Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.

Slides:



Advertisements
Similar presentations
Siyang Tian. TOPIC 1.SIM CARD card embedded with subscriber identity module 2. 3G network 3rd generation mobile telecommunications.
Advertisements

GSM Network Overview Um Abis A BSC BTS Mobile Station HLR VLR EIR AuC
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
Topics In Information Security Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication Presented by Idan Sheetrit
Mario Čagalj University of Split 2013/2014. Security of Cellular Networks: Man-in-the Middle Attacks ‘Security in the GSM system’ by Jeremy Quirke, 2004.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
GSM Global System for Mobile Communications
GSM System Architecture
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
GSM—Global System for Mobile. 2 How does GSM handle multiple users The 1G cellular systems used FDMA. The first cellular standard adopting TDMA was GSM,
GSM standard (continued)
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
Modes Mobile Station ( MS )
GSM Security Overview (Part 1)
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Cellular Mobile Communication Systems Lecture 7
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
17.1 Cellular Telephony Frequency Reuse Principle Transmitting Receiving Handoff Roaming First Generation Second Generation Third Generation Cellular telephony.
The Physical Layer Chapter Digital Modulation and Multiplexing Baseband Transmission Passband Transmission Frequency Division Multiplexing.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication DSL, Cable, and Mobile Telephone System.
Basic Concepts of Cellular Networks and Mobile IP Aug 31, 2005.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
GSM Continued.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
Members of our Presentation  (Bsts09-08) Hafiz Umer Ejaz  (Bsts09-09) Rai-Habib Ullah  (Bsts09-31) M.Arsalan Qureshi  (Bsts09-32) Shoaib Ansari 
CDMA Power Control, Smart Antenna. Power Control in CDMA All the mobiles communicate on the same frequency. Therefore, internal interference is developed.
GSM Network Structure Lance Westberg.
GSM TOWARDS LTE NETWORKS Lecture # 2. CELLULAR GENERATIONS First Generation Wireless : Analog Second Generation Wireless (2G): Digital Second Generation.
Mobile Communication The Mobile Station (MS) is the user equipment in GSM. The MS is what the user can see of the GSM system, the cellular phone itself.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
GSM TOWARDS LTE NETWORKS
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
WIRELESS COMMUNICATION GSM NETWORK OVERVIEW LECTURE 4 Tanvir Ahmad Niazi Air University, Islamabad 1.
4.1 Architecture of the GSM system GSM is a PLMN (Public Land Mobile Network) – several providers setup mobile networks following the GSM standard within.
The Physical Layer Chapter 2 – Part 2 Ch The Local Loop: Modems, ADSL, and Wireless The use of both analog and digital transmissions for a computer.
GSM Network Architecture
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Overview of cellular system
Chapter 2 The Physical Layer.
(Global System for Mobile Communication)
WIRELESS FRAUD Detection & Prevention. Method of Fraud CLONING of SIM Card.
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
Cellular Network Base stations transmit to and receive from mobiles at the assigned spectrum Multiple base stations use the same spectrum The service area.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
Overview of the GSM for Cellular System
Wireless Network PMIT- By-
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Global System for Mobile Communications
GSM SECURITY AND ENCRYPTION
GSM.
3G Security Principles Build on GSM security
Wireless Communications MOBILE COMMUNICATIONS Lecture:7
Subject Name: GSM Subject Code: 10EC843
Global system for Mobile Communications
חלק ב' – תקשורת תאית פרק 1. מבוא
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM) ARCHITECTURE Vivek E.B.
Dept. of Business Administration
Special Topic: Wireless Security
Security in Wide Area Networks
Presentation transcript:

Mobile Telephone System And GSM Security

The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog Voice Second-Generation Mobile Phones Second-Generation Mobile Phones Digital Voice Digital Voice Third-Generation Mobile Phones Third-Generation Mobile Phones Digital Voice and Data Digital Voice and Data

Advanced Mobile Phone System (a) Frequencies are not reused in adjacent cells. (b) To add more users, smaller cells can be used.

Channel Categories 832 channels in four categories: 832 channels in four categories: Control (base to mobile) to manage the system Control (base to mobile) to manage the system Paging (base to mobile) to alert users to calls for them Paging (base to mobile) to alert users to calls for them Access (bidirectional) for call setup and channel assignment Access (bidirectional) for call setup and channel assignment Data (bidirectional) for voice, fax, or data Data (bidirectional) for voice, fax, or data

D-AMPS Digital Advanced Mobile Phone System (a) A D-AMPS channel with three users. (b) A D-AMPS channel with six users.

GSM (1) GSM uses 124 frequency channels, each of which uses an eight-slot TDM system

GSM (2) A portion of the GSM framing structure.

GSM Security

GSM System Architecture IMSI: International Mobile Subscriber Identity BSC: Base Station Controller BTS: Base Transceiver Station MSC: Mobile Switching Center HLR: Home Location Register VLR: Visitor Location Register AuC: Authentication Center

GSM Authentication Protocol SRES = A3(Ki, RAND)

GSM Encryption A5 Kc(64 bit), Frame Number(22 bit) 114 bit key stream Frame Cipher text A5 Kc(64 bit), Frame Number(22 bit) 114 bit key stream Frame MS BTS Kc = A8(Ki, RAND)

GSM Security Issues Limited Encryption Scope Limited Encryption Scope Only the over-the-air traffic is encrypted Only the over-the-air traffic is encrypted Message on backbone are plain text Message on backbone are plain text Active Attacks (Impersonating) Active Attacks (Impersonating) Unilateral Authentication Unilateral Authentication Only user authentication, No BTS authentication Only user authentication, No BTS authentication Potential for false base station attack Potential for false base station attack Key Transmission Key Transmission IMSI, RAND, SRES, Kc are transmitted without encryption IMSI, RAND, SRES, Kc are transmitted without encryption

GSM Security Issues Weak Encryption Algorithms Weak Encryption Algorithms Both A3 and A8 use COMP 128 which has been broken Both A3 and A8 use COMP 128 which has been broken A5/0 has no security at all A5/0 has no security at all A5/1 and A5/2 has been broken A5/1 and A5/2 has been broken SIM card can be cloned by now SIM card can be cloned by now Channel Hijack Channel Hijack Protection against radio channel hijack relies on encryption Protection against radio channel hijack relies on encryption Encryption is not used in some networks. Encryption is not used in some networks. Inflexibility Inflexibility Inadequate flexibility to upgrade and improve security functionality over time Inadequate flexibility to upgrade and improve security functionality over time

Questions? Mahdi Hasheminezhad