+ All Categories
Home > Education > Security in bluetooth, cdma and umts

Security in bluetooth, cdma and umts

Date post: 07-Jul-2015
Category:
Upload: ankit-gupta
View: 269 times
Download: 1 times
Share this document with a friend
35
MOTILAL NEHRU NATIONAL INSTITUTE OF TECHNOLOGY ALLAHABAD SECURITY IN BLUETOOTH, CDMA AND UMTS
Transcript
Page 1: Security in bluetooth, cdma and umts

MOTILAL NEHRU NATIONAL INSTITUTE OF TECHNOLOGYALLAHABAD

SECURITY IN BLUETOOTH, CDMA AND

UMTS

Page 2: Security in bluetooth, cdma and umts

BLUETOOTH System for short range wireless communication

Wireless data transfer via ACL link

Data rates up to 3 Mb/s

2.4 GHz ISM band (Industrial Scientific Medicine)

Typical communication range is 10-100 meters

Bluetooth SIG (Special Interest Group) developed the

technology

Page 3: Security in bluetooth, cdma and umts

SECURITY THREATS

Disclosure Threat

Integrity Threat

Denial of Service (DoS)

Page 4: Security in bluetooth, cdma and umts

ATTACKS

Snarf Attack

Backdoor Attack

BlueBug Attack

BlueJack Attack

Denial of Service Attack

BluePrinting Attack

Page 5: Security in bluetooth, cdma and umts

SECURITY LEVELS AND MODES

Security Levels:

Silent

Private

Public

Security Modes:

Non Secure

Service Level Enforced Security

Link Level Enforced Security

Page 6: Security in bluetooth, cdma and umts

AUTHENTICATION, AUTHORIZATION , ENCRYPTION

Authentication is the process of proving the identity of

one piconet member to another

Authorization determines whether the user is authorized

to have access to the services provided

Encryption is the process of encoding the information so

that no eavesdropper can read it

Page 7: Security in bluetooth, cdma and umts

SECURITY OPERATIONS

Page 8: Security in bluetooth, cdma and umts

AUTHENTICATION

Page 9: Security in bluetooth, cdma and umts

AUTHORIZATION

Page 10: Security in bluetooth, cdma and umts

ENCRYPTION

Encryption Mode 1

Encryption Mode 2

Encryption Mode 3

Page 11: Security in bluetooth, cdma and umts

ENCRYPTION PROCEDURE

Page 12: Security in bluetooth, cdma and umts

KNOWN VULNERABILITIES

Spoofing through Keys

Spoofing through a Bluetooth Address

PIN Length

Page 13: Security in bluetooth, cdma and umts

COUNTERMEASURES Know your Environment

Be Invisible

Abstinence is best

Use only long PIN codes (16 case sensitive

alphanumerical characters)

Requiring Authentication for every L2CAP request

Using additional security at software level and an

additional password to physically protect the Bluetooth

devices

Page 14: Security in bluetooth, cdma and umts

COUNTERMEASURES CONTD… Requiring re authentication always prior to access of a

sensitive information / service

To prevent Man-in-the-middle attack, approach is to

make it difficult for an attacker to lock onto the

frequency used for communication. Making the

frequency hopping intervals and patterns reasonably

unpredictable might help to prevent an attacker from

locking onto the devices signal.

Page 15: Security in bluetooth, cdma and umts

PROPOSED SOLUTION FOR DOS ATTACK

When the pairing message is sent by one device

When the attacker is sending the message with the

address, which is already connected to Bluetooth device

When the pairing message sent by more than one device

When the attacker is changing the Bluetooth address of

itself with another Bluetooth address

Page 16: Security in bluetooth, cdma and umts

UMTS security

Page 17: Security in bluetooth, cdma and umts

UMTS system architecture (R99) is based on GSM/GPRS

Page 18: Security in bluetooth, cdma and umts

POSSIBLE ATTACKS ON UMTS

Denial of service Identity catching Impersonation of the network Impersonation of the user

Page 19: Security in bluetooth, cdma and umts

3G SECURITY FEATURES „ Mutual Authentication

The mobile user and the serving network authenticate each other

„ Data Integrity Signaling messages between the mobile station and RNC

protected by integrity code Network to Network Security Secure communication between serving networks. IPsec

suggested Secure IMSI (International Mobile Subscriber

Identity) Usage The user is assigned a temporary IMSI by the serving

network

Page 20: Security in bluetooth, cdma and umts

3G SECURITY FEATURES CONTD…

� User – Mobile Station Authentication

The user and the mobile station share a secret key, PIN � Secure Services

Protect against misuse of services provided by the home network and the serving network

� Secure Applications

Provide security for applications resident on mobile station

Page 21: Security in bluetooth, cdma and umts

AUTHENTICATION AND KEY AGREEMENT

„ AuC and USIM share

permanent secret key K

Message authentication functions f1, f1*, f2

key generating functions f3, f4, f5

„ AuC has a random number generator

„ AuC has scheme to generate fresh sequence numbers

„ USIM has scheme to verify freshness of received

sequence numbers

Page 22: Security in bluetooth, cdma and umts

AUTHENTICATION AND KEY AGREEMENT

128 bit secret key K is shared between the home network and the mobile user

Home Network Mobile station

Page 23: Security in bluetooth, cdma and umts

Complete Message flow for successful AKA

Page 24: Security in bluetooth, cdma and umts

Encryption

Page 25: Security in bluetooth, cdma and umts

Integrity Check

Page 26: Security in bluetooth, cdma and umts

NETWORK DOMAIN SECURITY IPSec

IP traffic between networks can be protected with IPSEC between security gateways

Encapsulating Security Payload (ESP) is used for protection of packets

ESP is always used in tunnel mode Advance Encryption Standard (AES)

Page 27: Security in bluetooth, cdma and umts

CDMA

Page 28: Security in bluetooth, cdma and umts

CODE DIVISION MULTIPLE ACCESS (CDMA)

Channel access method used by various radio

communication technology

Employs spread spectrum technology and a special

coding scheme

Attacks are very difficult and rare

Page 29: Security in bluetooth, cdma and umts

DIFFERENCE BETWEEN CDMA, TDMA AND FDMA

Page 30: Security in bluetooth, cdma and umts

TYPES OF CDMA

Frequency Hopping Spread Spectrum CDMA

Direct Sequence Spread Spectrum CDMA

Page 31: Security in bluetooth, cdma and umts

SECURITY

By design, CDMA technology makes eavesdropping very

difficult

42-bit PN (Pseudo Random Noise) sequence

64-bit authentication key (A-Key)

Electronic Serial Number (ESN) of the mobile

Page 32: Security in bluetooth, cdma and umts

AUTHENTICATION

Page 33: Security in bluetooth, cdma and umts

AUTHENTICATION MODEL

Page 34: Security in bluetooth, cdma and umts

ENCRYPTION

Page 35: Security in bluetooth, cdma and umts

Thank You!!!!!


Recommended