Transcript Stepanek

Cellular Network Security
Secure Systems Administration
Spring 2011
Ryan Stepanek
A brief history of cellular networks

Cellular networks have been deployed for the last three
decades

1G networks had maxspeeds of about 9.6 kbs [1]

As network technology evolved, two standards emerged:
CDMA and GSM

Modern cellular networks operate in the third and fourth
generation, reaching theoretical speeds up to 100 Mbit/s
Challenges of Cellular Networks






Open Access Wireless – No physical connection
necessary!
Bandwidth Limitations – Everyone has to share the
network.
System Complexity – The larger the implementation of
the system the more difficult it is to maintain security.
Confidentiality – Private data needs to be encrypted.
Integrity – Must minimize data loss; more services being
sent through the network.
Authentication With Other Networks – Companies need
to play nice with each other.
Security Issue for Cellular Networks

Operating systems on mobile devices – Android,
Windows, iPhone

Web services – Potential for abuse through the addition
of new services; DOS.

Location Detection – Keep the location of the user
private!

Spyware; malware – Phones and network may be
vulnerable.
Phone OS by Market Share
Phone OS Market Share – US, UK, China
I-Security

Mobile OS – left open to viruses and malware


History of being slow to patch




Users can jailbreak and run their own code
SMS virus – over two months to patch!
Spreading the virus required only the victims phone number
Spread through memory corruption in iPhone[6]
Potentially detrimental to host network


Dangerously popular – In December 2009 AT&T was forced to
halt iPhone sales in New York[5]
Can you hear me now? Network load became too great for
existing infrastructure
Blackberries

Very good encryption




Relies on security through obscurity
Vulnerable through third party apps


Causes conflicts with governments on the grounds of national
security
i.e. India 2009[7]
i.e. the Webkit browser was used at this year’s Pwn2Own
hacking expo.[8]
Blackberry Enterprise Server(BES)


Commonly used in business and government, compromising
the server could allow access to phone information
Fairly secure if configured correctly(EAL 4+)[10]
Android

Open source



Incredibly threatening to network profit/security
i.e. free WiFi tethering
Rooting




Allows greater control over the phone
Creates a natural conflict between the service provider and
customer
Also increases vulnerability to viruses i.e. custom ROMs will
not receive updates from the service provider
Companies now actively trying to hinder rooting i.e.
Motorola[8]
GSM vs CDMA

GSM






More than 3.8 billion people worldwide
Far more common outside of North America
More than 89 percent of market share[4]
More than more than 212 countries and territories[3]
Interferes with some electronics
CDMA



Transmits data signal modulated with pseudorandom code
Generally allows for larger transmission cells
Allows users to share frequencies
3G – Network Components

Radio Access Network



Towers
Radio Network Controllers
Core Network




Packet Switched Network
Circuit Switched Network
SGSN – Handles Access Control and Route Management
GGSN – Gateway to the Internet
3G – Implementation
Attacks on Cellular Neworks

DOS/DDOS – Probably the most common.




Jamming


iPhones
Services and bandwidth usage seems to be increasing faster
than network infrastrucure
More achievable now through infecting phones
Highly localized, similar in effect to DOS
Eavesdropping


Man in the Middle attacks
Session hijacking
3G - Defensive Measures

Network Access Security



Utilizes secret keys and secret key ciphers to maintain
confidentiality
Uses a temporary International Mobile User Identity to
protect the user’s identity.
Challenge Response System


Used when Authenticating
Occurs when user first connects to network, when the
network receives a service request, when a location update is
sent, on attach/detatch request, etc..[1]
3G-Integrity and Confidentiality

Signaling communications between mobile station and
network



F9 algorithm used to calculate 32-bit MAC-I for data integrity
then compared to a calculated XMAC-I
F8 used to keep data confidential, utilizes a cipher key that
comes from the mobile device; output is then XORed with the
original data stream
Both F8 and F9 rely on KASUMI cipher

Based on feistel structure to create 64bit data blocks and a
128 bit key
F8 – Confidentiality Algorithm
3G-Internet Security

Wireless Application Protocol





Protocol that handles wireless devices connecting to the web
Independent of underlying OS
WAP2 – puts devices into direct communication with servers
Uses layers similar to standard networks
IPv6 and IPv4


3G allows for circuit switched and packet switched network
nodes
4G is packet switched nodes only; completely IPv6 compatible
Cellular Network Security – Factors to Consider

Liability




Quantity and nature of data
Potential harm from data
Lawsuits
Profits



Bandwidth is not free
Capability of devices vs. popularity of devices
Risk for every network expansion
Sources

[1] “Security in Wireless Cellular Networks” Gardezi, Ali.
http://docs.google.com/viewer?a=v&q=cache:mFeuQOB24gwJ:www1.cse.wustl.edu/~jain/cse5
7406/ftp/cellular_security.pdf+cellular+network+security&hl=en&gl=us&pid=bl&srcid=ADGEESg
k1O3TVCFitfU0KCDfZp2FIogPvw0bjkw767GFdWlAOyWm866YcuCt8IEn2uag617WAW0S3
2eIhFbaoMgQiJh_WJi5QYE2RIwkizPeTRzmsFcBNMtESgBQNA9NmF5VgqtrQBe0&sig=AHIEt
bR683Y3fhGxdHQa47sZCueMwq3jsA

[2] “Exploiting Vulnerabilities and Security Mechanisms in Internet Based SMS Capable Cellular
Networks” Azim, Akramul.
http://docs.google.com/viewer?a=v&q=cache:AmTvXrmYVNoJ:citeseerx.ist.psu.edu/viewdoc/d
ownload%3Fdoi%3D10.1.1.121.2158%26rep%3Drep1%26type%3Dpdf+cellular+network+secu
rity&hl=en&gl=us&pid=bl&srcid=ADGEESiJC2Zrk8fOWOH70HSEDwahX_x1pJXZOS2AndHNcBqh0Qm3xcBlkqiVgOW0spQM0aqzoMxYkuT
hzhKiHCKxOa8nc8slQ_qDM1a5OQ_zO0qnBL3Y_9zylwEMLPYr8ORC5mXftkM&sig=AHIEt
bQjQIcq5LnEbumpqWogCCN3u0uXVA
Sources - Countinued

[3] “CDMA vs. GSM – Which One is the BestYou?” http://www.cellutips.com/gsm-vs-cdmawhich-one-is-the-best-for-you/

[4] “GSM: Global System for Mobile Communications”
http://www.3gamericas.org/index.cfm?fuseaction=page&sectionid=242

[5] “AT&T apparently resumes online iPhone sales in New York City”
http://articles.cnn.com/2009-12-28/tech/iphone.sales.nyc_1_iphone-sales-online-sales-at-tservice?_s=PM:TECH

[6] “First iPhone Virus Found Using SMS Testing”
http://ironmill.wordpress.com/2009/07/30/iphone-virus/

[7] “BlackBerry encryption 'too secure': National security vs. consumer privacy”
http://www.zdnet.com/blog/igeneration/blackberry-encryption-too-secure-national-securityvs-consumer-privacy/5732

[8] “BlackBerry security breached at Pwn2Own 2011” http://crackberry.com/blackberrysecurity-breached-pwn2own-2011

[9] “Are the Days of Rooting Android Phones Coming to an End?” http://www.droidlife.com/2011/04/04/are-the-days-of-rooting-android-phones-coming-to-an-end/

[10] “Approvals and Certifications”
http://us.blackberry.com/ataglance/security/certifications.jsp