Beruflich Dokumente
Kultur Dokumente
and
its security infrastructure
Fataneh Safavieh
Mobile security Seminar,Bit,07.02.2011
Outline
2
Introduction:
some history & background
3
Mobile Evolution
Improvements in mobile communication
technology during the last two decades
The Mobile Broadband is as important as Internt
http://www.nsma.org/conf2008/Presentation/2-1045-Miyahara-LTE_Overview_NMSA%2021March08_final.pdf
4
User Expectations
Highly desire of broadband acces everywhere
1. Home, Office
2. Train, Aeroplane, Canteen, during the Breake
Ubiquity (anywhere, anytime)
Higher voice quality
Higher speed
Lower prices
Multitude of services
5
http://www.nsma.org/conf2008/Presentation/2-1045-Miyahara-LTE_Overview_NMSA%2021March08_final.pdf
3GPP
The 3rd generation partnership project
1. Europe ETSI
2. USA ATIS
3. China CCSA
4. Japan ARIB & TTC
5. Korea TTA
7
What is LTE?
The latest standard in the mobile network
technology tree
A project of 3GPP & mainly built on 3GPP
cellular systems family
May be referred as E-UTRA & E-UTRAN
Has advanced new radio interface
Circuit switched networksall-IP networks
Broadband connectivity on the move
100Mbps(DL), 50Mbps(UL), ~10 ms Latency
8
UMTS and LTE architecture
11
Security in the LTE-SAE Network
13
Authentication & key agreement
21
System architecture of H(e)NB
Operators
UE HNB insecure SeGW core
link network
22
Figure from draft TR 33.820
Common threats to H(e)NB
1. Physical tampering with H(e)NB
2. Fraudulent software update / configuration
changes
3. Denial of service attacks against core network
4. Eavesdropping of the other users UTRAN or
E-UTRAN user data
5. User cloning the H(e)NB authentication Token
From TR 33.820
23
Security requirements to H(e)NB
1. Unprotected data should never leave a secure domain inside
H(e)NB
2. Software updates and configuration changes for the H(e)NB shall
be cryptographically signed (by operator or H(e)NB supplier) and
verified configuration changes shall be authorized by H(e)NB
operator or supplier
3. Unauthenticated traffic shall be filtered out on the links between
the core network and the H(e)NB
4. New users should be required to explicitly confirm their
acceptance before being joined to an H(e)NB
5. H(e)NB authentication credentials shall be stored inside a secure
domain i.e. from which outsider cannot retrieve or clone the
credentials
From TR 33.820 24
References and Resources
25
References and Resources
A Long Term Evolution Downlink inspired channel
simulator using the SUI 3Channel Model, Thesis of
Sanjay Kumar Sarkar, August 2009
LTE The UMTS Long Term Evolution-
Sesia, Toufik, Baker (WILEY Publication) 2009
http://www.nsma.org/conf2008/Presentation/2-1045-
MiyaharaLTE_Overview_NMSA%2021March08_final.pdf
Towards Global Mobile Broadband A White Paper
from the UMTS Forum, February 2008
TS 33.401
26
References and Resources