SlideShare a Scribd company logo
Naveen Kumar
 GSM is the most widely used cellular standard
 Over 600 million users, mostly in Europe and Asia
 Provides authentication and encryption capabilities
 Today’s networks are 2G & 3G
 Future (4G LTE)
Home
network
Switching
and
routing
Other Networks
(GSM, fixed,
Internet, etc.)
Visited network
HLR/AuC
VLR
SIM
 Authentication
◦ network operator can verify the identity of the subscriber making
it infeasible to clone someone else’s mobile phone
 Confidentiality
◦ protects voice, data and sensitive signalling information
(e.g. dialled digits) against eavesdropping on the radio
path
 Anonymity
◦ protects against someone tracking the location of the user or
identifying calls made to or from the user by eavesdropping on
the radio path
 Three algorithms have been specified to provide
security services in GSM.
 A3 is used for authentication,
 A5 for encryption, and
 A8 for the generation of a cipher key
 For authentication, the VLR sends the random value
RAND to the SIM.
 The MS sends back the SRES generated by the SIM;
the VLR can now compare both values. If they are the
same, the VLR accepts the subscriber, otherwise the
subscriber is rejected.
 To ensure privacy .
All user-related data is encrypted. After authentication,
BTS (base transceiver station) and MS apply encryption
to voice, data, and signaling by applying the cipher key
Kc .
 Kc is generated using the individual key Ki and a random
value by applying the algorithm A8.
 This confidentiality exists only between MS and BTS, but
it does not exist end-to-end or within the whole GSM
network.
 Note that the SIM in the MS and the network both calculate the
same Kc based on the random value RAND. The key Kc itself is
not transmitted over the air interface.
 MS and BTS can now encrypt and decrypt data using the
algorithm A5 and the cipher key Kc.
 Kc should be a 64 bit key – which is not very strong, but is at least a
good protection against simple eavesdropping.
 However, the publication of A3 and A8 on the internet showed that in
certain implementations 10 bits out of 64 bits are always set to 0, so
that the real length of the key is thus only 54 consequently, the
encryption is much weaker.
 To provide user anonymity, all data is encrypted
before transmission, and user identifiers (which
would reveal an identity) are not used over the air.
 Instead, GSM transmits a temporary identifier
(TMSI), which is newly assigned by the VLR after
each location update.
 Additionally, the VLR can change the TMSI at any
time.
 User identity confidentiality on the radio access link
◦ temporary identities (TMSIs) are allocated and used instead of
permanent identities (IMSIs)
 Helps protect against:
◦ tracking a user’s location
◦ obtaining information about a user’s calling pattern
IMSI: International Mobile Subscriber Identity
TMSI: Temporary Mobile Subscriber Identity
 The GSM cipher A5/2
◦ A5/2 is now so weak that the cipher key can be
discovered in near real time using a very small amount
of known plaintext
 No requirement of
decrypting skills
 Need a instrument that
captures microwave
 Gains control of
communication between
MS and intended receiver
• Design only provides access security - communications and
signalling in the fixed network portion aren’t protected
• Design does not address active attacks, whereby network elements
may be impersonated
• Design goal was only ever to be as secure as the fixed networks to
which GSM systems connect
• Short key size of Kc (64 bits) makes it more vulnerable to various
attacks
 Mutual Authentication
• provides enhanced protection against false base station
attacks by allowing the mobile to authenticate the
network
 Data Integrity
• provides enhanced protection against false base station
attacks by allowing the mobile to check the authenticity
of certain signalling messages
 Network to Network Security
• Secure communication between serving networks.
MAPSEC (Mobile Application Part Securit) or IPsec can
be used
 Wider Security Scope
• Security is based within the RNC rather than the base
station
 Flexibility
• Security features can be extended and enhanced as
required by new threats and services
 Longer Key Length
• Key length is 128 as against 64 bits in GSM
HLRHLR AuCAuC
Access Network
(UTRAN)
Visited
Network
User
Equipment
D
RNCBTSUSIMUSIM MEME
SGSNSGSN
H
MSCMSC
Home
Network
(2) Authentication
(1) Distribution of
authentication vectors
(4) Protection of the
access link (ME-RNC)
(3) CK,IK (3) CK, IK
MSC – circuit switched
services
SGSN – packet switched
services
 Mutual Authentication between user and the
network
 Establishes a cipher key and integrity key
 Assures user that cipher/integrity keys were not
used before, thereby providing protection against
replay attacks
 Protection of some radio interface signalling
• protects against unauthorised modification, insertion and replay
of messages
• applies to security mode establishment and other critical
signalling procedures
 Helps extend the influence of authentication when
encryption is not applied
 Uses the 128-bit integrity key (IK) derived during
authentication
 Integrity applied at the Radio Resource Control (RRC)
layer of the UMTS radio protocol stack
• signalling traffic only
 Data on the radio path is encrypted between the Mobile
Equipment (ME) and the Radio Network Controller (RNC)
• protects user traffic and sensitive signalling data against
eavesdropping
• extends the influence of authentication to the entire duration of the
call
 Uses the 128-bit encryption key (CK) derived during
authentication
 No security for
communication
between network
elements in GSM
 Easy to gain access
to sensitive
information such as
Kc
 Network Domain
Security in UMTS
foils these attacks
UMTS builds upon security mechanisms of GSM, and in
addition provides following enhancements:
 Encryption terminates at the radio network controller
 Mutual authentication and integrity protection of critical
signalling procedures to give greater protection against false
base station attacks
 Longer key lengths (128-bit)
 Network Domain Security using MAPSEC or IPSec
 GSM-Security: a Survey and Evaluation of the Current Situation, Paul
Yousef, Master’s thesis, Linkoping Institute of Technology, March 2004
 UMTS security, Boman, K. Horn, G. Howard, P. Niemi, V. Electronics &
Communication Engineering Journal, Oct 2002, Volume: 14, Issue:5, pp.
191- 204
 "Evaluation of UMTS security architecture and services“, A. Bais, W.
Penzhorn, P. Palensky, Proceedings of the 4th IEEE International
Conference on Industrial Informatics, p. 6, Singapore, 2006
 UMTS Security, Valtteri Niemi, Kaisa Nyberg, published by John Wiley and
Sons, 2003
 GSM: Security, Services, and the SIM Klaus Vedder, LNCS 1528, pp. 224-
240, Springer-Verlag 1998
chd.naveen@gmail.com
/chd.naveen
@saini_naveen87
/NaveenKumar11
www.elixir-india.com

More Related Content

What's hot (20)

Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4G
 
ppt of gsm network
ppt of gsm networkppt of gsm network
ppt of gsm network
 
Digital cellular networks GSM
Digital cellular networks GSMDigital cellular networks GSM
Digital cellular networks GSM
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
 
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
 
GPRS
GPRSGPRS
GPRS
 
Mobile communication systems Introduction
Mobile communication systems IntroductionMobile communication systems Introduction
Mobile communication systems Introduction
 
GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.
 
2 g data call flow
2 g data call flow2 g data call flow
2 g data call flow
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Unit II -Mobile telecommunication systems
Unit II -Mobile telecommunication systemsUnit II -Mobile telecommunication systems
Unit II -Mobile telecommunication systems
 
Gprs architecture
Gprs architectureGprs architecture
Gprs architecture
 
Ss7 Introduction Li In
Ss7 Introduction Li InSs7 Introduction Li In
Ss7 Introduction Li In
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Imt 2000
Imt 2000Imt 2000
Imt 2000
 
GSM Location area update
GSM Location area updateGSM Location area update
GSM Location area update
 
GPRS
GPRSGPRS
GPRS
 
Gsm
GsmGsm
Gsm
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 

Viewers also liked

Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cell Forum
 
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...IDATE DigiWorld
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionjyothsnapaidi
 
5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_aMaria Boura
 
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Bristol Is Open
 
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015SenZations Summer School
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network SecuritySatish Chavan
 
5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm 5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm Saurabh Verma
 
Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 201244CON
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5GDirk Kutscher
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Mohamed Tharwat Waheed
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so farPayamBarnaghi
 
The leadership in the new digital age carved by the fourth industrial revolu...
The leadership in the new digital age carved by  the fourth industrial revolu...The leadership in the new digital age carved by  the fourth industrial revolu...
The leadership in the new digital age carved by the fourth industrial revolu...Osaka University
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
4G LTE Presentation Group 9
4G LTE Presentation Group 94G LTE Presentation Group 9
4G LTE Presentation Group 9eel4514team9
 
5G Presentation
5G Presentation5G Presentation
5G PresentationEricsson
 

Viewers also liked (20)

Security In LTE Access Network
Security In LTE Access NetworkSecurity In LTE Access Network
Security In LTE Access Network
 
Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work item
 
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a
 
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
 
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm 5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm
 
Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Long Term Evolution (LTE) -
Long Term Evolution (LTE) -Long Term Evolution (LTE) -
Long Term Evolution (LTE) -
 
The leadership in the new digital age carved by the fourth industrial revolu...
The leadership in the new digital age carved by  the fourth industrial revolu...The leadership in the new digital age carved by  the fourth industrial revolu...
The leadership in the new digital age carved by the fourth industrial revolu...
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
4G LTE Presentation Group 9
4G LTE Presentation Group 94G LTE Presentation Group 9
4G LTE Presentation Group 9
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
 
LTE Basics
LTE BasicsLTE Basics
LTE Basics
 

Similar to Security in GSM(2G) and UMTS(3G) Networks

Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALASaikiran Panjala
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm networkAzri Randy
 
4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdf4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdfssuser989b18
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsAnkit Gupta
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsAnkit Gupta
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impactAhmad Sharifi
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKijwmn
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMIJNSA Journal
 

Similar to Security in GSM(2G) and UMTS(3G) Networks (20)

Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
 
Mobile security
Mobile securityMobile security
Mobile security
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm network
 
Rk 3 gsm network @guddu
Rk 3 gsm network @gudduRk 3 gsm network @guddu
Rk 3 gsm network @guddu
 
4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdf4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdf
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
Mob. comp . prst
Mob. comp . prstMob. comp . prst
Mob. comp . prst
 
GSM Architecture.ppt
 GSM Architecture.ppt GSM Architecture.ppt
GSM Architecture.ppt
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Class 1
Class 1Class 1
Class 1
 
Gsm security final
Gsm security finalGsm security final
Gsm security final
 
GSM WITH SATELLITE.pptx
GSM WITH SATELLITE.pptxGSM WITH SATELLITE.pptx
GSM WITH SATELLITE.pptx
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
 

More from Naveen Kumar

Mobile tower radiation
Mobile tower radiationMobile tower radiation
Mobile tower radiationNaveen Kumar
 
Ph.D Research proposal
Ph.D Research proposalPh.D Research proposal
Ph.D Research proposalNaveen Kumar
 
Cell Phone Antennas
Cell Phone AntennasCell Phone Antennas
Cell Phone AntennasNaveen Kumar
 
VHDL coding in Xilinx
VHDL coding in XilinxVHDL coding in Xilinx
VHDL coding in XilinxNaveen Kumar
 
Optimization in HFSS
Optimization in HFSSOptimization in HFSS
Optimization in HFSSNaveen Kumar
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communicationNaveen Kumar
 
A Multi-Band PIFA with Slotted Ground Plane
A Multi-Band PIFA with Slotted Ground Plane A Multi-Band PIFA with Slotted Ground Plane
A Multi-Band PIFA with Slotted Ground Plane Naveen Kumar
 
Study of Planar Inverted - F Antenna (PIFA) for mobile devices
Study of Planar Inverted - F Antenna (PIFA) for mobile devices Study of Planar Inverted - F Antenna (PIFA) for mobile devices
Study of Planar Inverted - F Antenna (PIFA) for mobile devices Naveen Kumar
 
A novel low profile planar inverted f antenna (pifa) for mobile handsets
A novel low profile planar inverted f antenna (pifa) for mobile handsetsA novel low profile planar inverted f antenna (pifa) for mobile handsets
A novel low profile planar inverted f antenna (pifa) for mobile handsetsNaveen Kumar
 
A compact planar inverted-F antenna with slotted ground plane
A compact planar inverted-F antenna with slotted ground planeA compact planar inverted-F antenna with slotted ground plane
A compact planar inverted-F antenna with slotted ground planeNaveen Kumar
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Adaptive Resonance Theory
Adaptive Resonance TheoryAdaptive Resonance Theory
Adaptive Resonance TheoryNaveen Kumar
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIPNaveen Kumar
 

More from Naveen Kumar (20)

Mobile tower radiation
Mobile tower radiationMobile tower radiation
Mobile tower radiation
 
Mobile security
Mobile securityMobile security
Mobile security
 
Ph.D Research proposal
Ph.D Research proposalPh.D Research proposal
Ph.D Research proposal
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Cell Phone Antennas
Cell Phone AntennasCell Phone Antennas
Cell Phone Antennas
 
Thesis on PIFA
Thesis on PIFAThesis on PIFA
Thesis on PIFA
 
Electronics Quiz
Electronics QuizElectronics Quiz
Electronics Quiz
 
VHDL coding in Xilinx
VHDL coding in XilinxVHDL coding in Xilinx
VHDL coding in Xilinx
 
Optimization in HFSS
Optimization in HFSSOptimization in HFSS
Optimization in HFSS
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
 
A Multi-Band PIFA with Slotted Ground Plane
A Multi-Band PIFA with Slotted Ground Plane A Multi-Band PIFA with Slotted Ground Plane
A Multi-Band PIFA with Slotted Ground Plane
 
Study of Planar Inverted - F Antenna (PIFA) for mobile devices
Study of Planar Inverted - F Antenna (PIFA) for mobile devices Study of Planar Inverted - F Antenna (PIFA) for mobile devices
Study of Planar Inverted - F Antenna (PIFA) for mobile devices
 
A novel low profile planar inverted f antenna (pifa) for mobile handsets
A novel low profile planar inverted f antenna (pifa) for mobile handsetsA novel low profile planar inverted f antenna (pifa) for mobile handsets
A novel low profile planar inverted f antenna (pifa) for mobile handsets
 
A compact planar inverted-F antenna with slotted ground plane
A compact planar inverted-F antenna with slotted ground planeA compact planar inverted-F antenna with slotted ground plane
A compact planar inverted-F antenna with slotted ground plane
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Adaptive Resonance Theory
Adaptive Resonance TheoryAdaptive Resonance Theory
Adaptive Resonance Theory
 
UART
UARTUART
UART
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 
AR model
AR modelAR model
AR model
 
VLSI routing
VLSI routingVLSI routing
VLSI routing
 

Recently uploaded

Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 

Recently uploaded (20)

Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 

Security in GSM(2G) and UMTS(3G) Networks

  • 2.  GSM is the most widely used cellular standard  Over 600 million users, mostly in Europe and Asia  Provides authentication and encryption capabilities  Today’s networks are 2G & 3G  Future (4G LTE)
  • 4.  Authentication ◦ network operator can verify the identity of the subscriber making it infeasible to clone someone else’s mobile phone  Confidentiality ◦ protects voice, data and sensitive signalling information (e.g. dialled digits) against eavesdropping on the radio path  Anonymity ◦ protects against someone tracking the location of the user or identifying calls made to or from the user by eavesdropping on the radio path
  • 5.  Three algorithms have been specified to provide security services in GSM.  A3 is used for authentication,  A5 for encryption, and  A8 for the generation of a cipher key
  • 6.  For authentication, the VLR sends the random value RAND to the SIM.  The MS sends back the SRES generated by the SIM; the VLR can now compare both values. If they are the same, the VLR accepts the subscriber, otherwise the subscriber is rejected.
  • 7.
  • 8.  To ensure privacy . All user-related data is encrypted. After authentication, BTS (base transceiver station) and MS apply encryption to voice, data, and signaling by applying the cipher key Kc .  Kc is generated using the individual key Ki and a random value by applying the algorithm A8.  This confidentiality exists only between MS and BTS, but it does not exist end-to-end or within the whole GSM network.
  • 9.  Note that the SIM in the MS and the network both calculate the same Kc based on the random value RAND. The key Kc itself is not transmitted over the air interface.  MS and BTS can now encrypt and decrypt data using the algorithm A5 and the cipher key Kc.  Kc should be a 64 bit key – which is not very strong, but is at least a good protection against simple eavesdropping.  However, the publication of A3 and A8 on the internet showed that in certain implementations 10 bits out of 64 bits are always set to 0, so that the real length of the key is thus only 54 consequently, the encryption is much weaker.
  • 10.
  • 11.  To provide user anonymity, all data is encrypted before transmission, and user identifiers (which would reveal an identity) are not used over the air.  Instead, GSM transmits a temporary identifier (TMSI), which is newly assigned by the VLR after each location update.  Additionally, the VLR can change the TMSI at any time.
  • 12.  User identity confidentiality on the radio access link ◦ temporary identities (TMSIs) are allocated and used instead of permanent identities (IMSIs)  Helps protect against: ◦ tracking a user’s location ◦ obtaining information about a user’s calling pattern IMSI: International Mobile Subscriber Identity TMSI: Temporary Mobile Subscriber Identity
  • 13.  The GSM cipher A5/2 ◦ A5/2 is now so weak that the cipher key can be discovered in near real time using a very small amount of known plaintext
  • 14.  No requirement of decrypting skills  Need a instrument that captures microwave  Gains control of communication between MS and intended receiver
  • 15.
  • 16. • Design only provides access security - communications and signalling in the fixed network portion aren’t protected • Design does not address active attacks, whereby network elements may be impersonated • Design goal was only ever to be as secure as the fixed networks to which GSM systems connect • Short key size of Kc (64 bits) makes it more vulnerable to various attacks
  • 17.  Mutual Authentication • provides enhanced protection against false base station attacks by allowing the mobile to authenticate the network  Data Integrity • provides enhanced protection against false base station attacks by allowing the mobile to check the authenticity of certain signalling messages  Network to Network Security • Secure communication between serving networks. MAPSEC (Mobile Application Part Securit) or IPsec can be used
  • 18.  Wider Security Scope • Security is based within the RNC rather than the base station  Flexibility • Security features can be extended and enhanced as required by new threats and services  Longer Key Length • Key length is 128 as against 64 bits in GSM
  • 19. HLRHLR AuCAuC Access Network (UTRAN) Visited Network User Equipment D RNCBTSUSIMUSIM MEME SGSNSGSN H MSCMSC Home Network (2) Authentication (1) Distribution of authentication vectors (4) Protection of the access link (ME-RNC) (3) CK,IK (3) CK, IK MSC – circuit switched services SGSN – packet switched services
  • 20.  Mutual Authentication between user and the network  Establishes a cipher key and integrity key  Assures user that cipher/integrity keys were not used before, thereby providing protection against replay attacks
  • 21.  Protection of some radio interface signalling • protects against unauthorised modification, insertion and replay of messages • applies to security mode establishment and other critical signalling procedures  Helps extend the influence of authentication when encryption is not applied  Uses the 128-bit integrity key (IK) derived during authentication  Integrity applied at the Radio Resource Control (RRC) layer of the UMTS radio protocol stack • signalling traffic only
  • 22.  Data on the radio path is encrypted between the Mobile Equipment (ME) and the Radio Network Controller (RNC) • protects user traffic and sensitive signalling data against eavesdropping • extends the influence of authentication to the entire duration of the call  Uses the 128-bit encryption key (CK) derived during authentication
  • 23.  No security for communication between network elements in GSM  Easy to gain access to sensitive information such as Kc  Network Domain Security in UMTS foils these attacks
  • 24. UMTS builds upon security mechanisms of GSM, and in addition provides following enhancements:  Encryption terminates at the radio network controller  Mutual authentication and integrity protection of critical signalling procedures to give greater protection against false base station attacks  Longer key lengths (128-bit)  Network Domain Security using MAPSEC or IPSec
  • 25.  GSM-Security: a Survey and Evaluation of the Current Situation, Paul Yousef, Master’s thesis, Linkoping Institute of Technology, March 2004  UMTS security, Boman, K. Horn, G. Howard, P. Niemi, V. Electronics & Communication Engineering Journal, Oct 2002, Volume: 14, Issue:5, pp. 191- 204  "Evaluation of UMTS security architecture and services“, A. Bais, W. Penzhorn, P. Palensky, Proceedings of the 4th IEEE International Conference on Industrial Informatics, p. 6, Singapore, 2006  UMTS Security, Valtteri Niemi, Kaisa Nyberg, published by John Wiley and Sons, 2003  GSM: Security, Services, and the SIM Klaus Vedder, LNCS 1528, pp. 224- 240, Springer-Verlag 1998