Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 4 Application Level Security in Cellular Networks.

Similar presentations


Presentation on theme: "Chapter 4 Application Level Security in Cellular Networks."— Presentation transcript:

1 Chapter 4 Application Level Security in Cellular Networks

2  1G  2G and 2.5G  High-Speed Circuit-Switched Data (HSCSD)  General Packet Radio Service (GPRS)  Enhanced Data Rates for GSM Evolution (EDGE)  Cellular Digital Packet Data (CDPD)  3G Generations of Cellular Networks (1)

3  4G  Push and Pull Services  Location-based Services  Entertainment Services Generations of Cellular Networks (2)

4  Cellular Network limitations  Open wireless medium  Limited bandwidth  System Complexity  Limited Power  Limited Processing Power  Relativity Unreliable Network Connection Security Issues and Attacks in Cellular Networks (1)

5  Security Issues in Cellular network  Authentication  Integrity  Confidentiality  Access Control  OS in Mobile Devices  Location Detection  Viruses and Malware Security Issues and Attacks in Cellular Networks (2)

6  Downloaded Contents  Device Security  Attacks on Cellular Networks  Denial of Service (DoS)  Distributed Denial of Service (DDoS)  Channel Jamming  Unauthorized Access  Eavesdropping Security Issues and Attacks in Cellular Networks (3)

7  Message Forgery  Message Replay  Man-in-the-Middle Attack  Session Hijacking Security Issues and Attacks in Cellular Networks (4)

8  GSM Architecture  GSM Security Features  Anonymity or Subscriber Identity Confidentiality  Subscriber Identity Authentication  Encryption of User Traffic and User Control Data  Use of SIM as Security Module GSM Security for Applications (1)

9  GSM Security Attacks  SIM/MS Interface Tapping  Attacks on the Algorithm A3/8  Flaws in A5/1 and A5/2 Algorithms  Attacks on the SIM Card  False Base Station GSM Security for Applications (2)

10  GSM Security Solutions  GSM – Newer A3/A8 Implementation  GSM – A5/3 Ciphering  Public Key Infrastructure in Mobile Systems  Secure Browsing  Access to Enterprise Networks  Mobile Payment Authentication  Access Control GSM Security for Applications (3)

11  Digital Signatures on Mobile Transactions  Messaging  Content Authentication  Digital ID GSM Security for Applications (4)

12  Security Issues in GPRS  Related to ME and SIM card  Between ME and SGSN  Between SGSN and GGSN  Among different operators  Between GGSN and external connected networks (Internet) GPRS Security for Applications (1)

13  Security Threats to the GPRS  Unauthorized Access to the data  Threats to Integrity  DoS  Attack from valid network  Randomly Changing Source Address  Unauthorized Access to Services GPRS Security for Applications (2)

14  GPRS Security Solutions  Ciphering based on KASUMI added to GPRS called GEA3  Performed in higher layer LLC (Logical Link Control)  MAC messages are not ciphered  UMTS ciphering occurs at MAC layer GPRS Security for Applications (3)

15  5 different sets of security features  Network Access Security  Network Domain Security  User Domain Security  Application Security  Visibility and Configurability of security UMTS Security for Applications (1)

16  UMTS AKA Security Mechanism  UMTS Authentication and Key Agreement (UMTS AKA)  Authentication and Key Agreement using challenge/response mechanism  See figure 4.9 UMTS AKA Protocol  UMTS Network Authentication to Phone UMTS Security for Applications (2)

17  3G Attacks  DoS  Overbilling Attack  Spoofed PDP Context  Signaling-level attacks  Some Security Solutions for 3G  A new authentication scheme with anonymity for wireless networks 3G Security for Applications (1)

18  Manual authentication for wireless devices  Elliptic Curve Cryptography for Wireless Security  Channel Surfing and Spatial Retreats 3G Security for Applications (2)

19  Protocol of Gong et al.  GSM User Authentication Protocol (GUAP)  One-time Password Schemes  Mobile ATP  ATP using GSM  OTP using GPRS  Web/Mobile Authentication System with OTP  Location-based Encryption  BioPasswords Some of Security and Authentication Solutions


Download ppt "Chapter 4 Application Level Security in Cellular Networks."

Similar presentations


Ads by Google