Title: Version 1'1
1Security and Fraud in mobile networks
- Scope of following notes
- In context of the assignment
- Issues with mobile security
- Devices looking after the device
- Solutions
- Security in mobile applications
- Authentication of transactions
- Electronic payments
- Conclusion
- Implementing a security policy/correct
installation
2Context of assignment
- You will be expected to include discussions of
the physical limitations/implications of the
technologies, suitability of devices, and
security of data and safety issues in the context
of the research task - And so some consideration of security measures
for the scenario is expected
3Mobile security why a target?
- usually to eavesdrop on user data
- send the user information that he subsequently
believes to originate from a genuine network - user with whom he is connected through that
network - Malware downloads
4Issues with mobile security
- Discuss Issues
- Very much in the news recently ltunderstatementgt
see recent BBC news snippets - The need to secure mobile devices and systems
- Protect data often called LOCK DOWN
- Safeguard privacy
- Control the use of PDAs/Laptops/mobile/USB sticks
- Mislaid
- Theft of devices
- Devices may contain data e.g. customer data
- After all the idea is to put detailed data on the
devices
5Solutions include
- Theft of devices
- The kill pill to wipe the device
- This may not be as easy as it sounds
- Device may have to communicate with the mobile
server - If the SIM is taken out then the device is out of
contact with the server - Encryption on the mobile device and
communications between the device and mobile
server - Choice of encryption software?
- Example Pointsec see picture passwords and the
diagrams are of interest the product can be
customised as well
6Mobile Security 1g to 3g
- First generation analogue mobile
- simple electronic serial number to confirm that
the terminal should be allowed access to the
service - It was not long before the protection afforded to
this number was broken - Second generation systems such as GSM were
designed from the beginning with security in mind - The Home Environment operator can control the use
of the system by the provision of the Subscriber
Identity Module (SIM) which contains a user
identity and authentication key - The security model can be detailed as
- Authentication
- Charging
- Privacy
7GSM/GPRS security measures
- Authentication
- one-way authentication based on long-term shared
key between user's SIM card and the home network - Charging
- network operator is trusted to charge correctly
based on user authentication - Privacy various techniques available
- Data - link-level encryption over the air
- identity/location/movements
- use of temporary identifiers (TMSI) reduce the
ability of an eavesdropper to track movements
within a Public Land Mobile Network (PLMN) - network can ask the mobile to send its real
identity (IMSI) on synchronization failure, on
database failure, or on entering a new PLMN - network can also page for mobiles using IMSI
(IMEI sim card equivalent) - An IMSI is usually fifteen digits long. The first
three digits are the Mobile Country Code, and the
next digits are the Mobile Network Code. - http//www.theregister.co.uk/2001/03/27/imei_numbe
rs_no_antidote/ discount the use of the IMEI as
being effective
83G UMTS enhancements
- The 3G system has developed a new security
architecture specifically to be used in UMTS
the successor to GPRS - Authentication
- support for mutual authentication
- Charging
- same as in GSM/GPRS
- Privacy (more detail available from this source
ltLinkgt - data
- some support for securing core network signaling
data - increased key sizes
- identity/location/movements
- enhanced user identity confidentiality using
"group keys" - a group key is shared by a group of users
9Types of security attacks
- Impersonation of a user.
- intruder sends signalling and/or user data to the
network, in an attempt to make the network
believe they originate from the target user. - Impersonation of the network.
- the intruder sends signalling and/or user data to
the target user, in an attempt to make the target
user believe they originate from a genuine
network. - Man-in-the-middle.
- the intruder puts itself in between the target
user and a genuine network and has the ability to
eavesdrop, modify, delete, re-order, replay, and
spoof signalling and user data messages exchanged
between the two parties. - Compromising authentication vectors in the
network. - The intruder possesses a compromised
authentication vector, which may include
challenge/response pairs, cipher keys and
integrity keys. This data may have been obtained
by compromising network nodes or by intercepting
signalling messages on network links.
10Contd - Smishing
- Phishing equivalent on mobile devices
- Text message suggesting user has signed up for a
service and will be charged until they cancel
using a web site - Web site prompts the user to click on a link
which triggers the download of a trojan horse - Link
11Contd Denial of service
- User de-registration/location update request
spoofing - An attack that requires a modified mobile signal
(MS) and exploits the weakness that the network
cannot authenticate the messages it receives over
the radio interface. The intruder spoofs a
deregistration request to the network. The
network de-registers the user from the visited
location area and instructs the HLR to do the
same. The user is subsequently unreachable for
mobile terminated services. - Camping on a false base station (BS)
- An attack that requires a modified BS and
exploits the weakness that a user can be enticed
to camp on a false base station. Once the target
user camps on the radio channels of a false base
station, the target user is out of reach of the
paging signals of the serving network in which he
is registered.
12Contd Identity catching
- An attack that requires a modified MS and
exploits the weakness that the network may
sometimes request the user to send its identity
in clear text. - The use of temporary identities allocated by the
serving network makes passive eavesdropping
inefficient since the user must wait for a new
registration or a mismatch in the serving network
database before he can capture the users
permanent identity in plain text. - The 3G techniques mentioned earlier counteracts
this attack by using an encryption key shared by
a group of users to protect the user identity in
the event of new registrations or temporary
identity database failure in the serving network.
13Management of Communications security
- Access Control to prevent any access to any
session requester unless identified and
authenticated - Accountability and Audit
- generate a security log containing information
sufficient for after-the-fact investigation of
loss or impropriety - Access to Home Location Register (HLV),
Authentication Centre (AuC) and Mobile Switching
Centre (MSC) should be limited - The management of potential fraud is covered in
the section for this week on the MCCS schedule.
14Conclusion
- Mobile security issues are concentrate on the
Integrity, confidentiality and authentication of
the networks and users. - Access and use of service to avoid or reduce a
legitimate charge. - Loss of confidentiality or integrity of a users
or operators data - Denial of a specific users access to their
service or denial of access by all users to a
service
15Other references
- All useful for the assignment
- McAfee Mobile Security
- Kaspersky Mobile Security
- Great white paper on the subject