Sie sind auf Seite 1von 9

User Requirements for Security in

Wireless Mobile Systems Derek Babb,


Director, Hoadlands
Abstract that the portable device used by end users is Consultants Ltd 20
sharing its wireless interface space with Hoadlands, Petersfield,
Security of wireless mobile systems other users. This is one of the most widely Hampshire, GU31 4PF,
continues to be a hot topic; now generating discussed aspects of security on wireless UK. Email
its own conferences and platforms, such as systems. As reported in earlier issues of this derek@hoadlands.co.uk,
the recent 2nd IEE Secure Mobile journal and elsewhere, wireless systems in web
Communications held by the IEE on 23 some scenarios also raise the issues of www.hoadlands.co.uk
September 2004. The general discussion on identity management and user location.
Hoadlands Consultants
security in wireless systems takes place in
Ltd offers a specialist
technical fora, and while this is a totally This paper looks at mobile wireless
Consultancy in Wireless
valid discussion, it sometimes seems to be systems (a European view) and tries to
Technology, Research and
taking place in isolation. From the user extract some user requirements which
Development. Derek has
perspective the wireless system usually actually apply to both the wireless systems
over 20 years research,
forms part of a larger, interconnected and the end to end system. Some
technology and
system. This paper raises the question, requirements for wireless systems are
engineering experience in
“What about the user?” and offers some derived from their nature, and the fact that
mobile and wireless
views on the user requirements on this most wireless communications take place in
telecommunication
important part of system design where open, shared space.
systems, mainly in
people are one end of the chain which
user/mobile equipment
involves wireless and other systems. 2. The user equipment wireless technology. He
has had roles in all parts
1. Introduction I am going to start this paper with a
of product development
quick overview of the equipment that an
life cycles from research
The world of wireless connectivity for users end user may use, and a brief look at the
through to customer
continues to grow, both in the domain of features offered by such equipment, before
support. His previous
wireless public telecommunications (mobile moving in to a more detailed look at the
employers include
phones) and wireless hot spots (such as User Requirements for security.
Samsung Electronics
802.11 Wireless LANs), which can either be
Research Institute,
public, such as those provided in hotels, The term “User Equipment” has a
Ericsson Mobile
coffee shops and other public places; or specific meaning as defined by the Third
Platforms, Plessey
private, as seen in homes and offices. The Generation Partnership Project (3GPP)
Military Communications
first security problem that is introduced by which is – User Equipment: A device
and the BBC.
these types of wireless system in general is allowing a user access to network services.

Table 1: Examples of mobile user equipment

Standard mobile phone


Wireless systems The possibilities here are growing, and start with Public Land Mobile systems
(any one of, or usually a combination of 2G, 2.5G and 3G).
Many devices also have Bluetooth.and some now have been announced that
will also have WLAN (IEEE 802.11).

Possible uses (features) Voice calls, message calls (such as SMS/text messages), data calls, download
audio clips, video clips, ring tones and screen savers/wallpapers. Play audio
(typically MP3) and video clips. Play single user and multi user games. Take
pictures with in built camera, send and receive digital images (photographs).

Picture courtesy SonyEricsson

1363-4127/04/© 2004, Elsevier Ltd 51


Mobile Security

Advanced Mobile Phone or PDA


Wireless systems These two devices are now becoming very close as the product
technologies start to merge.
The mobile phone derived PDA would always have the relevant Public
Land Mobile systems (i.e.2G, 2.5G and / or 3G), and usually
Bluetooth.
The PDA which comes from the non mobile phone market would
typically have either WLAN (IEEE 802.11) and / or Bluetooth, but the
possibilities here are growing, and from the user perspective
differentiation of some of these products is difficult.

Possible uses (features) The main features of these products are that they are essentially
small PCs with limited functions. You would expect the user interface
to be supplied via a small windows type environment such as
Symbian OS, Nokia Series 60/80, Palm OS, Linux or Microsoft
Windows Mobile for Pocket PC (others exist). This enhances all the
non-telephony features and introduces light versions of standard
applications such as word processors and spreadsheets.
Depending on the heritage of the device, either the mobile phone
part or a WLAN part would be built in as standard, with other
interfaces available as options.

Pictures courtesy SonyEricsson and Dell Inc

Standard Notebook Computer


Wireless systems Primarily people associate WLAN (IEEE 802.11) interfaces with
notebooks. Some also have Bluetooth built in or it can be easily added
as a plug in device.
The addition of Public Land Mobile systems (i.e.2G, 2.5G or 3G), is
usually done in one of two ways, either by using your existing mobile
phone as a modem for the notebook OR adding a dedicated hardware
modem card with inbuilt mobile phone.

Possible uses (features) The prime feature set for this type of device is of course as a portable
PC. As it is portable, the early addition of WLAN was purely to enable
connection to (usually corporate) networks without having to hunt
around for a data cable and network point. For users who left the
office, using mobile phone or fixed line modems to access essential
(again usually corporate) services remotely has been a common
practice. The introduction of both 3G mobile phones and public
WLAN hotspots gives greater flexibility for remote working.
Traditionally voice calls would be made using a phone, but the
introduction of Voice over IP (VoIP) services means that you can now
use this device for making phone calls if you have a network
connection.

Picture courtesy Dell Inc

52 Information Security Technical Report. Vol. 9, No. 4


Derek Babb User requirements for security in wireless mobile systems

For the purpose of 3GPP specifications the make efficient use of the same radio system,
interface between the UE and the network is the underlying access protocols have to have
the radio interface. a way of sharing the radio resource between
the users, and this means that at some level
The full vocabulary for 3GPP Terms and either the system, or the user equipment
Abbreviation can be found by following the (for efficiency, both) have to have some
link from the 3GPP home page at basic knowledge of other users. This gives
http://www.3gpp.org/ . our first user requirement.

3. What changes do wireless User Requirement 1


systems bring?
In a wireless system where the underlying
When conducting a commercial transaction, radio protocols have to have some
either in a shop, over the phone (mobile or (technical) knowledge of my user
wired) or using a PC on the internet, most equipment and status, this knowledge shall
users would view their data as passing not compromise my personal required
through closed or even private systems. security status (this may include position,
Some may think a little about the internet equipment status and other attributes).
and the possibility of someone looking at
your transaction data (credit card number, But of course, that is not the entire
account details etc.) but in general today a picture, particularly for mobile phone
large majority of people tend to trust the systems, where actually there are many base
security of our telephony systems, and even stations and a single user would normally
the internet. be in range of several of these. So in the
final figure, Figure 3 below, we are getting
Figure 1 below shows a very simple closer to reality, the dotted lines show a
picture of a single mobile wireless user and possible second base station and its
a single mobile phone base station or access
point; at this point I am not concerned
about the rest of the system which sits
behind the base station.

In reality, however, there will be many


users using the same wireless system in the
same geographic area, as shown in Figure 2
below. Note that not all the users can access
the base station or access point in the
diagram below, but their sphere of possible
influence still includes our main user (the
one shown in black outline), and within
that sphere they have the possibility to
perhaps listen to the traffic our user is
sending and receiving.

In simple terms, this leads to an


interesting point about mobile wireless
systems, in order for a number of users to Figure 1 – Simple mobile wireless user view of system

Information Security Technical Report. Vol. 9, No. 4 53


Mobile Security

coverage area, which includes our main user


but only some of the other users. A last
point to note is the way I have drawn these
diagrams, not the usual circles or regular
polygons which are often seen in
presentations, but irregular shapes, which is
more representative of real life. Also these
shapes (areas of radio coverage) may not be
constant either, but that’s a topic for
elsewhere.

To summarise, the interesting property


that wireless mobile systems introduce,
from the security point of view, is that
many users will be sharing the same radio
spectrum and access protocol, and that the
number of users and where they appear in
the radio systems is constantly changing as
the users move around. In theory at least,
anybody who is in the right geographic
place can listen in to the radio system and
record or analyse the data. This leads to our
Figure 2 – complex scenario – multiple users next user requirement.

User Requirement 2

A mobile wireless system shall provide the


user with enough security measures so that
another (rogue) user can not listen to the
radio transmission and find out what the
user is doing (note there are some
government / legal limitations to the extent
of this, and how and where these measures
are applied is not relevant to the user).

4. Current Mobile Wireless


security
A few words on where we are now, in
terms of the widest used systems,
GSM/GPRS and IEE802.11 based WLAN
systems. From most users’ point of view,
GSM/GPRS appears to be pretty secure,
and it’s been around quite a while now, and
while 802.11 WLANs have had a slightly
bumpy ride on the security front, their
Figure 3 – complex scenario – multiple users and multiple base stations widespread use perhaps raises a question

54 Information Security Technical Report. Vol. 9, No. 4


Derek Babb User requirements for security in wireless mobile systems

about how users view security of • Serious intruders who are spending time
information. within radio range of the access point
and are intent on stealing data from you;
GSM / GPRS and the up coming
European UMTS systems WCDMA have • People who have time on there hands and
well documented security systems in place. I are doing it “because they can”;
don’t plan to go in to great details here,
except to say that even though the GSM I also found many articles from 2004
security mechanism have been (quite which were based on people who I would
rightly) hailed as a success, even they are suggest fit in the second category above,
not completely free from threat. This was searching for Wireless LAN Access Points
discussed at the recent “2nd IEE Secure in urban areas, typically offices. Despite all
Mobile Communications Forum – the publicity, something between 30% and
Exploring the Technical Challenges in 50% of the access points found
Secure GSM and WLAN, held by the IEE (depending on which report you read), still
on 23 September 2004”. DID NOT have WEP turned on, and were
therefore letting their raw IP based
We all are probably well aware of the company data be freely listened to by
situation that the 802.11 community left us anyone who wanted to. There were
with when their very brave attempt at secondary reports about the admin login
Wireless Equivalence Privacy (WEP) to and password for these Access Points (each
make wireless systems, in particularly Access Point has its own internal
802.11 based Wireless LAN’s as safe as a administration feature which sets up IP
wired system, was found to be not quite as functions, the WEP keys and many other
good as first thought. However, there is a features), which were not numerically
fix for this in terms of WiFi Protected reported, but leaving the password set at
Access (WPA), and there is a follow up any default for the manufacturer can only
plan in progress which will introduce WiFi occur (in my personal experience) if the
Protected Access 2 (WPA2) also known as unit has been switched on and not
802.11i in the IEEE standards groups configured at all.
(which can be found via the IEEE pages at
http://www.ieee.org/ ). This will add, This leads to my next important point;
amongst other things, Advanced this paper is all about User Requirements.
Encryption Standard (AES) to the wireless My personal view is that WLANs are
air interface. great, should be more widely used than
they are, and in commercial use they
While researching this paper I came should be up to WPA standard BUT they
across an interesting fact relating to WEP. must be shipped so that these features are
While it does have a problem (which turned on from day one. There are many
everybody talks about) it is actually a time issues here; a default security setting is as
based problem (you have to be in the right bad as no setting at all, as the default
place, locked on to the right radio becomes public knowledge very quickly.
frequency and have bit stream Contrast this with the European mobile
synchronisation to capture and decode a phone systems GSM and WCDMA, plug a
new user as they log on to an Access Point), SIM (or USIM) card in, switch it on, and
this immediately means that the people who off you go, security systems enabled and
can do this are probably either: working (as well as the billing and account

Information Security Technical Report. Vol. 9, No. 4 55


Mobile Security

settings), additional user features such as a generally an extension of the legislation


power on PIN code are about misuse of the used to govern the wired telephony
mobile phone, such as theft, not about the networks.
security of the wireless systems!
There are a number of user scenarios for
I don’t think it matters how good the voice calls, but they all have some common
improved security on the upgrades to 802.11 elements, they are essentially closed systems
are, if the users have to do things to enable (such as a mobile phone network)
it, there will be many who won’t… Even connecting to another closed system (which
then I suspect that those who do switch could be another mobile network, or one of
security on don’t take the second well the wired telephone networks).
documented step of changing settings
regularly to maintain security. They have some unique features as well,
emergency calls being one feature that we
User Requirement 3 all take for granted. The second feature is
that we all believe that in general terms
Wireless equipment that has security nobody else can in some way tap in to the
systems or settings will be automatically systems except with the help of the network
enabled and configured for use from first provider (wired or wireless) and a legal
use “out of the box” without user document which has been provided by a
intervention. court to allow this “eavesdropping” to
take place.
User Requirement 4
There is however a large debate going on
During normal use of user equipment the about how you implement these features in
user will not have to make manual Voice over IP systems, which can be
adjustments to security settings. successfully used on a notebook from a
public 802.11 wireless hotspot. What is the
A final note on this subject, even though difference between these and using a mobile
WEP has been given some bad press, this phone? User security has to include the
has had little impact on the sales of WLAN ability of the user to phone for help if you
equipment as various figures showed growth have any sort of telephony system, so this
in WLAN systems of between 30% and one is a personal requirement which is
40% in 2003, depending on whether you about consistency.
measure units shipped or turnover.
Significant growth is predicted in 2004. User Requirement 5

5. A quick look at wireless mobile There shall be consistent methods across


voice calls mobile wireless voice systems (including
Voice over IP telephony) of sending
The majority of the early growth of emergency calls.
wireless mobile phones has been in voice
traffic, person to person voice calls. This last requirement could go either of
Certainly in Europe if we concentrate on 2 ways in practice, we could perhaps relax
GSM then mobile phones have been an the systems on mobile phones or increase
extension of the fixed phone network, and the systems on VoIP or have a new system.
have been governed by legislation which is

56 Information Security Technical Report. Vol. 9, No. 4


Derek Babb User requirements for security in wireless mobile systems

6. Changes in the last 1-2 • Take part in a video phone call, rather
years than a voice call;

The ability of users to spend money • Browse the internet.


while mobile has increased dramatically
over the last few years. For mobile There are a number of security
phone users there are new markets considerations here, based on the large
specifically attached to the increased number of accounting options available for
functions now available in mobile accessing these features. Let’s look at one
phones, including colour graphic screens example.
which support moving images and the
ability to play polyphonic musical tones 6.1 Downloading a new screen
rather than just ringing when you receive wallpaper
an incoming call. Additionally, there is
very successful commercial linkage If this is from the mobile service provider,
between wireless broadcast media then typically this is paid for from the same
(radio and TV) and mobile phone account as the mobile phone, so in essence
users in the introduction of text voting the entire transaction stays within that
to supplement standard fixed line mobile network, even though a number of
telephone voting. This is a short list separate parts of that network will be
of the ways to spend money with, involved (including user authentication,
and on your mobile phone (should accounting and the web site where the
you choose…): downloads are being held).

• Text messaging (including requests to TV If this is done from a third party


and radio stations); provider, then a commercial transaction has
to take place first, usually providing a credit
• Text voting (TV and radio shows); card number over the voice channel,
followed by download of the wallpaper.
• Download ring tones; Another possibility is to browse the web,
order on the web and get them delivered
• Download screens savers; direct to your mobile.

• Download wallpapers; Which ever way you look at it, a number


of things are going on: selecting the
• Send and receive email; wallpaper, paying for it, and then delivery
to the mobile phone. The security issues are
• Upload / share / send pictures (digital about both wireless system security and end
photos); to end security. The user doesn’t want to get
the wrong wallpaper delivered to the wrong
• Download music (digital format MP3 phone and other users don’t want to collect
music); other people’s charges. This topic alone
expands to a paper in its own right, as the
• Download video clips (using digital options and sequences of events for
media player) such as news, movie clips, purchases and charging are large. At the top
sporting events); level let’s keep it simple, time for a another
user requirement;

Information Security Technical Report. Vol. 9, No. 4 57


Mobile Security

User Requirement 6 This is currently aimed at mobile phones


where the strong authentication provided by
The wireless mobile systems shall protect the SIM/USIM phone combination is used
sensitive user data such as credit card and in conjunction with a further new device
billing details from being made available to called a Wireless Identity Module, or WIM.
other or incorrect users or providers. This will provide the user with a WIM
enabled wireless mobile device with an
On a Notebook PC connected to the electronic wallet which can be used in a
internet at a hot spot, a user can pretty well variety of ways to pay for goods and
use all of the features listed for a mobile services, the advantage being that the user
phone as well, but has a slightly different does not need to hand over a card or type a
set of security issues which are related more PIN on a vendor’s terminal. Instead they
to the way that accounting is done for send the money from their mobile phone
service provision. If you use a PC at a wallet to the vendors account. Again this
wireless mobile hot spot, then you currently system uses a large range of features such as
pay for the wireless service only, not any a secure transport layer, a PKI
additional services. If you need to download infrastructure, and a transaction structure
or upload items, or even make a purchase, which allows for all the possible failings of
this is typically done via a web browser a mobile wireless system, and delivery via a
using its own secure mode, that very nice number of air interfaces.
little “padlock” symbol at the bottom right
of a browser. In this sense the security 8. On the horizon
implications for the user are quite different
when compared to a mobile phone. You There are new technologies coming along
have to make a simple decision; can the which actually have significant (positive)
requirements stated in User Requirement 6 impact on the security of wireless mobile
above be fulfilled by the WLAN systems, systems. One such technology is beam
and the systems behind it? If so, then off forming systems such as those from
you go! Arraycomm ( http://www.arraycomm.com/ )
which can be implemented on any radio
There is a common problem for vendors system. Although this is primarily been
who sell services to people who are using designed to increase the efficiency of use of
wireless mobile systems, as previously radio spectrum, a by-product of these
noted, this has been addressed elsewhere, systems can be improved security of the
but the question they would like to ask is wireless part as the radio pattern is directed
“Is it really you?” and “Where are you?”. exclusively to the current user, rather than
This topic has a lot of interesting follow-on broadcast to many users as shown in my
work, again not enough space here. figures earlier in this article.

7. A new scenario for wireless 9. Proposed user requirements


mobile for security in wireless mobile
systems
I wanted to introduce one new scenario to
mobile wireless users; this is the idea of an This paper (and the associated research) has
electronic wallet which is being worked on looked at the wireless system as part of a
by the Open Mobile Alliance (OMA, at bigger system providing commercial services
http://www.openmobilealliance.org/ ). for users. Some facts are apparent:

58 Information Security Technical Report. Vol. 9, No. 4


Derek Babb User requirements for security in wireless mobile systems

• There are a number of wireless air make manual adjustments to security


interface systems, and the number and settings.
complexity is growing
User Requirement 5 – There shall be
• Wireless systems tend to form a part of consistent methods across mobile wireless
bigger systems; voice systems (including Voice over IP
telephony) of sending emergency calls.
• User Equipment is getting ever more
complex and new features are being added; User Requirement 6 – The wireless
mobile systems shall protect sensitive user
• Wireless systems, coverage and usage data such as credit card and billing details
continues to grow, when thinking about from being made available to other or
security in these systems, think long and incorrect users or providers.
hard, there will be more users and more
technology out there than you can I would like to add some derived
imagine, quicker than you thought! requirements based on the previous texts
which are;
Finally, to pull together the requirements
from this document in one place: User Requirement 7 – The true identity
of a mobile wireless user will only become
User Requirement 1 – in a wireless available (as distinct from an IP address or
system where the underlying radio protocols phone number) if the user has authorised it
have to have some (technical) knowledge of in some way or if it is required by and
my user equipment and status, this correctly authorised by a government body
knowledge shall not compromise my (debatable from the user perspective).
personal required security status (this may
include position, equipment status and User Requirement 8 – The location of a
other attributes). mobile wireless user will only be made
available if the user has authorised it in
User Requirement 2 –A mobile wireless some way (such as for an emergency
system shall provide the user with enough breakdown service to find you) or if it is
security measures so that another (rogue) required by and correctly authorised by a
user can not listen to the radio transmission government body (debatable from the user
and find out what the user is doing (note perspective).
there are some government / legal
limitations to the extent of this, and how User Requirement 9 – Security policies,
and where these measures are applied is not algorithms and implementation must be
relevant to the user). relevant to the activities a user performs and
should not affect the mobile wireless
User Requirement 3 – Wireless equipment significantly such as reduce
equipment that has security systems or effective battery life.
settings will be automatically enabled and
configured for use from first use “out of the From these top level requirements, a set
box” without user intervention. of detailed requirements and system designs
could be deduced to help set the future
User Requirement 4 – During normal use security systems for mobile wireless users.
of user equipment the user will not have to

Information Security Technical Report. Vol. 9, No. 4 59

Das könnte Ihnen auch gefallen