3G Mobile Security - Basics
3G Mobile Security - Basics
Security
Shashishekar R
1ST02EC048
INTRODUCTION :
Third generation mobile systems such as UMTS
[universal mobile telecommunication system]
revolutionized telecommunications technology by
offering mobile users content rich services, wireless
broadband access to Internet, and worldwide
roaming. The users will be able to enjoy Voice-
over-IP, multimedia messaging, and video
conferencing services with up to 2 Mbps data rate.
However the broadcast nature of the wireless
communication and increased popularity of wireless
devices introduce serious security vulnerabilities.
Mobile users and providers must be assured of the
correct identity of the communicating party; user and
signaling data must be protected with confidentiality
and integrity mechanisms. The main aim is to evaluate
current 3G security protocols, implement security
features outlined in these protocols
1G Systems-Features
No data service.
2G Systems-Features
Introduced in early 1990s.
Data rates 9.6 Kbps – 14.4 Kbps..
Uses Circuit Switching.
800-900 MHz band .
Digital radio technology .
International roaming services.
Caller Id & SMS.
Comparison between 2G and 3G
wireless networks
Core Network Used in 2G is TDM and Frame relay
transport as compared with IP and ATM transport in
3G
RNC Call
Agent
Voice Data +
Packet
Voice
IP Core
Radio Access Packet Network
Control
Network (Internet)
Packet
Gateway
IP RAN
2G 2G/2.5G 3G
objectives for 3G security
To ensure that information generated by or relating to a
user is adequately protected
EDGE :
Data Integrity
Secure Services
Secure Applications
Fraud Detection
Flexibility
Authentication and Key Agreement
Generate SQN
RAND AUTN
Generate RAND
K
SQN
K
f1 f2 f3 f4 f5
Serving Network
AV f1 f2 f3 f4
MAC XRES CK IK AK
All that can happen to a fixed host attached to the Internet could
happen to a 3G terminal
Future Research Direction
Extend current simulation implementation
More complicated, perhaps fully loaded, network scenario
Add video conferencing and multimedia streaming traffic
Observe variations in bit error rate and packet drop rate,
among other things
Network-to-network security
How to establish trust between different operators
Is IPsec a feasible solution for secure communication
between networks?
End-to-end security
Can two mobile nodes establish secure communication
channel without relying too much on their serving
network?
How can they exchange certificates or shared secret keys?
Possible solution to existing 3G security
problems
Thank--You
Shashishekar R