Mobile Security / /

Similar documents
Mobile Security Fall 2013

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: )

Cellular Communication

GPRS and UMTS T

Understanding Carrier Wireless Systems

Cellular Networks and Mobility

COMP327 Mobile Computing Session: Lecture Set 5 - Wireless Communication Part 2

Internal. GSM Fundamentals.

Basics of GSM in depth

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab

Pertemuan 7 GSM Network. DAHLAN ABDULLAH

E1-E2 UPGRADATION COURSE CONSUMER MOBILITY. 3G Concept

Chapter 2 The 3G Mobile Communications

Hands-On Modern Mobile and Long Term Evolution LTE

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

RNV Vehicular Communications Part II Radio Networks for Vehicular Communications Roberto Verdone

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper

Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department

Security of Cellular Networks: Man-in-the Middle Attacks

WIRELESS SYSTEM AND NETWORKING

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture

GLOSSARY OF CELLUAR TERMS

Chapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology

Practical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning

Overview. IS-95A + TSB-74/J-STD-008 cdmaone. Current Network Architecture. IS-95A Performance Issues. IS-95B Enhancements

Chapter 10: Wireless Networking. School of information science and Engineering, SDU

ITU/BDT Regional Seminar on Mobile and Fixed Wireless Access for Broadband Applications for the Arab Region

CSC 401 Data and Computer Communications Networks

Mobile and Sensor Systems

Advanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013

Session 4 Networks II

Chapter 3 GSM and Similar Architectures

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

E3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only

GSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS

RF OPTIMIZATION FOR QUALITY IMPROVEMENT IN GSM NETWORK

Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

Mobility: vocabulary

Signaling System 7 (SS7) By : Ali Mustafa

Wireless Networking: An Introduction. Hongwei Zhang

LTE : The Future of Mobile Broadband Technology

Communication Systems for the Mobile Information Society

Wireless systems overview

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

Beyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA)

Technical description of international mobile roaming May 2010

GSM System Overview. Ph.D. Phone Lin.

CSC 4900 Computer Networks: Mobility

INTRODUCTION TO GSM DATA SERVICES. ETI25111 Monday, April 3, 2017

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Mobile Communications

REPORT ON GUEST LECTURER (INDUSTRY) BTS, GSM ARCHITECTURE & CALL FLOW IN GSM

TU/ITC Regional Seminar on etwork Evolution to NGN & FMC or CEE, CIS and Baltic States

Introduction to Communication Theory

Wireless Communication

University of Agder Department of Information and Communication Technology EXAM

Advanced Computer Networks. WLAN, Cellular Networks

GPRS System Architecture

Short Message Service (SMS)

GSM and Similar Architectures Lesson 13 GPRS

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Module 6: Wireless Mobile Networks

Välkomna till Avancerad Telekommunikation. Welcome to Advanced Telecommunication. Ulf Körner

Last time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3!

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

Information Technology Mobile Computing Module: GSM Handovers

Chapter 3. 3G Operational Issues. For internal circulation of BSNL only Page 1

Evolution from GSM to UMTS (IMT-2000)*

Mobile Security Fall 2014

Introduction to Wireless Networks. Chapter 7: Introduction to Heterogeneous Networks and

Big Picture. ~10 years between generations

Implementing CDMA in TDMA Networks Leveraging the success of CDMA

Glossary 1. ARPU or Average Revenue per User A method of measuring revenue associated with the delivery of mobile commerce services by MNOs.

Evolution from GSM to UMTS

Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)

Basic Principles of Next Generation Networks and Applications.

3G Mobile UMTS. Raghavendra J 1, Anji Reddy Y 2, Deepak Kumar R 2, Ravi T 3

Signaling Protocol Encoding and Simulation for Third Generation CDMA Network Air-Interface

COMP327 Mobile Computing Session:

Please refer to the usage guidelines at or alternatively contact

Mobile School Training International Mobile Communication

Opportunities and Challenges in India s Growing Computing and Wireless Broadband Market

PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS

Overview. M-commerce vs. E-commerce

CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION

COMP327 Mobile Computing Session: Lecture Set 7 - Wireless Communication

Lecture Objectives. Lecture 1 Wireless Environment and Wireless LANs. Agenda (1) Agenda (2) Wireless Spectrum (1)

EXPERIMENT N0: 06 AIM:TO DESIGN UMTS NETWORK USING OPNET MODELER APPARATUS: OPNET MODELER 14.0

Communications in ITS. Houston CDPD Experiences What s next for Cellular

International Journal of Scientific & Engineering Research, Volume 5, Issue 10, October ISSN

Telecom Learning. Technology

Announcements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon

WELCOME Mobile Applications Testing. Copyright

Mobile Systems Challenges in Next Generation Networks

ITU-BDT Regional Workshop on Guidelines on the Smooth transition of Existing Mobile Networks to IMT-2000 for the Arab Region

Wireless Personal Area Networks & Wide Area Networks

GPRS billing: getting ready for UMTS

Transcription:

Mobile Security 96-835 / 18-639 / 14-829 Patrick Tague 2 Sept 2010 Class #4 Overview of Mobile/Cellular Systems

Agenda Overview of mobile cellular systems System architecture and overview 2G, 2.5G, 2.75G, and 3G systems Security concerns for: User Service provider Government

Generic Mobile Architecture Interconnection Network Cellular Provider Internet Public Telephone Network

Past-to-Current Systems 2G (digital PCS) GSM global system for mobile communication CDMA Cellular (IS-95A) 2.5G (IP-based) GPRS general packet radio service IS-95B, CDMA2000-1xRTT 2.75G (IP-based) EDGE enhanced data rates for GSM evolution 3G (IP-based) UMTS universal mobile telecom system TD-CDMA, WCDMA, CDMA2000-3xRTT

adapted from [M. Stepanov; http://www.gsm-security.net/] 2G GSM/CDMA Architecture Mobile Stations Base Station Subsystem Network Management Subscriber and terminal equipment databases SIM BTS Exchange System OMC SIM BTS BSC MSC VLR SIM HLR AUC SIM BTS EIR

GPRS 2G 2.5G 2.75G Adds an IP-overlay on circuit-switched GSM network Introduces packet data service Only architectural change is addition of GSN (GPRS Support Node) that acts as a gateway to Internet or other GPRS networks EDGE Changes GSM physical layer (modulation and coding) Otherwise the same as GPRS CDMA2000 Essentially a wideband-version higher-capacity CDMA

GSM vs. CDMA Debate Really, it's the TDMA vs. CDMA debate Let's digress...

Multiple Access FDMA freq. division multiple access CDMA TDMA time division multiple access: flip X & Y axes TDMA + FDMA this is actually what GSM does images 2010 Patrick from Tague [Erik Lawrey; SkyDSP.com]

How CDMA Works Alice's data: 1001 Alice's chip code: 11010 Alice Alice's output: 11010 00101 00101 11010 Bob Bob's data: 0011 Bob's chip code: 01011 Bob's output: 10100 10100 01011 01011 Received (superposition): 11110 10101 01111 11011 11110 11010 = 3, 3/5 > 1/2, so Alice sent a 1 11110 01011 = 2, 2/5 < 1/2, so Bob sent a 0

TDMA vs. CDMA Debate Where CDMA wins: Capacity - CDMA has better frequency reuse in adjacent cells (each cell also has a unique code), so more users can be supported Privacy - CDMA provides inherent privacy unless chip codes are public information Reliability/smooth degradation TDMA has hard limit on N users, N+1 st user is denied CDMA shares Diversity CDMA spreads info over wider bandwidth Environment Existing cells can be upgraded to support more users

TDMA vs. CDMA Debate Where TDMA wins: Maturity - TDMA has been around for a longer time Self-jamming loss of synchronization in CDMA causes users to interfere with each other TDMA and FDMA can use guard slots/bands to prevent this Soft handoff CDMA soft handoff requires simultaneous contact with both towers, which is more complicated than hard handoff in TDMA/FDMA Overall, who wins?

3G Technologies UMTS is basically, the convergence of GSM and CDMA technologies into a common framework TD-CDMA combines TDMA and CDMA WCDMA (similar to EDGE with CDMA) CDMA2000-3xRTT (three times the channel usage as 1xRTT) Does TDMA vs. CDMA matter anymore?

Example: VZW's 3G Network image from [VZW CDMA Network Security whitepaper]

Basic Security Concerns Interconnection Network Cellular Provider Internet Identification of calling/called parties Public Telephone Network Voice privacy over wireless medium Verifiable billing records and audit trail Caller identity privacy Protection from fraud and masquerading

Users' Security Requirements No user/entity should be able to bill calls on another user's behalf Stolen mobile devices shouldn't be able to make calls The network shouldn't record calls, only enough info to perform billing functions No records of digital service usage should be made Voice eavesdropping should be impossible A mobile user's location should be private until disclosed (except in emergencies) A device's user should not be identifiable until disclosed

Providers' Security Reqs. Communication service billing should be correctly managed All types of fraud should be prevented and mechanisms should be updated as necessary Correct naming and addressing of devices must be implemented; routing functions must be secure Providers should be able to add services / functions and provide desired security for them

Gov't Security Requirements Location information must be provided to emergency services Robust infrastructure should be available in emergencies Communication and information must be accessible to law enforcement Useful measures must be in place for monitoring and protection of essential assets and infrastructures

What's Next? Security in GSM and CDMA systems