key K Compute response, CK, IK, UAK using root key K Access request (MAC using IK or UAK) Registration response

ITU-T Workshop on Security, Seoul (Korea) May, IS-856 Authentication RAN: –Initial connection establishment is neither authenticated nor encrypted. –Session establishment includes Diffie-Hellman key negotiation. –Subsequent RAN-domain messages can be authenticated and/or encrypted using the negotiated keys. –PPP/LCP setup follows session establishment. –RAN user identity is optionally authenticated by CHAP via the RAN- AAA. –Data integrity protection (encryption, keyed MAC) prevents packet insertion or similar theft of service. PDSN: –Separate PPP/LCP instance created. –CHAP and/or MIP authentication of PDSN user identity via the home AAA server. –RAN security ensures integrity of the PPP connection.

ITU-T Workshop on Security, Seoul (Korea) May, IS-856 Authentication mobile visited system (RAN/PDSN) home RAN (via PDSN) RAN session establishment (Diffie-Hellman key agreement) (optional) CHAP authentication PDSN session establishment CHAP or MIP authentication Access request (MAC using D-H key) home ISP (via PDSN)

ITU-T Workshop on Security, Seoul (Korea) May, IS-2000 Privacy Identity privacy: –Temporary mobile station identifier (TMSI) is assigned by the serving system. User data privacy: –IS-2000-B and later use 128-bit Rijndael algorithm (AES). Stream cipher mode Cryptosync based on time and other data to prevent replay attacks. –IS-2000 encryption keys: 64-bit keys from legacy authentication. 128-bit keys from AKA.

ITU-T Workshop on Security, Seoul (Korea) May, IS-856 Privacy Identity privacy: –When encryption is available, user identities are sent only after encryption is invoked. User data privacy: –Over-the-air encryption Protects against packet insertion, session hijacking, and data eavesdropping within the wireless system. Does not address the greater Internet privacy risks once the data leaves the wireless network. –Internet security protocols (IPsec, SSL, etc.) are necessary for end-to-end security.

ITU-T Workshop on Security, Seoul (Korea) May, Provisioning Installation of subscription data in the mobile and network. –Symmetric key security requires at least one key provisioned. Provisioning is a major operational concern. –High cost –High impact on customer satisfaction –Operator solutions will vary depending on business models.

ITU-T Workshop on Security, Seoul (Korea) May, Provisioning Methods Manufacturer provisioning –Keys are installed by the manufacturer, and securely communicated to the operator’s AC or AAA. Manual provisioning –User or service representative enters the key via a keypad or provisioning device. Over-the-air Service Provisioning (OTASP) –Unprovisioned devices are hotlined to special service numbers/URLs; secure protocols are used to install keys. Removable UIM –Like GSM SIM; keys are in a removable “token” provided separately from the terminal and installed by the user. (In approximate order of prevalence in cdma2000 deployments)

ITU-T Workshop on Security, Seoul (Korea) May, In Conclusion: Cdma2000 standards support a full set of security features for: –Fraud prevention –User privacy Future evolution to all-IP networks poses new security challenges. Actual system security is only as good as the operators make it.