Cellular Networks II KAIST Yongdae Kim.

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

GSM infrastructure MSC, BSC, BTS, VLR, HLR, GSGN, GSSN
Exploiting Open Functionality in SMS-Capable Cellular Networks Chang-Jae Lee Some of the slides and figures were borrowed from the author’s slides.
Tutorial 6 Mobile Communication Networks Mohamed Esam.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
GSM cracking ● Introduction. GSM cracking Scope of this lecture ● A (very) brief tour of GSM ● The Cryptography ● How it's possible to crack it ● What's.
Mario Čagalj University of Split 2013/2014. Security of Cellular Networks: Man-in-the Middle Attacks ‘Security in the GSM system’ by Jeremy Quirke, 2004.
Scheduling in Wireless Systems. 2 CDMA2000: Overall Architecture Mobile Station.
CC4100 Active Cellular Intercept Technologies
CELLULAR COMMUNICATIONS GSM/GPRS/EDGE. Groupe Speciale Mobile/Global System for Mobile.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
GSM Protocol Stack Shrish Mammattva Bajpai. What is Protocol Stack ? A protocol stack (sometimes communications stack) is a particular software implementation.
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core Patrick Michael Lin, Machigar Ongtang, Vikhyath.
GSM Global System for Mobile Communications
D. Foo Kune, J. Koelndorfer, N. Hopper, Y. Kim.  News  Nov 2011: Carrier IQ  Oct 2011: HTC Android phone location leakage  April 2011: iPhone and.
IMT 2000, CDMA x And Future Trends.  IMT 2000 objective.  CDMA x.  IMT 2000 Technological Options Brief Outline  Migration Paths.
GSM—Global System for Mobile. 2 How does GSM handle multiple users The 1G cellular systems used FDMA. The first cellular standard adopting TDMA was GSM,
GSM standard (continued)
1G PERSONAL COMMUNICATION SYSTEMS: AMPS (PART III) Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering.
GSM Security Overview (Part 1)
Exploiting Open Functionality in SMS-Capable Cellular Networks Authors: William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Publication:
3/26/081 Exploiting Open Functionality in SMS- Capable Networks William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Systems and Internet.
Cellular Mobile Communication Systems Lecture 7
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
Evolution from GMS to UMTS
INTRODUCTION Wireless communication technology Provide high speed internet to large geographical areas Part of 4 th generation(4G) Alternative to cable.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
How an SMS-Based Malware Infection Will Get Throttled by the Wireless Link Roger Piqueras Jover (w. Ilona Murynets) AT&T Security Research Center June.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
GSM Continued.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
Members of our Presentation  (Bsts09-08) Hafiz Umer Ejaz  (Bsts09-09) Rai-Habib Ullah  (Bsts09-31) M.Arsalan Qureshi  (Bsts09-32) Shoaib Ansari 
Chapter 7- Mobile and Wi-Fi Networks Taking signals on and off the air Connections to other networks Need to manage spectrum Managing and billing for services.
CDMA Network Structure and Components Lance Westberg.
GSM Network Structure Lance Westberg.
GSM TOWARDS LTE NETWORKS Lecture # 6. CELL PLANNING.
Network: Location Management Y. Richard Yang 3/21/2011.
GSM TOWARDS LTE NETWORKS Lecture # 2. CELLULAR GENERATIONS First Generation Wireless : Analog Second Generation Wireless (2G): Digital Second Generation.
Cellular Mobile Communication Systems Lecture 8
Chapter 4 Application Level Security in Cellular Networks.
Speech decoding Channel decoding De-interleaving Burst Formatting
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
PLMN Network Intelligence 2 © Manzur Ashraf. Switching.
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Overview of cellular system
Telephone and Telecommunication. Telephone - a device for transmitting and receiving sound at a distance. Modern phones are performed through the transmission.
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
Sniffer for Detecting Lost Mobiles
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
KAIST Yongdae Kim.  Full Professor at EE, KAIST ( ~)  Affiliated with CSRC and GIST  Formerly at the Univ. of Minnesota (2002 ~ 2012)  Contact.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
9 Transmission and Switching Mohamed Ashour, German University in Cairo Mohamed Ashour Lecture Fall 2011 AC = authentication center BSS = base station.
NETWORK AND COMMUNICATIONS
Objectives Overview Discuss the purpose of the components required for successful communications Describe these uses of computer communications: wireless.
Muhammad Taqi Raza, Fatima Muhammad Anwar and Songwu Lu
GSM location updating procedure
Name:Shivalila A H,Shima
Subject Name: GSM Subject Code: 10EC843
Product Overview.
GSM location updating procedure
An Introduction to CDMA Air Interface: IS-95A
Dept. of Business Administration
Chapter 9 – Mobile systems and networks
Product Overview.
Security in Wide Area Networks
Short messaging service in GSM
Presentation transcript:

Cellular Networks II KAIST Yongdae Kim

IMSI Catcher Man-in-the-middle between the MS and BST Eavesdropping device used for interception Tracking of cellular phones Undetectable for the users of mobile phones GSM uses one-way authentication UMTS uses mutual authentication, but backward compatible to GSM Manufacturers Meganet, NeoSoft, Shoghi, Proximus Chris Paget built a custom one for $1,500. Detection of IMSI catcher? 2011. Karsten Nohl. catcher catcher!

Decrypting Phone Calls Dec. 2010. Karsten Nohl at CCC $15 phone and open-source software OsmocomBB Free/Open Source GSM Baseband software implementation. Replace the need for a proprietary GSM baseband software drivers for the GSM analog and digital baseband peripherals the GSM phone-side protocol stack, from layer 1 up to layer 3 2009: GSM A5/1 encryption can be decryptable How about 3G and LTE? Debugger for the Qualcomm baseband chip MSM6280 CDMA longcode?

Platform Serial cable and reprogrammer cable ($30) VirtualBox running Ubuntu and OsmosomBB software (free) HTC Dream with custom Android Kernel ($100) Motorola C118 ($30)

Satellite Phone System Location Privacy Marie Colvin: Syria regime accused of murder (Aug. 2012) Syrian forces had “locked on” to their satellite phone signals Appelbaum “These phone protocols are intentionally insecure” “Tracking people is sometimes considered a feature” Confidentiality Driessen and Hund have showed that both GMR-1 and GMR-2 are broken. (Feb. 2012) Completely reverse-engineered the encryption algorithm Took less than 30 min due to insecure design of the algorithm

Cellular Networks and SMS Targeting 2.5G GSM networks Exploiting Open Functionality in SMS-Capable Cellular Networks, McDaniel et. al., ACM CCS 2005 (Mobicom, Usenix Security, …)

Weaknesses of SMS: Bottlenecks All systems have bottlenecks; finding them reveals a weak point SMSCs have per-user queues; once reached, texts are dropped Sprint: 30 messages; Verizon: 100: ATT: 400+ Delivery rate from SMSC to MH measured at 7-8 seconds Can send messages via Internet in 0.71 seconds

Possible attack: local DOS Phone network can be DOSed with enough text Same channels used to initiate voice calls and deliver text How many text messages does it take? Estimate Washington, D.C. can handle 240 msg/sec Internet-based attacker needs only 2.8 Mbps Some networks allow sending to 10 people at once Reduces needed bandwidth to 280 kbps

Location Privacy Leaks on GSM We have the victim’s mobile phone number Can we detect if the victim is in/out of an area of interest? Granularity? 100 km2? 1km2? Next door? No collaboration from service provider i.e. How much information leaks from the HLR over broadcast messages? Attacks by passively listening Paging channel Random access channel Location leaks on the GSM air interface, D. F. Kune, J. Koelndorfer, N. Hopper, Y. Kim, NDSS 2012 Media: Ars Technica, Slashdot, MPR, Fox Twin Cities, Physorg, TG Daily, Network World, e! Science News, Scientific Computing, gizmag, Crazy Engineers, PC Advisor, Mobile Magazine, The CyberJungle, Inquisitr

Cellular Network HSS BTS ATR HLR MS VLR PSTN MSC BSC GSM Air Interface • The Home Location Register (HLR), a database containing the subscription information and location information. • The Visitor Location Reguster (VLR), in charge of one or multiple areas where mobile stations may roam in and out of. This entity handles the temporary IDs (TMSI) of the mobile stations. • TheMobileServicesSwitchingCenter(MSC)handlestheregistrationandhandoverformobile stations roaming in and out of the area it is responsible for. • The Base Station System (BSS) is a network of base station transceivers and controllers re- sponsible for communicating directly with the mobile station. Those equipments are typically what is at a cellular network tower. • The Mobile Station (MS) is the mobile device carried by the user. It is composed of the actual device and a Subscriber Identity Module (SIM). PSTN MSC BSC

Location Leaks on Cellular Network IMSI a unique # associated with all GSM TMSI Randomly assigned by the VLR Updated in a new area PCCH Broadcast paging channel RACH Random Access Channel SDCCH Standalone Dedicated Control Channel LAC has multiple cell towers that uses different ARFCN BTS MS Paging Request PCCH Channel Request RACH Immediate Assignment PCCH IMSI (International Mobile Subscriber Identity), TMSI (Temporary Mobile Subscriber Identity), LAC (Location Area Code), absolute radio-frequency channel number (ARFCN) Call the victim to ensure they have their phone on (The network uses an ID unknown to us) Watermark calls: 2 or 3 calls with known delays in between, Abort each call before completion, 5 seconds after dialing, Paging messages issued, but victim’s phone never rings Attempt to recover the watermark on the paging channel, Find paging messages with IDs and delays similar to the ones we used Result Case 1: watermark on PCCH is heard, The victim is in the same LAC Case 2: immediate assignment on AGCH is heard “regularly”, The victim is within the same cell tower Case 3: the RACH traffic from the victim’s phone is heard, They are really close (20 m) Paging Response SDCCH Setup and Data

Platform Serial cable and reprogrammer cable ($30) VirtualBox running Ubuntu and OsmosomBB software (free) HTC Dream with custom Android Kernel ($100) Motorola C118 ($30)

Phone number-TMSI mapping dt PSTN PCH Time dt

Silent Paging Delay between the call initiation and the paging request: 3 sec Median delay between call initiation and ring: 6 sec

Immediate Assignment Is IA message sent to all towers in the same LAC? How do we identify IA message? No identifiable information Check the correlation between IA and Paging request The left box plot shows the time difference between the paging request for our target TMSI and the very next Immediate Assignment. The middle boxplot shows the difference between the TMSI timestamp and the IA messages if we are listening on a different ARFCN. Finally the last boxplot shows a control by picking a random time and the next IA message.

Location Area Code (LAC) Grey area is T-Mobile LAC 747d

Hill Climbing to discover towers

Mapping cell signal strength A cell phone will likely pick the tower that has the highest signal strength (RSSI). This map indicates where that phone might be if they are on a particular tower.

Coverage area with 1 antenna Downtown Minneapolis Observer Yagi antenna Towers in this area are observable with a rooftop 12 db gain antenna John’s newly shaved head

Following a walking person Observer End Start Approximate areas covered by towers to which the victim’s phone was attached to

Femtocell and 3G Solutions to offload traffic to other networks Small/cheap cells in residential environments ~ Q2 2011, 31 operators in 20 countries adopted femtocell 100,000 Femtocells are deployed in S. Korea Rooting is assumed, which is available in Borgaonkar, Redon, Seifert. "Security Analysis of a Femtocell device" Femtocells: A Poisonous Needle in the Operator’s Hay Stack, Borgaonkar, Golde, Redon, Blackhat’11

Femtocell Architecture

Threats End Users Infrastructure IMSI Catching Voice/data recording MitM (Impersonation or injection) Detach subscriber Infrastructure Data mining subscriber information Signalling DDoS

Mobile Tapping Wi-Fi provides Internet link: WiBro, other 3G/LTE network tcpdump runs on Raspberry Pi Power supply from battery or car cigar jack Femtocell, power source, mobile internet connection not included in price Raspberry Pi + Case: 50,000 Won USB Wi-Fi: \15000 2GB SD Card: \2000 Ethernet connection to Femtocell Power required for RPi, Femtocell, Backhaul link

Known Attacks 2012 SFR (Nico Golde, NDSS 2012) 2012 Vodafone (The Hacker’s Choice, 2011) 2013 Verizon (iSecPartners, Blackhat 2013) There were some researches on attacking femtocells already. SFR – french Vodafone – UK Verizon – American their femtocells already hacked. As shown in those previous works, femtocell were hacked in many other countries. So we begin to pay attention on the security of femtocells in Korea.

Femtocell Detection Apps All released apps are based on cell ID/LAC MyCell Preselect nearest cell and notifies when cell ID changed Femto Widget Determine femtocell by predefined range of LAC code Femto Catcher Uses predefined range of network ID. Only works on Verizon CDMA. Presented on Black Hat 2013