 =====T-Nova 1 GSM - UMTS Interworking - Mechanisms Roland Schmitz T-Nova Deutsche Telekom Group 24.8.99 TSG-T3 (USIM) meeting #8Tdoc T3-99248 Bonn 23.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Possible Memory Redundancy Schemes (redundancy sub-team)
xxx-00-0sec IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx-00-0sec-3gpp-security-non802handover Title: A Study on Security Solutions in.
Introduction to Public Land Mobile Network (PLMN)
1 Gauss-Jordan Method. How To complete Problem 2.2 # 29 Produced by E. Gretchen Gascon.
GSM Architecture
Chapter 10 Real world security protocols
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Mobile Switching Systems Unit, L M Ericsson in Finland
25 seconds left…...
We will resume in: 25 Minutes.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
SMG10 report to SMG#30 Tdoc SMG P
The Project Please read the project’s description first. Each router will have a unique ID, with your router’s ID of 0 Any two connected routers will have.
GSM Network Overview Um Abis A BSC BTS Mobile Station HLR VLR EIR AuC
EAP AKA Jari Arkko, Ericsson Henry Haverinen, Nokia.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
GSM Security and Encryption
GSM and UMTS Security.
Peter Howard Vodafone Group R&D
Network Security Security in Traditional Wireless Networks 1 Network Security Chapter 6. Security in Traditional Wireless Networks.
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
UNIVERSAL MOBILE TELECOMMUNICATION SYSTEM(UMTS). EVOLUATION OF MOBILE COMMUNICATION 1 st Generation : Analog Cellular 2 nd Generation : Multiple Digital.
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
One-Pass GPRS and IMS Authentication Procedure for UMTS
GSM standard (continued)
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
Modes Mobile Station ( MS )
GSM Security Overview (Part 1)
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
17.1 Cellular Telephony Frequency Reuse Principle Transmitting Receiving Handoff Roaming First Generation Second Generation Third Generation Cellular telephony.
18th Oct., KDDI is a IS-95 CDMA carrier in Japan. Many Japanese travel abroad, but few people come to Japan. (due to high consumer price in Japan?)
IWD2243 Wireless & Mobile Security Chapter 2 : Security in Traditional Wireless Network Prepared by : Zuraidy Adnan, FITM UNISEL1.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
Security in GSM/GPRS and UMTS
Cellular Mobile Communication Systems Lecture 8
Mobile Communication The Mobile Station (MS) is the user equipment in GSM. The MS is what the user can see of the GSM system, the cellular phone itself.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
Rev A Mikko Suominen Enhancing System Capacity and Robustness by Optimizing Software Architecture in a Real-time Multiprocessor Environment.
Kwangwoon Univ. Wireless and Mobile Network Architectures Intersystem Handoff and Authentication IS-41 오재준Nclab
OMA GSM Communication Flow
Accommodating mobility with direct routing
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
1 Wireless Networks Lecture 16 GSM: Global System for Mobile Communication Dr. Ghalib A. Shah.
1 Rogue Mobile Shell Problem Verizon Wireless October 26, 2000 Christopher Carroll.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
BITS Pilani Pilani | Dubai | Goa | Hyderabad EA C451 Vishal Gupta.
Wireless Network PMIT- By-
GSM SECURITY AND ENCRYPTION
Jari Arkko, Henry Haverinen, Joseph Salowey (presented by Pasi Eronen)
3G Security Principles Build on GSM security
Mobile Communications Mobile Security Fundamentals-3
GSM location updating procedure
Maryna Komarova (ENST)
IEEE MEDIA INDEPENDENT HANDOVER
Security issues in public access WLAN architectures
UMTS Terrestrial Radio Access Network Architecture
GSM location updating procedure
GPRS Introduction to GPRS. 1.1) what is GPRS?
Dept. of Business Administration
Security in Wide Area Networks
Presentation transcript:

 =====T-Nova 1 GSM - UMTS Interworking - Mechanisms Roland Schmitz T-Nova Deutsche Telekom Group TSG-T3 (USIM) meeting #8Tdoc T Bonn July, 1999

 =====T-Nova 2 Different Security Levels of UMTS and GSM  GSM •No Serving Network (SN) Authentication •No Guarantee of Key Freshness •Length of KC 64 Bit  UMTS •Proof of Trust of HE by SN •Guarantee of Key Freshness •Integrity Protection of Signalling Messages •Length of CK, IK 128 Bit

 =====T-Nova 3 UMTS-GSM Interworking- Scenarios  Roaming •GSIM - Authentication in GSM R1 •GSIM - Authentication in UMTS R2 •USIM - Authentication in GSM R3 •USIM - Authentication in UMTS R4  HandOver •GSIM HO from GSM to UMTS HO1 •USIM from GSM to UMTS HO2 •GSIM from UMTS to GSM HO3 •USIM from UMTS to GSM HO4

 =====T-Nova 4 Assumptions  GSIM is unchanged  Challenge RAND is the same in GSM and UMTS  Each HLR/AuC is capable of generating GSM- Triplets and UMTS-AV.  Re-authentication at HO is too time-consuming

 =====T-Nova 5 Requirements for an Interworking-Mechanism  Every Roaming/Handover - Scenario should be supported  If possible, UMTS-Subscribers should get UMTS-Level Security each time they are connected to a UTRAN => HO 2 (Handover of USIM from GSM to UMTS) is a critical scenario

 =====T-Nova 6 Mechanisms  Mechanism I (Ericsson) •does not allow for GSIM roaming; not covered here  Mechanism II (Siemens) •HLR/AuC generates UMTS-AV or derives GSM- Triplet via RAND*=RAND, RES* = c1(RES), Kc* = c2(CK), according to type of requesting VLR •UMTS-AV or GSM-Triplett are sent to VLR •On HO from GSM to UMTS or GSIM-Auth. in UMTS GSM-Keys are „stretched“ by UMTS-VLR via CK*=c3(KC), IK*=c4(KC) J No Impact on existing GSM-Infrastructure! L After USIM-Auth. in GSM or after HO to GSM only GSM-level security for UMTS-subscribers

 =====T-Nova 7 Mechanism II (HO) UTRAN GSM BSS CK, IK KC Kc CK* = c3(Kc) IK* = c4(Kc) Kc* = c2(CK) CK, IK HO01HO02HO03HO04 Kc* = c2(CK) CK* = c3(Kc) IK* = c4(Kc) GSIM USIMGSIMUSIM CK* = c3(Kc*) IK* = c4(Kc*)

 =====T-Nova 8 Mechanism II (Roaming) UTRAN GSM BSS CK, IK KC CK* = c3(Kc) IK* = c4(Kc) GSIM- Roaming USIM- Roaming R01R02R03R04 Kc* = c2(CK) GSIM- Roaming USIM- Roaming Kc CK, IK

 =====T-Nova 9 Mechanisms  Mechanism III (Siemens) •like mechanism II, but: In HO 4 (USIM HO from UMTS to GSM), UMTS VLR sends the tripel (KC*=c2(CK), CK, IK) to the GSM-VLR •in case of another HO to UMTS the CK, IK can be used again J UMTS-Security after HO2 (if registered in UMTS) L GSM VLRs have to handle UMTS-AVs L On USIM Registration in GSM only GSM-security even after subsequent HO to UMTS

 =====T-Nova 10 Mechanism III (HO) UTRAN GSM BSS CK, IK KC Kc CK* = c3(Kc) IK* = c4(Kc) Kc* = c2(CK) CK, IK HO01HO02HO03HO04 Kc* = c2(CK) CK* = c3(Kc) IK* = c4(Kc) GSIM USIMGSIMUSIM CK, IK

 =====T-Nova 11 Alternative Mechanisms  Mechanism IIa: (T-Mobil/T-Nova) •HLR/AuC generates UMTS-AVs and GSM-Tripletts and sends both to VLR, regardless if GSM-VLR or UMTS-VLR •on HO both kinds of authentication data are passed on to new VLR J „Maximum“ Security L High Signalling Load  Mechanism IIIa: (T-Mobil/T-Nova) •HLR/AuC generates UMTS-AV and sends them to all VLRs •GSM-VLRs generate derived RES*, KC* via RES*=c1(RES), KC*=c2(CK); on HO the pair (CK, IK) is passed on L „Maximum“ Security L GSM-VLRs have to implement c1, c2

 =====T-Nova 12 Mechanisms IIa/IIIa (HO) UTRAN GSM BSS CK, IK KC Kc CK* = c3(Kc) IK* = c4(Kc) Kc* = c2(CK) CK, IK HO01HO02HO03HO04 Kc* = c2(CK) CK* = c3(Kc) IK* = c4(Kc) GSIM USIMGSIMUSIM CK, IK

 =====T-Nova 13 Mechanisms IIa/IIIa (Roaming) UTRAN GSM BSS CK, IK Kc* = c2(CK) CK* = c3(Kc) IK* = c4(Kc) GSIM- Roaming USIM- Roaming R01R02R03R04 Kc* = c2(CK) GSIM- Roaming USIM- Roaming Kc CK, IK

 =====T-Nova 14 Summary