Top Banner
SECURITY MODEL EVALUATION O 3G WIRELESS NETWORKS MERCY J ABINAYA K 1
22

Security model evaluation of 3 g

Jun 09, 2015

Download

Education

I am sure it will be useful friends ...
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security  model  evaluation  of  3 g

1

SECURITY MODEL EVALUATION OF 3G

WIRELESS NETWORKS

MERCY J

ABINAYA K

Page 2: Security  model  evaluation  of  3 g

OVERVIEW

• Abstract • Wireless Network• 3G Wireless Network• Security Principles for 3 G • References • Conclusion

2

Page 3: Security  model  evaluation  of  3 g

3

ABSTRACT

• 3G mobile phone networks are currently the most widely used wireless telephone networks in the world.

• While being an improvement over earlier analog systems, active attacks, authentication, encryption, channel hijack, inflexibility

• 3G mobile phone standards have been designed to address the issues in 2G and provide a better security model.

• Overview of security in 3G networks along with pointing out the known problems.

• Security features of 3G systems are presented and solved .

Page 4: Security  model  evaluation  of  3 g

1G WIRELESS TECHNOLOGY

Developed in 1980s and completed in early 1990’s

1G was old analog system and supported the 1st generation of

analog cell phones speed up to 2.4kbps

Advance mobile phone system (AMPS) was first launched by

the US and is a 1G mobile system

Allows users to make voice calls in 1 country

4

Page 5: Security  model  evaluation  of  3 g

5

SECOND GENERATION

2G phones using global system for mobile communications

(GSM) were first used in Europe.

GSM provides voice and limited data services and uses digital

modulation for improved audio quality.

Digital AMPS , CDMA were some of the 2G systems.

Page 6: Security  model  evaluation  of  3 g

THIRD GENERATION

To meet the growing demand in network capacity, rates required for high speed data transfer and multimedia applications , 3G standards started evolving.

It is based on the InternationalTelecommunication Union (ITU) family of standards.

3G technologies enable network operators to offer users a wider range of more advanced services.

Services include wide-area wireless voice telephony, video-calls and broadband wireless data , all in a mobile environment.

The data are sent through the technology called Packet switching.Voice calls are interpreted through circuit switching.

6

Page 7: Security  model  evaluation  of  3 g

FEATURES INCLUDES

Phone calls/ fax Global roaming Send/receive large email messages High speed web Navigation / maps Video conferencing TV streaming Electronic agenda meeting reminder Speed: 200 kb/sec-2mb/sec Time to download a 3 min MP3 song:

11 sec-1.5 min

7

Page 8: Security  model  evaluation  of  3 g

8

3G Network Security Architecture

Circuit/ SignalingGateway

2G/2.5G2G

IN Services

Call Agent

FeatureServer(s)

RNC

3G

Data + Packet Voice

Circuit Switch

CircuitNetwork

Packet Network(Internet)

Packet Gateway

RAC

Voice

Mobility Manager

IP CoreNetwork

IP RAN

Page 9: Security  model  evaluation  of  3 g

9

3G Security Principles

• Build on GSM security

• Correct problems with GSM security

• Add new security features

Source: 3GPP

Page 10: Security  model  evaluation  of  3 g

10

GSM Security Architecture

10

Page 11: Security  model  evaluation  of  3 g

11

GSM Security Elements, 1Key functions: privacy, integrity and confidentiality

Authentication Protect from unauthorized service access

Based on the authentication algorithm A3(Ki, RAND)=> SRESProblems with inadequate algorithms

Encryption Scramble bit streams to protect signaling and user dataCiphering algorithm A8(Ki, RAND) => Kc

A5(Kc, Data) => Encrypted DataNeed stronger encryption

ConfidentialityPrevent intruder from identifying users by IMSITemporary MSINeed more secure mechanism

Page 12: Security  model  evaluation  of  3 g

12

SIM

A removable hardware security module

Manageable by network operators

Terminal independent Secure Application Layer

Secure application layer channel between subscriber module and home network

Transparency

Security features operate without user assistance

Needs greater user visibility Minimized Trust

Requires minimum trust between HE and SN

GSM Security Elements, 2

Page 13: Security  model  evaluation  of  3 g

13

Problems with GSM Security, 1 Active Attacks

Impersonating network elements such as false BTS is possible

Key TransmissionCipher keys and authentication values are transmitted in clear within

and between networks (IMSI, RAND, SRES, Kc)

Limited Encryption ScopeEncryption terminated too soon at edge of network to BTS

Communications and signaling in the fixed network portion aren’t protected

Designed to be only as secure as the fixed networks

Channel HijackProtection against radio channel hijack relies on encryption. However, encryption is not used in some networks.

Page 14: Security  model  evaluation  of  3 g

14

Problems with GSM Security, 2

• Implicit Data IntegrityNo integrity algorithm provided

• Unilateral AuthenticationOnly user authentication to the network is provided.

No means to identify the network to the user.

• Weak Encryption AlgorithmsKey lengths are too short, while computation speed is increasing

Encryption algorithm COMP 128 has been broken

Replacement of encryption algorithms is quite difficult

• Unsecured TerminalIMEI is an unsecured identity

Integrity mechanisms for IMEI are introduced late

Page 15: Security  model  evaluation  of  3 g

15

Problems with GSM Security, 3

Lawful Interception & Fraud

Considered as afterthoughts Lack of Visibility

No indication to the user that encryption is on

No explicit confirmation to the HE that authentication parameters are properly used in SN when subscribers roam

Inflexibility

Inadequate flexibility to upgrade and improve security functionality over time

Page 16: Security  model  evaluation  of  3 g

16

New Security Features, 1 Network Authentication

The user can identify the network Explicit Integrity

Data integrity is assured explicitly by use of integrity algorithms

Also stronger confidentiality algorithms with longer keys Network Security

Mechanisms to support security within and between networks Switch Based Security

Security is based within the switch rather than the base station

IMEI Integrity

Integrity mechanisms for IMEI provided from the start

Page 17: Security  model  evaluation  of  3 g

17

New Security Features, 2 Secure Services

Protect against misuse of services provided by SN and HE

Secure ApplicationsProvide security for applications resident on USIM

Fraud DetectionMechanisms to combating fraud in roaming situations

FlexibilitySecurity features can be extended and enhanced as required by new threats and services

Visibility and ConfigurabilityUsers are notified whether security is on and what level of security

is available

Users can configure security features for individual services

Page 18: Security  model  evaluation  of  3 g

18

New Security Features, 3 Compatibility

Standardized security features to ensure world-wide interoperability and roaming

At least one encryption algorithm exported on world-wide basis

Lawful Interception

Mechanisms to provide authorized agencies with certain information about subscribers

Page 19: Security  model  evaluation  of  3 g

Evolution to 3GDrivers: Capacity, Data Speed, Cost

cdmaOnecdmaOne

GSMGSM

TDMA TDMA

2G

PDC PDC

CDMA2000 1x

CDMA2000 1x

First Step into 3G

GPRSGPRS 90%

10%

EDGEEDGE

WCDMA

WCDMA

3G phase 1 Evolved 3G

3GPP CoreNetwork

CDMA2000 1x EV/DO

CDMA2000 1x EV/DO

HSDPA/HSUPA

HSDPA/HSUPA

Expected market share

EDGEEvolution

EDGEEvolution

CDMA2000 EV/DO Rev A

CDMA2000 EV/DO Rev A

19

Page 20: Security  model  evaluation  of  3 g

CONCLUTION

This paper presented a survey of three generations of mobile phone

systems from a security perspective

3G networks standards were evaluated within availability

confidentiality- integrity framework and found to not be secure

Hence New Security Features has been presented and solved.

Finally, there is no experimental data supporting the claim that 3G

systems aren’t secure.

Future work can be geared toward filling those gaps.

Page 21: Security  model  evaluation  of  3 g

References

• 3G TS 33.120 Security Principles and Objectiveshttp://www.3gpp.org/ftp/tsg_sa/WG3_Security/_Specs/33120-300.pdf

• 3G TS 33.120 Security Threats and Requirementshttp://www.arib.or.jp/IMT-2011/ARIB-spec/ARIB/21133-310.PDF

• Michael Walker “On the Security of 3GPP Networks”http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/mike_walker.pdf

• Redl, Weber, Oliphant “An Introduction to GSM”Artech House, 2010

• Joachim Tisal “GSM Cellular Radio Telephony”John Wiley & Sons, 2009

• Lauri Pesonen “GSM Interception”http://www.dia.unisa.it/ads.dir/corso-security/www/CORSO-9900/a5/Netsec/netsec.html

• 3G TR 33.900 A Guide to 3rd Generation Securityftp://ftp.3gpp.org/TSG_SA/WG3_Security/_Specs/33900-120.pdf

• 3G TS 33.102 Security Architectureftp://ftp.3gpp.org/Specs/2000-12/R1999/33_series/33102-370.zip

• 3G TR 21.905 Vocabulary for 3GPP Specificationshttp://www.quintillion.co.jp/3GPP/Specs/21905-010.pdf

21

Page 22: Security  model  evaluation  of  3 g

THANK U

Are Their Any Questions??

22