mobile communications mobile communications
play

Mobile Communications Mobile Communications Confidentiality - PowerPoint PPT Presentation

Security Requirements Authorization Which objects are accessible by whom? Authentication Reliable identification of users identity . Mobile Communications Mobile Communications Confidentiality Security No access to information for


  1. Security Requirements Authorization Which objects are accessible by whom? Authentication Reliable identification of users identity . Mobile Communications Mobile Communications Confidentiality Security No access to information for unauthorized users. Integrity  Types of Attacks  802.11 Security Protection of data from manipulation/deletion.  GSM Security  GSM Security  Access Control Lists  Access Control Lists Non-repudiation  WEP  Authentication Originator cannot deny being the origin of data.  WPA/WPA2  Encryption  802.1X/EAP  Temporary ID (TMSI) Availability  Tunneling … of resources and data to legitimate users. Sicherheit Mobile Communication Security 1 Mobile Communication Security 2 Attack Types Attack Types Active attacks: Passive attacks:  Masquerading Falsifying of identity Falsifying of identity  Eavesdropping undetected interception and recording of communications by non-  Tampering authorized persons Unnoticed manipulation of messages during transmission p g g  Traffic flow analysis  Replay Storage of messages and later (unmanipulated) retransmission. g g ( p ) By observing transmitted messages By observing transmitted messages Conclusions about behavior, interest and habits of users  Denial of Service Prevention of users from using a service by overload- or interference attacks. Security Security Mobile Communication Security 3 Mobile Communication Security 4

  2. GSM / UMTS security mechanisms GSM / UMTS security mechanisms User Authentication  For each GSM subscriber, there is a key K i (128 bit)  K i is stored on the SIM (Subscriber Identification Module) and HLR (Home Location Register) Location Register) User Authentication  K i never leaves the SIM card or the HLR  To authenticate, a "challenge-response" method is used, based on a one- Encryption way function, in GSM referred to as A3 algorithm.  Each network operator can define A3 itself, known examples:  COMP128 (already cracked, takes less than a minute)  COMP128 (already cracked takes less than a minute) Temporary Identification (TMSI) T Id tifi ti (TMSI)  COMP128-2 (secret)  COMP128-3 (secret, but some analysis shows that problems of COMP128 have been basically solved) Security Security Mobile Communication Security 5 Mobile Communication Security 6 GSM / UMTS security mechanisms GSM / UMTS security mechanisms User Authentication (cont.) Encryption of the air interface (optional)  Suppose a mobile station i enters a new cell (eg in a foreign network).  The challenge response method cannot prevent „Man in the Middle“ attacks  The Authorization Center (AC) at the users HLR is then contacted by the Th A th i ti C t (AC) t th HLR i th t t d b th  Eavesdropping and unauthorized phone calls on the expense of others E d i d th i d h ll th f th foreign network.  Therefore, there is another one way function in GSM called "A8 algorithm"  The AC generates a random number RAND (128 bit) and a value SRES g ( )  A8 is also determined by the network operator, e.g. also COMP128-3 y p , g (32 bit) by employing A3 with K i to RAND.  HLR generates a symmetric key K c from RAND and K i by A8  HLR sends (RAND, SRES) encrypted and signed to the foreign network.  HLR sends (RAND, SRES, K c ) encrypted and signed to the foreign network.  The foreign network sends RAND (challenge) to the mobile station i and  The foreign network sends RAND to mobile station as before. „asks“ it to calculate SRES‘ by executing A3 with K i on RAND.  The mobile station computes K c using RAND and K i employing A8  Then the mobile station sends calculated SRES back to foreign network  Then the mobile station sends calculated SRES‘ back to foreign network  K i th  K c is then used on the air interface as an encryption key. d th i i t f ti k (response).  If SRES = SRES‘ the mobile station is authenticated successfully. Security Security Mobile Communication Security 7 Mobile Communication Security 8

  3. GSM / UMTS security mechanisms GSM / UMTS security mechanisms Encryption of the Air interface (optional, cont.) Temporary identification (TMSI)  With K c all calls between mobile and base station are encrypted.  The IMSI number (International Mobile Subscriber Identity) is used as international mobile subscriber identifier international mobile subscriber identifier.  The encryption algorithm itself is called „A5-algorithm“ in GSM Th ti l ith it lf i ll d A5 l ith “ i GSM  It is transferred only once in a foreign network.  There are 3 different standardizedA5:  After the transfer the MSC/VLR computes a TMSI (Temporary Mobile p ( p y  A5/1 stream cipher algorithm, weak p g , Subscriber Identity)  A5/2 stream cipher algorithm, even weaker  A5/3 block cipher algorithm, strong  For any further communication the TMSI is used  In case of a re-registration at a cell or a cell to cell handover a new TMSI is computed, encrypted and transferred. This mechanism makes it difficult for http://www.gsmworld.com/using/algorithms/index.shtml attackers to create a motion profile, which means mapping of IMSI to TMSI. Security Security Mobile Communication Security 9 Mobile Communication Security 10 GSM / UMTS security mechanisms The IEEE 802.11 standard security mechanisms Summary Provision of:  Access Control  Authentication  Encryption yp 802.11 Wireless Client Access Point Request Service Set Identifier Wired Equivalent Privacy (WEP) (SSID) WiFi Protected Access (WPA) Media Access Control (MAC filtering) Security Mobile Communication Security 11 Mobile Communication Security 12

  4. Access Control - Service Set Identifier (SSID) Access Control - MAC Address List Standard Mode Access control by means of Access Control Lists (ACL) of MAC addresses  The network name (SSID) doesn‘t have to be known to the client  The network name (SSID) doesn t have to be known to the client  SSID = dividing a Wireless LAN into distinct segments ACLs have to be managed via management software centrally on access  AP sends "beacon" signals containing the SSID, so that clients can find the points points desired segment desired segment  Not well scalable. Administrative burden is very high. Hidden Mode (closed network, no broadcast)  AP sends beacon“ signals without SSID therefore the client must know  AP sends „beacon signals without SSID, therefore the client must know Remedy Remedy the SSID of desired segment upfront.  central file with MAC list  AP does not reply to SSID broadcasts by clients  RADIUS Server  Username = MAC address  Username = MAC address Unfortunately the SSID is transmitted in other signalling messages in clear  Password = „null“ or „none“ text. MAC addresses are generally transmitted unencrypted MAC addresses are generally transmitted unencrypted SSID can be easily intercepted with a „Wireless Sniffer“.  Attacker can intercept MAC address and misuse it on his/her own wireless interface card = MAC address spoofing (identity pretention) Mobile Communication Security 13 Mobile Communication Security 14 Wired Equivalent Privacy (WEP) WEP modes Radio waves do not stop at the front door of buildings Open System Authentication p y  Unlike wired systems, it requires no physical intervention in order to break  Unlike wired systems it requires no physical intervention in order to break into the network Station Identity Wired Equivalent Privacy Wi d E i l t P i result Access Point  safety from interception is supposed to be at least as good as wired Wireless Client systems.  Primary goal is privacy: prevention of eavesdropping Shared Key Authentication  Secondary target is authentication of clients Station Identity Station Identity WEP 802.11 is available in a 40-bit and 128-bit version Challenge C WEP has no method for key management WEP ( C )  Keys must be configured manually  Global key <-> personal key Access Point Wireless Client result  Keys are the same for everyone, are secret only for a short period of time.  Keys are the same for everyone are secret only for a short period of time Mobile Communication Security 15 Mobile Communication Security 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend