SlideShare une entreprise Scribd logo
1  sur  26
Naveen Kumar
 GSM is the most widely used cellular standard
 Over 600 million users, mostly in Europe and Asia
 Provides authentication and encryption capabilities
 Today’s networks are 2G & 3G
 Future (4G LTE)
Home
network
Switching
and
routing
Other Networks
(GSM, fixed,
Internet, etc.)
Visited network
HLR/AuC
VLR
SIM
 Authentication
◦ network operator can verify the identity of the subscriber making
it infeasible to clone someone else’s mobile phone
 Confidentiality
◦ protects voice, data and sensitive signalling information
(e.g. dialled digits) against eavesdropping on the radio
path
 Anonymity
◦ protects against someone tracking the location of the user or
identifying calls made to or from the user by eavesdropping on
the radio path
 Three algorithms have been specified to provide
security services in GSM.
 A3 is used for authentication,
 A5 for encryption, and
 A8 for the generation of a cipher key
 For authentication, the VLR sends the random value
RAND to the SIM.
 The MS sends back the SRES generated by the SIM;
the VLR can now compare both values. If they are the
same, the VLR accepts the subscriber, otherwise the
subscriber is rejected.
 To ensure privacy .
All user-related data is encrypted. After authentication,
BTS (base transceiver station) and MS apply encryption
to voice, data, and signaling by applying the cipher key
Kc .
 Kc is generated using the individual key Ki and a random
value by applying the algorithm A8.
 This confidentiality exists only between MS and BTS, but
it does not exist end-to-end or within the whole GSM
network.
 Note that the SIM in the MS and the network both calculate the
same Kc based on the random value RAND. The key Kc itself is
not transmitted over the air interface.
 MS and BTS can now encrypt and decrypt data using the
algorithm A5 and the cipher key Kc.
 Kc should be a 64 bit key – which is not very strong, but is at least a
good protection against simple eavesdropping.
 However, the publication of A3 and A8 on the internet showed that in
certain implementations 10 bits out of 64 bits are always set to 0, so
that the real length of the key is thus only 54 consequently, the
encryption is much weaker.
 To provide user anonymity, all data is encrypted
before transmission, and user identifiers (which
would reveal an identity) are not used over the air.
 Instead, GSM transmits a temporary identifier
(TMSI), which is newly assigned by the VLR after
each location update.
 Additionally, the VLR can change the TMSI at any
time.
 User identity confidentiality on the radio access link
◦ temporary identities (TMSIs) are allocated and used instead of
permanent identities (IMSIs)
 Helps protect against:
◦ tracking a user’s location
◦ obtaining information about a user’s calling pattern
IMSI: International Mobile Subscriber Identity
TMSI: Temporary Mobile Subscriber Identity
 The GSM cipher A5/2
◦ A5/2 is now so weak that the cipher key can be
discovered in near real time using a very small amount
of known plaintext
 No requirement of
decrypting skills
 Need a instrument that
captures microwave
 Gains control of
communication between
MS and intended receiver
• Design only provides access security - communications and
signalling in the fixed network portion aren’t protected
• Design does not address active attacks, whereby network elements
may be impersonated
• Design goal was only ever to be as secure as the fixed networks to
which GSM systems connect
• Short key size of Kc (64 bits) makes it more vulnerable to various
attacks
 Mutual Authentication
• provides enhanced protection against false base station
attacks by allowing the mobile to authenticate the
network
 Data Integrity
• provides enhanced protection against false base station
attacks by allowing the mobile to check the authenticity
of certain signalling messages
 Network to Network Security
• Secure communication between serving networks.
MAPSEC (Mobile Application Part Securit) or IPsec can
be used
 Wider Security Scope
• Security is based within the RNC rather than the base
station
 Flexibility
• Security features can be extended and enhanced as
required by new threats and services
 Longer Key Length
• Key length is 128 as against 64 bits in GSM
HLRHLR AuCAuC
Access Network
(UTRAN)
Visited
Network
User
Equipment
D
RNCBTSUSIMUSIM MEME
SGSNSGSN
H
MSCMSC
Home
Network
(2) Authentication
(1) Distribution of
authentication vectors
(4) Protection of the
access link (ME-RNC)
(3) CK,IK (3) CK, IK
MSC – circuit switched
services
SGSN – packet switched
services
 Mutual Authentication between user and the
network
 Establishes a cipher key and integrity key
 Assures user that cipher/integrity keys were not
used before, thereby providing protection against
replay attacks
 Protection of some radio interface signalling
• protects against unauthorised modification, insertion and replay
of messages
• applies to security mode establishment and other critical
signalling procedures
 Helps extend the influence of authentication when
encryption is not applied
 Uses the 128-bit integrity key (IK) derived during
authentication
 Integrity applied at the Radio Resource Control (RRC)
layer of the UMTS radio protocol stack
• signalling traffic only
 Data on the radio path is encrypted between the Mobile
Equipment (ME) and the Radio Network Controller (RNC)
• protects user traffic and sensitive signalling data against
eavesdropping
• extends the influence of authentication to the entire duration of the
call
 Uses the 128-bit encryption key (CK) derived during
authentication
 No security for
communication
between network
elements in GSM
 Easy to gain access
to sensitive
information such as
Kc
 Network Domain
Security in UMTS
foils these attacks
UMTS builds upon security mechanisms of GSM, and in
addition provides following enhancements:
 Encryption terminates at the radio network controller
 Mutual authentication and integrity protection of critical
signalling procedures to give greater protection against false
base station attacks
 Longer key lengths (128-bit)
 Network Domain Security using MAPSEC or IPSec
 GSM-Security: a Survey and Evaluation of the Current Situation, Paul
Yousef, Master’s thesis, Linkoping Institute of Technology, March 2004
 UMTS security, Boman, K. Horn, G. Howard, P. Niemi, V. Electronics &
Communication Engineering Journal, Oct 2002, Volume: 14, Issue:5, pp.
191- 204
 "Evaluation of UMTS security architecture and services“, A. Bais, W.
Penzhorn, P. Palensky, Proceedings of the 4th IEEE International
Conference on Industrial Informatics, p. 6, Singapore, 2006
 UMTS Security, Valtteri Niemi, Kaisa Nyberg, published by John Wiley and
Sons, 2003
 GSM: Security, Services, and the SIM Klaus Vedder, LNCS 1528, pp. 224-
240, Springer-Verlag 1998
chd.naveen@gmail.com
/chd.naveen
@saini_naveen87
/NaveenKumar11
www.elixir-india.com

Contenu connexe

Tendances

TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 
Gsm security
Gsm securityGsm security
Gsm securityAli Kamil
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
5G Network Architecture and Design
5G Network Architecture and Design5G Network Architecture and Design
5G Network Architecture and Design3G4G
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi ArchitectureArnab Ghosal
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesDhrumil Panchal
 
GSM & UMTS Security
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS SecuritySohaib Altaf
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPTVinay Krishna
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE ArchitectureManje Gowda
 

Tendances (20)

TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Gsm security
Gsm securityGsm security
Gsm security
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
5G Network Architecture and Design
5G Network Architecture and Design5G Network Architecture and Design
5G Network Architecture and Design
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
GSM: Handovers
GSM: HandoversGSM: Handovers
GSM: Handovers
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
GSM & UMTS Security
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS Security
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
 

En vedette

Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cell Forum
 
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...IDATE DigiWorld
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionjyothsnapaidi
 
5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_aMaria Boura
 
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Bristol Is Open
 
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015SenZations Summer School
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network SecuritySatish Chavan
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionRK Nayak
 
5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm 5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm Saurabh Verma
 
Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 201244CON
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5GDirk Kutscher
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Mohamed Tharwat Waheed
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so farPayamBarnaghi
 
The leadership in the new digital age carved by the fourth industrial revolu...
The leadership in the new digital age carved by  the fourth industrial revolu...The leadership in the new digital age carved by  the fourth industrial revolu...
The leadership in the new digital age carved by the fourth industrial revolu...Osaka University
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
4G LTE Presentation Group 9
4G LTE Presentation Group 94G LTE Presentation Group 9
4G LTE Presentation Group 9eel4514team9
 
5G Presentation
5G Presentation5G Presentation
5G PresentationEricsson
 

En vedette (20)

Security In LTE Access Network
Security In LTE Access NetworkSecurity In LTE Access Network
Security In LTE Access Network
 
Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work item
 
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a
 
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
 
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm 5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm
 
Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Long Term Evolution (LTE) -
Long Term Evolution (LTE) -Long Term Evolution (LTE) -
Long Term Evolution (LTE) -
 
The leadership in the new digital age carved by the fourth industrial revolu...
The leadership in the new digital age carved by  the fourth industrial revolu...The leadership in the new digital age carved by  the fourth industrial revolu...
The leadership in the new digital age carved by the fourth industrial revolu...
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
4G LTE Presentation Group 9
4G LTE Presentation Group 94G LTE Presentation Group 9
4G LTE Presentation Group 9
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
 

Similaire à Security in GSM(2G) and UMTS(3G) Networks

Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALASaikiran Panjala
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm networkAzri Randy
 
4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdf4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdfssuser989b18
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsAnkit Gupta
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsAnkit Gupta
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impactAhmad Sharifi
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKijwmn
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMIJNSA Journal
 

Similaire à Security in GSM(2G) and UMTS(3G) Networks (20)

Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
 
Mobile security
Mobile securityMobile security
Mobile security
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm network
 
Rk 3 gsm network @guddu
Rk 3 gsm network @gudduRk 3 gsm network @guddu
Rk 3 gsm network @guddu
 
4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdf4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdf
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
Mob. comp . prst
Mob. comp . prstMob. comp . prst
Mob. comp . prst
 
GSM Architecture.ppt
 GSM Architecture.ppt GSM Architecture.ppt
GSM Architecture.ppt
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Class 1
Class 1Class 1
Class 1
 
Gsm security final
Gsm security finalGsm security final
Gsm security final
 
GSM WITH SATELLITE.pptx
GSM WITH SATELLITE.pptxGSM WITH SATELLITE.pptx
GSM WITH SATELLITE.pptx
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
 

Plus de Naveen Kumar

Mobile tower radiation
Mobile tower radiationMobile tower radiation
Mobile tower radiationNaveen Kumar
 
Ph.D Research proposal
Ph.D Research proposalPh.D Research proposal
Ph.D Research proposalNaveen Kumar
 
Cell Phone Antennas
Cell Phone AntennasCell Phone Antennas
Cell Phone AntennasNaveen Kumar
 
VHDL coding in Xilinx
VHDL coding in XilinxVHDL coding in Xilinx
VHDL coding in XilinxNaveen Kumar
 
Optimization in HFSS
Optimization in HFSSOptimization in HFSS
Optimization in HFSSNaveen Kumar
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communicationNaveen Kumar
 
A Multi-Band PIFA with Slotted Ground Plane
A Multi-Band PIFA with Slotted Ground Plane A Multi-Band PIFA with Slotted Ground Plane
A Multi-Band PIFA with Slotted Ground Plane Naveen Kumar
 
Study of Planar Inverted - F Antenna (PIFA) for mobile devices
Study of Planar Inverted - F Antenna (PIFA) for mobile devices Study of Planar Inverted - F Antenna (PIFA) for mobile devices
Study of Planar Inverted - F Antenna (PIFA) for mobile devices Naveen Kumar
 
A novel low profile planar inverted f antenna (pifa) for mobile handsets
A novel low profile planar inverted f antenna (pifa) for mobile handsetsA novel low profile planar inverted f antenna (pifa) for mobile handsets
A novel low profile planar inverted f antenna (pifa) for mobile handsetsNaveen Kumar
 
A compact planar inverted-F antenna with slotted ground plane
A compact planar inverted-F antenna with slotted ground planeA compact planar inverted-F antenna with slotted ground plane
A compact planar inverted-F antenna with slotted ground planeNaveen Kumar
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Adaptive Resonance Theory
Adaptive Resonance TheoryAdaptive Resonance Theory
Adaptive Resonance TheoryNaveen Kumar
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIPNaveen Kumar
 

Plus de Naveen Kumar (20)

Mobile tower radiation
Mobile tower radiationMobile tower radiation
Mobile tower radiation
 
Mobile security
Mobile securityMobile security
Mobile security
 
Ph.D Research proposal
Ph.D Research proposalPh.D Research proposal
Ph.D Research proposal
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Cell Phone Antennas
Cell Phone AntennasCell Phone Antennas
Cell Phone Antennas
 
Thesis on PIFA
Thesis on PIFAThesis on PIFA
Thesis on PIFA
 
Electronics Quiz
Electronics QuizElectronics Quiz
Electronics Quiz
 
VHDL coding in Xilinx
VHDL coding in XilinxVHDL coding in Xilinx
VHDL coding in Xilinx
 
Optimization in HFSS
Optimization in HFSSOptimization in HFSS
Optimization in HFSS
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
 
A Multi-Band PIFA with Slotted Ground Plane
A Multi-Band PIFA with Slotted Ground Plane A Multi-Band PIFA with Slotted Ground Plane
A Multi-Band PIFA with Slotted Ground Plane
 
Study of Planar Inverted - F Antenna (PIFA) for mobile devices
Study of Planar Inverted - F Antenna (PIFA) for mobile devices Study of Planar Inverted - F Antenna (PIFA) for mobile devices
Study of Planar Inverted - F Antenna (PIFA) for mobile devices
 
A novel low profile planar inverted f antenna (pifa) for mobile handsets
A novel low profile planar inverted f antenna (pifa) for mobile handsetsA novel low profile planar inverted f antenna (pifa) for mobile handsets
A novel low profile planar inverted f antenna (pifa) for mobile handsets
 
A compact planar inverted-F antenna with slotted ground plane
A compact planar inverted-F antenna with slotted ground planeA compact planar inverted-F antenna with slotted ground plane
A compact planar inverted-F antenna with slotted ground plane
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Adaptive Resonance Theory
Adaptive Resonance TheoryAdaptive Resonance Theory
Adaptive Resonance Theory
 
UART
UARTUART
UART
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 
AR model
AR modelAR model
AR model
 
VLSI routing
VLSI routingVLSI routing
VLSI routing
 

Dernier

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Dernier (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Security in GSM(2G) and UMTS(3G) Networks

  • 2.  GSM is the most widely used cellular standard  Over 600 million users, mostly in Europe and Asia  Provides authentication and encryption capabilities  Today’s networks are 2G & 3G  Future (4G LTE)
  • 4.  Authentication ◦ network operator can verify the identity of the subscriber making it infeasible to clone someone else’s mobile phone  Confidentiality ◦ protects voice, data and sensitive signalling information (e.g. dialled digits) against eavesdropping on the radio path  Anonymity ◦ protects against someone tracking the location of the user or identifying calls made to or from the user by eavesdropping on the radio path
  • 5.  Three algorithms have been specified to provide security services in GSM.  A3 is used for authentication,  A5 for encryption, and  A8 for the generation of a cipher key
  • 6.  For authentication, the VLR sends the random value RAND to the SIM.  The MS sends back the SRES generated by the SIM; the VLR can now compare both values. If they are the same, the VLR accepts the subscriber, otherwise the subscriber is rejected.
  • 7.
  • 8.  To ensure privacy . All user-related data is encrypted. After authentication, BTS (base transceiver station) and MS apply encryption to voice, data, and signaling by applying the cipher key Kc .  Kc is generated using the individual key Ki and a random value by applying the algorithm A8.  This confidentiality exists only between MS and BTS, but it does not exist end-to-end or within the whole GSM network.
  • 9.  Note that the SIM in the MS and the network both calculate the same Kc based on the random value RAND. The key Kc itself is not transmitted over the air interface.  MS and BTS can now encrypt and decrypt data using the algorithm A5 and the cipher key Kc.  Kc should be a 64 bit key – which is not very strong, but is at least a good protection against simple eavesdropping.  However, the publication of A3 and A8 on the internet showed that in certain implementations 10 bits out of 64 bits are always set to 0, so that the real length of the key is thus only 54 consequently, the encryption is much weaker.
  • 10.
  • 11.  To provide user anonymity, all data is encrypted before transmission, and user identifiers (which would reveal an identity) are not used over the air.  Instead, GSM transmits a temporary identifier (TMSI), which is newly assigned by the VLR after each location update.  Additionally, the VLR can change the TMSI at any time.
  • 12.  User identity confidentiality on the radio access link ◦ temporary identities (TMSIs) are allocated and used instead of permanent identities (IMSIs)  Helps protect against: ◦ tracking a user’s location ◦ obtaining information about a user’s calling pattern IMSI: International Mobile Subscriber Identity TMSI: Temporary Mobile Subscriber Identity
  • 13.  The GSM cipher A5/2 ◦ A5/2 is now so weak that the cipher key can be discovered in near real time using a very small amount of known plaintext
  • 14.  No requirement of decrypting skills  Need a instrument that captures microwave  Gains control of communication between MS and intended receiver
  • 15.
  • 16. • Design only provides access security - communications and signalling in the fixed network portion aren’t protected • Design does not address active attacks, whereby network elements may be impersonated • Design goal was only ever to be as secure as the fixed networks to which GSM systems connect • Short key size of Kc (64 bits) makes it more vulnerable to various attacks
  • 17.  Mutual Authentication • provides enhanced protection against false base station attacks by allowing the mobile to authenticate the network  Data Integrity • provides enhanced protection against false base station attacks by allowing the mobile to check the authenticity of certain signalling messages  Network to Network Security • Secure communication between serving networks. MAPSEC (Mobile Application Part Securit) or IPsec can be used
  • 18.  Wider Security Scope • Security is based within the RNC rather than the base station  Flexibility • Security features can be extended and enhanced as required by new threats and services  Longer Key Length • Key length is 128 as against 64 bits in GSM
  • 19. HLRHLR AuCAuC Access Network (UTRAN) Visited Network User Equipment D RNCBTSUSIMUSIM MEME SGSNSGSN H MSCMSC Home Network (2) Authentication (1) Distribution of authentication vectors (4) Protection of the access link (ME-RNC) (3) CK,IK (3) CK, IK MSC – circuit switched services SGSN – packet switched services
  • 20.  Mutual Authentication between user and the network  Establishes a cipher key and integrity key  Assures user that cipher/integrity keys were not used before, thereby providing protection against replay attacks
  • 21.  Protection of some radio interface signalling • protects against unauthorised modification, insertion and replay of messages • applies to security mode establishment and other critical signalling procedures  Helps extend the influence of authentication when encryption is not applied  Uses the 128-bit integrity key (IK) derived during authentication  Integrity applied at the Radio Resource Control (RRC) layer of the UMTS radio protocol stack • signalling traffic only
  • 22.  Data on the radio path is encrypted between the Mobile Equipment (ME) and the Radio Network Controller (RNC) • protects user traffic and sensitive signalling data against eavesdropping • extends the influence of authentication to the entire duration of the call  Uses the 128-bit encryption key (CK) derived during authentication
  • 23.  No security for communication between network elements in GSM  Easy to gain access to sensitive information such as Kc  Network Domain Security in UMTS foils these attacks
  • 24. UMTS builds upon security mechanisms of GSM, and in addition provides following enhancements:  Encryption terminates at the radio network controller  Mutual authentication and integrity protection of critical signalling procedures to give greater protection against false base station attacks  Longer key lengths (128-bit)  Network Domain Security using MAPSEC or IPSec
  • 25.  GSM-Security: a Survey and Evaluation of the Current Situation, Paul Yousef, Master’s thesis, Linkoping Institute of Technology, March 2004  UMTS security, Boman, K. Horn, G. Howard, P. Niemi, V. Electronics & Communication Engineering Journal, Oct 2002, Volume: 14, Issue:5, pp. 191- 204  "Evaluation of UMTS security architecture and services“, A. Bais, W. Penzhorn, P. Palensky, Proceedings of the 4th IEEE International Conference on Industrial Informatics, p. 6, Singapore, 2006  UMTS Security, Valtteri Niemi, Kaisa Nyberg, published by John Wiley and Sons, 2003  GSM: Security, Services, and the SIM Klaus Vedder, LNCS 1528, pp. 224- 240, Springer-Verlag 1998