cis 6930 cellular and mobile network security cdma umts
play

CIS 6930 - Cellular and Mobile Network Security: CDMA/UMTS Air - PowerPoint PPT Presentation

CIS 6930 - Cellular and Mobile Network Security: CDMA/UMTS Air Interface Professor Patrick Traynor 10/11/2018 Florida Institute for Cybersecurity (FICS) Research UMTS and CDMA 3G technology - major change from GSM (TDMA) Based on


  1. CIS 6930 - Cellular and Mobile Network Security: CDMA/UMTS Air Interface Professor Patrick Traynor 10/11/2018 Florida Institute for Cybersecurity (FICS) Research

  2. UMTS and CDMA 3G technology - major change from GSM (TDMA) • Based on techniques originally employed by Verizon (IS-95) • Signal is encoded so that it can be recovered from “noise” (other signals) • Florida Institute for Cybersecurity (FICS) Research 2

  3. New Considerations Technology differences • Power control • Frequency re-use & handoffs • Number of users • Modulation (Phase Shift Keying) • Traffic differences • What is the primary difference between 2G and 3G? • Florida Institute for Cybersecurity (FICS) Research 3

  4. Code Division Multiple Access • used in several wireless broadcast channels (cellular, satellite, etc) standards • unique “code” assigned to each user; i.e., code set partitioning • all users share same frequency, but each user has own “chipping” sequence (i.e., code) to encode data • encoded signal = (original data) X (chipping sequence) • decoding: inner-product of encoded signal and chipping sequence • allows multiple users to “coexist” and transmit simultaneously with minimal interference (if codes are “orthogonal”) • What does it mean for two vectors to be orthogonal? Florida Institute for Cybersecurity (FICS) Research 4

  5. CDMA Encode/Decode channel output Z i,m Z i,m = d i . c m d 0 = 1 data 1 1 1 1 1 1 1 1 bits d 1 = -1 - - 1 - - - - - - 1 1 1 1 1 1 1 sender 1 1 1 slot 0 1 1 1 1 slot 1 1 channel channel code - output - - - 1 1 1 1 - output - - - 1 1 1 1 slot 1 slot 0 M D i = Σ Z i,m . c m m=1 M 1 1 1 1 1 1 1 1 received d 0 = 1 input - - 1 - - - - - - 1 1 1 1 1 1 1 d 1 = -1 1 1 1 1 1 1 1 1 slot 0 slot 1 channel channel code - - - - 1 - 1 1 1 - 1 - 1 - 1 1 output output receiver slot 1 slot 0 Florida Institute for Cybersecurity (FICS) Research 5

  6. CDMA: two-sender interface Florida Institute for Cybersecurity (FICS) Research 6

  7. CDMA Benefits Higher capacity • interference limited = high efficiency • uses voice activity detection to reduce transmission bandwidth • Improved quality • soft handoff • CDMA has frequency, spatial, and time diversity to adapt to errors • Ease of deployment • no frequency planning; frequency reuse = 1 • Increased talk time • power control ensures that the UE transmits at optimum power, resulting in longer battery life. • Florida Institute for Cybersecurity (FICS) Research 7

  8. CDMA Privacy Given that all signals look like noise unless you have the despreading • sequence, what sort of privacy does CDMA offer? Ideally, you should get a 2 N search space... • Zhang et al. show that the IS-95 long code of 42 bits can be cracked by • capturing 42 frames and solving 42 linear equations Break takes approximately 840 ms. • What is the security implication? • Florida Institute for Cybersecurity (FICS) Research 8

  9. Universal Mobile Telecommunications System: UMTS Specifications: • Frequencies: 700, 850, 900, 1700, 1900, 2100 MHz (5 MHz channels) • worldwide; FDD Chipping codes: up to 512 bits • Power control: up to1500x per second • Time division: 10 ms frames, 1 frame = 15 time slots • Borrows extensively from GSM protocols • Major changes: • CDMA Technology: Channel structure/handoffs/power control • Security -- increased use of cryptographic constructions • Data infrastructure • Florida Institute for Cybersecurity (FICS) Research 9

  10. Entities: New names, old faces UE = User Equipment • Node-B • RNC = Radio Network Controller • BSC RNC MS BTS UE Node-B BTS BTS Node-B Node-B Florida Institute for Cybersecurity (FICS) Research 10

  11. Channels: Old & New GSM UMTS BCCH BCCH PCH PCH AGCH AICH SDCCH DCCH TCH DTCH RACH RACH SCH SCH CCCH CCCH Florida Institute for Cybersecurity (FICS) Research 11

  12. Channel Types Logical: defines a logical task or use in the network • Transport: defines the way logical data is prepared • Physical: defines the actual channel (i.e. chipping code) used to transmit data • Florida Institute for Cybersecurity (FICS) Research 12

  13. Logical Channels Broadcast Control Channel (BCCH): Provides • common information about the cell to UEs. Paging Control Channel (PCCH): Provides • information about incoming calls and how to listen for them. Dedicated Control Channel (DCCH): A two- • way assigned channel that carries control information to and from a single UE. Common Control Channel (CCCH): A two- • way shared channel that carries control information. Dedicated Traffic Channel (DTCH): A two- • way assigned channel that carries traffic to and from a single UE. Florida Institute for Cybersecurity (FICS) Research 13

  14. Transport Channels Dedicated Transport Channel (DCH): carries data to and from a specific UE • Broadcast Channel (BCH): Broadcasts network and cell information • Forward Access Channel (FACH): Carries control information to UEs for shared channels. • Random Access Channel (RACH): Carries channel requests to the network from the UE. • Paging Channel (PCH): Carries incoming call alerts. • Uplink Common Packet Channel (CPCH): 
 • Carries packet data to the network. Downlink Shared Channel (DSCH): Carries 
 • packet data to the UE. Florida Institute for Cybersecurity (FICS) Research 14

  15. Physical Channels: Signaling Forward (to UE): • Primary Common Control Physical Channel (PCCPCH): Carries the BCH • Secondary Common Control Physical Channel (SCCPCH): Carries the FACH and the PCH • Synchronization Channel (SCH): Synchronizes time with the network • Common Pilot Channel (CPICH): Informs the user of the Primary Scrambling Code (PSC) • Acquisition Indicator Channel (AICH): Used to carry dedicated channel assignments to UEs • Paging Indication Channel (PICH): Provides the UE with information about how pages are sent. This • informs the UE how often to wake up and listen for pages. Reverse (to Node-B): • Physical Random Access Channel (PRACH): Carries the RACH • Florida Institute for Cybersecurity (FICS) Research 15

  16. Physical Channels: Traffic Bi-Directional: • Dedicated Physical Data Channel (DPDCH): Carries a DCH • Dedicated Physical Control Channel (DPCCH): Carries control information (e.g., identifiers, power • control) Forward (to UE): • Physical Downlink Shared Channel (PDSCH): carries packet data to a UE. • CPCH Status Indication Channel (CSICH): Indicates the status of the CPCH • Collision Detection/Channel Assignment Indication Channel 
 • (CD/CA-ICH): Indicates if data sent over the CPCH has been successfully received or if a collision occurred. Reverse (to Node-B): • Physical Common Packet Channel (PCPCH): Carries the CPCH • Florida Institute for Cybersecurity (FICS) Research 16

  17. How a connection is made SCH • CPICH • PCCPCH • Synchronize Time (SCH) Acquire PSC (CPICH) Acquire cell information (PCCPCH) Node-B UE Florida Institute for Cybersecurity (FICS) Research 17

  18. How a call is sent/received DPDCH (DCCH & DTCH) + DPCCH • Page sent over PCH (SCCPCH) Page response over RACH (PRACH) Chipping & scrambling code assigned (AICH) Authentication over DCCH (DPDCH + DPCCH) Call connect over DTCH (DPDCH + DPCCH) Node-B UE Florida Institute for Cybersecurity (FICS) Research 18

  19. Mappings Source: http://www.authorstream.com/Presentation/3627946-387767-wcdma-air-interface-fundamentals-science-technology-ppt-powerpoint/ • Florida Institute for Cybersecurity (FICS) Research 19

  20. Spreading Codes Orthogonal Variable Spreading Factor (OVSF) vs scrambling codes • OVSF codes are typical chipping/spreading codes • Scrambling codes can be multiplied into OSVF codes to provide more • user channels Long vs. short codes • Uplink: code lengths up to 256 (+ 16.8 M scrambling codes) • Downlink: code lengths up to 512 • Why are these numbers different? • Florida Institute for Cybersecurity (FICS) Research 20

  21. Power Control CDMA provides optimal performance when all signals are received at • approximately the same strength. When a DTCH is assigned, the Node-B sends reports of the RSS (received • signal strength) to the UE, alerting it at what power to transmit. Power control commands sent up to 1500 times per second • Florida Institute for Cybersecurity (FICS) Research 21

  22. Handoffs 4 types: hard, soft, softer, network (2G 3G) • Soft handoff overview: • Frequency reuse = 1 • UE will receive signal from multiple 
 • Node-Bs. Extract signals of old and new tower 
 • simultaneously using different chipping 
 codes. Remain connected to old Node-B until re-registered with new Node-B • Florida Institute for Cybersecurity (FICS) Research 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend