150 likes | 184 Views
Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil. Syed Rafiul Hussain * , Mitziu Echeverria † , Ankush Singla * , Omar Chowdhury † , Elisa Bertino * Purdue University, University of Iowa. Initial Connection Setup with a Base Station in 4G and 5G Networks.
E N D
Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil Syed Rafiul Hussain*, Mitziu Echeverria†, Ankush Singla*, Omar Chowdhury†, Elisa Bertino*Purdue University, University of Iowa
Initial Connection Setup with a Base Station in 4G and 5G Networks Time & Frame Synchronization System Info. Block Master info. Block Frame Synch.
Fake Base Station in 4G and 5G Networks IMSI Response Authentication Reject Registration Reject IMSI Request How can we prevent cellular devices from connecting to Fake Base Stations? IMSI: International Mobile Subscriber Identity
Potential Defense Techniques Against Fake Base Station Attack Specific Defense Prevent Spoofing of Individual Messages Generic Defense Prevent Spoofing of Broadcast Messages IMSI Request IMSI Request Registration Reject Registration Reject Authentication Reject Authentication Reject
Preventing Broadcast Spoofing Symmetric Key Based Broadcast Authentication TESLA-based Broadcast Authentication msg 2, MAC2, Key 1 Secure Channel msg 3, MAC3, Key 2 Secure channel establishment Delayed key disclosure
PKI-based Mechanism MME Core Network Base Station UE 1. Certificate chain length 2. Certificate Revocation 3. Signature Generation Overhead 4. MitM Relay Self-signed CN-signed MME-signed MIB, SIB1, 6
Optimized PKI Scheme (1/3) A Lightweight Design of Certificate for Cellular Network Propose a specialized certificate format Base Station’s Public Key Cell ID location expiration time signature of MME
Protocol-Level Optimizations Which SIBs require authentication? Which messages require authentication? Frame Synch. Sys. Info. Block Type 1 Master info. Block Sys. Info. Block Type 2 System Info. Block Minimize certificate chain’s transmission SIGN_SIB1 SIB 1, CERT CHAIN SIB2, SIGN_SIB2 Aggregating Authentication
Cryptographic Scheme-level Optimization Reduce the size of the signatures Aggregate SIGN SIGN_BS, SIGN_MME, SIGN_CN SIB1, Compute the expensive crypto operations at offline
Countermeasure for Relay Attacks Distance Bounding Protocol Allow a bootstrapping message to be valid for a short time SIB1, Aggregate SIGN,Timestamp, ∆t, location
Evaluation Results End-to-end delay induced by different digital signature schemes against baseline
Conclusion Prevents devices to connect to malicious base stations. Moderate Overhead (Max: 220 bytes, 28 ms). Backward compatibility.
Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil Syed Rafiul Hussain Purdue University hussain1@purdue.edu