Sie sind auf Seite 1von 25

Mobile Communication and Mobile Computing 41

Mobile Radio Networks:


Overview
Mobile Communication and Mobile Computing 42

Development of Mobile Radio


General technological development
in mobile telephony Satellite systems (LEO)

UMTS
4G

GSM Phase II+

Digital cellular
Networks...1800 Mhz

Digital cellular
Networks...900 Mhz

Anal. cellular
Networks...900 Mhz

Anal. cellular
Networks...450 Mhz

Analog
Networks...150Mhz

before 1970 1970 1980 1990 2000 2005 2010


Mobile Communication and Mobile Computing 43

Correspondent data rates


10Mbit/s
UMTS
(pico cell)
DAB
1Mbit/s
DECT
EDGE
HSCSD/
100kbit/s GPRS UMTS
(macro cell)

10kbit/s GSM
Satellites
Satelliten (GEO)

1995 2000 2005 2010


Mobile Communication and Mobile Computing 44

Frequency Assignment
Circuit Switched Radio Mobile Phones Cordless Phones Wireless LANs

TETRA NMT TETRA CT2 CT1+ GSM900 CT1+ GSM900

380-400 453-457 450-470 500Mhz 864-868 885-887 890-915 930-932 935-960 1GHz
410-430 463-467 (nationally different)

TFTS (Pager, aircraft phones) GSM1800 TFTS GSM1800 DECT UMTS

1670-1675 1710-1785 1800-1805 1805-1880 1880-1900 (1885-2025


2110-2200)
WLAN IEEE 802.11a: 5,15-5,25; 5,25-5,35; 5,725-5,825
IEEE 802.11b Bluetooth HIPERLAN1 HIPERLAN2 HIPER-Link

MHz
2400-2483 2402-2480 5176-5270 (ca.5200,5600) (ca.17000)
2412-2472
HomeRF...(approx.2400) Notes: - 2,4 GHz license free, nationally different
- () written : Prognoses!
TFTS - Terrestrial Flight - today speech over license free frequencies up to
Telephone System 61Ghz -> interesting for high data rates
Mobile Communication and Mobile Computing 45

GSM: Global System for


Mobile Communications
Mobile Communication and Mobile Computing 46

GSM: Properties
• cellular radio network (2nd Generation)
• digital transmission, data communication up to 9600 Bit/s
• Roaming (mobility between different network operators,
international)
• good transmission quality (error detection and -correction)
• scalable (large number of participants possible)
• Security mechanisms (authentication, authorization, encryption)
• good resource use (frequency and time division multiplexing)
• integration within ISDN and fixed network
• standard (ETSI, European Telecommunications Standards Institute)
Mobile Communication and Mobile Computing 47

GSM: structure
Fixed network Switching Subsystems Radio Subsystems
OMC

Data VLR HLR AuC EIR


networks
MS
(G)MSC BSC BTS

PSTN/
BTS
ISDN MS
Call Management
Network Management BSS MS

AuC Authentication Centre MS Mobile Station


BSS Base Station Subsystem (G)MSC (Gateway) Mobile Switching Centre
BSC Base Station Controller OMC Operation and Maintenance Centre
BTS Base Transceiver Station PSTN Public Switched Telephone Network
EIR Equipment Identity Register VLR Visitor Location Register
HLR Home Location Register ISDN Integrated Services Digital Network
Mobile Communication and Mobile Computing 48

GSM: Structure
Operation and Maintenance Centre (OMC)
• logical, central structure with HLR, AuC und EIR
Authentication Centre (AuC)
• authentication, storage of symmetrical keys, generation of
encryption keys
Equipment Identity Register (EIR)
• storage of device attributes of allowed, faulty and blocked
devices (white, grey, black list)
Mobile Switching Centre (MSC)
• networking centre, partially with gateways to other networks,
assigned to one VLR each
Base Station Subsystem (BSS): technical radio centre
• Base Station Controller (BSC): control centre
• Base Transceiver Station (BTS): radio tower / antenna
Mobile Communication and Mobile Computing 49

GSM: protocols, incoming call


(4)
BSS VLR (3) HLR

(8) (7) (6)


(11) (10) (4) (2)
(8) (8)
(5) (1) PSTN/
(9) BSS
BSS
(9) MSC GMSC
ISDN
(12) (12)
(8)

BSS

(1) Call from fixed network was switched via GMSC


(2) GMSC finds out HLR from phone number
(3) HLR checks whether participant is authorized for corresponding service
and asks for MSRN at the responsible VLR
(4) MSRN will be returned to GMSC, can now contact responsible MSC
Mobile Communication and Mobile Computing 50

GSM: protocols, incoming call


(4)
BSS VLR (3) HLR

(8) (7) (6)


(11) (10) (4) (2)
(8) (8)
(5) (1) PSTN/
(9) BSS
BSS
(9) MSC GMSC
ISDN
(12) (12)
(8)

BSS

(5) GMSC transmits call to current MSC


(6) ask for the state of the mobile station
(7) Information whether end terminal is active
(8) Call to all cells of the Location Area (LA)
(9) Answer from end terminal
(10 - 12) security check and connection setup
Mobile Communication and Mobile Computing 51

GSM: protocols, outgoing call

BSS VLR HLR

(4) (3)

(1) (2) (5)


BSS

BSS MSC GMSC

(1) Connection request


(2) Transfer by BSS
(3-4) Authorization control
(5) Switching of the call request to fixed network
Mobile Communication and Mobile Computing 52

Radio structure
1 TDMA-Frame, 144 Bit in 4,615 ms

8 TDMA-channels, together 271 kBit/s including


error protection information

124 radio frequency channels (carrier), each 200 kHz

downlink
890 915 MHz
uplink
935 960 MHz
2 frequency bands, for each 25 MHz, divided into radio cells

• One or several carrier frequencies per BSC


• Physical channels defined by number and position of time slots
Mobile Communication and Mobile Computing 53

GSM: channel strucure


Traffic Channel
• speech- / data channel (13 kbit/s brutto; differential encoding)
• Half-rate traffic channel: for more efficient speech encoding with
7 kbit/s
Control Channel
• Signal information
• Monitoring of the BSCs for recognition of handover
Broadcast Control Channel
• BSC to MS (identity, frequency order etc.)
Random Access Channel
• Control of channel entry with Aloha-procedure
Paging Channel
• signalize incoming calls
Mobile Communication and Mobile Computing 54

Databases
Home Location Register (HLR), stores data of participants which
are registered in an HLR-area
– Semi-permanent data:
• Call number (Mobile Subscriber International ISDN Number) - MSISDN,
e.g. +49/171/333 4444 (country, network, number)
• identity (International Mobile Subscriber Identity) - IMSI: MCC = Mobile
Country Code (262 for .de) + MNC = Mobile Network Code (01-D1, 02-
Vodafone-D2, 03-eplus, 07-O2) + MSIN = Mobile Subscriber
Identification Number
• Personal data (name, address, mode of payment)
• Service profile (call transfer, Roaming-limits etc.)
– Temporary data:
• MSRN (Mobile Subscriber Roaming Number) (country, net, MSC)
• VLR-address, MSC-address
• Authentication Sets of AuC (RAND (128 Bit), SRES (128 Bit), KC
(64Bit))
• billing data
Mobile Communication and Mobile Computing 55

Databases
Visitor Location Register (VLR)
• local database of each MSC with following data:
– IMSI, MSISDN
– service profile
– accounting information
– TMSI (Temporary Mobile Subscriber Identity) - pseudonym for data
security
– MSRN
– LAI (Location Area Identity)
– MSC-address, HLR-address
Mobile Communication and Mobile Computing 56

GSM: Location areas


MSC-area = VLR-area
Handover
Location Area (LA)

radio- with
cell BTS

LA = smallest
addressable unit
Mobile Communication and Mobile Computing 57

Cooperation of HLR, VLR


HLR

MSC-area
VLR

Location
advantage of the architecture: area
Location Update in case of
limited mobility only at VLR,
rarely at (perhaps very remote)
HLR
Mobile Communication and Mobile Computing 58

Localization at GSM
VLR 10 VLR 9 HLR 26
IMSI LA 2 32311 VLR 9 IMSI

z.B. 0x62F220 01E5

LA 3 +49 0177-26 32311


LA 2
participant call number
in HLR

LA 5 Internal area
LA 3
Network provider

country code
Mobile Communication and Mobile Computing 59

Data transmission
• each GSM-channel configurable as a data channel; similar structure like
ISDN-B and -D-channels
• data rates up to 9600 bit/s
• delay approximately 200 ms
• speech channels have higher priority than data channels
• kinds of channels:
– transparent (without error correction; however FEC; fixed data rate; error rate 10-3
up to 10-4)
– non-transparent (repeat of faulty data frames; very low error rate, but also less
throughput)
• Short-Message-Service (SMS)
– connectionless transmission (up to 160 Byte) on signaling channel
• Cell Broadcast (CB)
– connectionless transmission (up to 80 Byte) on signaling channel to all
participants, e.g. for location based services
Mobile Communication and Mobile Computing 60

Data transmission - structure

BSC MSC IWF

UDI
ISDN
BTS Modem
TA

PSTN

Internet Modem

IWF - Inter Working Function


UDI - Unspecified Digital
TA - Terminal Adapter
Mobile Communication and Mobile Computing 61

Security aspects:
Subscriber Identity Module (SIM)
Chip-card (Smart Cart) to personalize a mobile
subscriber (MS):
• IMSI (International Mobile Subscriber Identity)
• symmetric key Ki of participant, stored also at AuC
• algorithm “A3” for Challenge-Response-Authentication
• algorithm “A8” for key generation of Kc for content data
• algorithm “A5” for encryption
• PIN (Personal Identification Number) for access control
Temporary data:
• TMSI (Temporary Mobile Subscriber Identity) - pseudonym
• LAI (Location Area Identification)
• Encryption key Kc
Mobile Communication and Mobile Computing 62

Security aspects:
MS
Authentication
MSC, VLR, AuC
Ki max. 128 Bit

Authentication Request Random number


A3 RAND (128 Bit) generator

Ki

A3

SRES

Authentication Response
SRES (32 Bit) =
• Location Registration
• Location Update with VLR-change
• Call setup (in both directions)
• SMS (Short Message Service)
Mobile Communication and Mobile Computing 63

Security aspects: Session Key


MS Network
Ki

Authentication Request Random number


A8 RAND (128 Bit)
generator

Kc 64 Bit
Ki

A8
• Key generation: Algorithm A8
– Stored on SIM and in AuC
Kc
– one way function parameterized with Ki
– no (Europe, world wide) standard
– can be determined by network operator
– Interfaces are standardized
Mobile Communication and Mobile Computing 64

Security aspects: encryption at the


Radio interface
MS Net
TDMA-frame- Ciphering Mode Command TDMA-frame-
K number number Kc
c

A5 A5
Key block
Ciphering Mode Complete
+ +
Plain text block Encrypted Text Plain text block

114 Bit

• Data encryption through algorithm A5:


– stored in the Mobile Station
– standardized in Europe and world wide
– weaker algorithm A5* or A5/2 for specific countries
Mobile Communication and Mobile Computing 65

GSM-Security: assessment
• cryptographic methods secret, so they are not „well
examined“
• symmetric procedure
– consequence: storage of secret user keys with
network operators required
• low key length Ki with max. 128 Bit (could be hacked by
using Brute Force Attack in 8-12 hours)
• no mutual authentication
– consequence: Attacker can pretend a GSM-Net
• no end-to-end encryption
• no end-to-end authentication
• Key generation and -administration not controlled by the
participants

Das könnte Ihnen auch gefallen