200 likes | 308 Views
An Improvement on Privacy and Authentication in GSM. Young Jae Choi , Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science, Kyungpook National University, Korea. Contents. Introduction Acronyms GSM authentication protocol
E N D
An Improvement on Privacy and Authentication in GSM Young Jae Choi , Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science, Kyungpook National University, Korea
Contents • Introduction • Acronyms • GSM authentication protocol • Proposed authentication protocol • Location privacy in GSM • Enhanced location privacy protocol • Discussions • Conclusion Kyungpook National University, Korea
Introduction • Two major security worries in Mobile communication • Confidentiality (privacy) • The guarantee that messages are not intercepted by an eavesdropper • Authentication • To ensure that any unauthorized user cannot fraudulently obtain services • Security features provided by GSM • Subscriber identity authentication • Subscriber identity confidentiality • User data and signaling information confidentiality on radio path Kyungpook National University, Korea
Acronyms • MS : Mobile Station • HLR : Home Location Register • AuC : Authentication Center • VLR o/n : Visiting Location Register old/new • MSC: Mobile Switching Center • IMSI : International MS Identity • TMSIo/n: Temporary Mobile Subscriber Identity old/new • RAND : Random Number • SRES : Signed response • Kc : a Ciphering Session Key • Ki : a user’s secret key shared with HLR • A3, A8, A5 : unpublished one-way func. Standardized Enc/Dec alg. Kyungpook National University, Korea
GSM authentication protocol • Authentication and Confidentiality in GSM MS VLR HLR / AuC TMSI IMSI RAND Ki A3 Ki SRES [n] RAND RAND [n] A8 Kc [n] SRES A3 = Authentication Yes/No A8 Kc Ciphertext A5 Confidentiality Data Kyungpook National University, Korea
GSM authentication protocol • Drawbacks • The space overhead can occur when the VLR stores sets of authentication parameters. • VLR needs the assistance of HLR when it identifies the MS. If VLR consumes all sets of authentication parameters of MS, it requests additional parameters to the HLR. • There is bandwidth consumption between the VLR and the HLR, when the VLR needs other sets of authentication parameters. • The authentication of VLR/HLR is not instituted in the GSM protocol. • There is no way to provide data/locationconfidentiality in wired network. Kyungpook National University, Korea
Proposed authentication protocol • The design goals of the proposed protocol • To achieve mutual authentication between MS and VLR • To improve the location privacy in wired network • To simplify the authentication flows • To reduce the storage in VLR • To reduce bandwidth consumption between VLR and HLR • Authentication of mobile users is to be done by the VLR instead of the HLR, even if the VLR does not know the subscriber's secret key Ki and A3 algorithm. • Assumption • HLR and VLR shares a symmetric key. Kyungpook National University, Korea
Proposed authentication protocol • Authentication (location updating) MS VLR HLR SRES1 ,TMSI, LAI VLR_ID, EVH(IMSI) Ki RAND Eku(RAND) Eku(RAND) A3 & A8 Ki RAND SRES2 Tki A3 & A8 HLR_ID,SRES2 SRES1 Tki EVH(RAND, Tki) ? SRES1 = SRES2 ETki(TMSInew) RAND KVH : a shared key , Ku = f (IMSI ,HLR_ID ,Ki) : 64bit-length Kyungpook National University, Korea
Location privacy in GSM • Location update using TMSI • IMSI : International MS Identity • TMSI: Temporary Mobile Subscriber Identity • LAI : Location Area Identity Kyungpook National University, Korea
Location privacy in GSM • Drawbacks • IMSI is exposed and delivered in the wired network without any protection • In some abnormal cases, MS sends its IMSI to VLR in the wireless network without any protection Kyungpook National University, Korea
Location privacy problems • Authentication at location updating in a new VLR, TMSI unknown in old VLR MS VLRn VLRo LAI , TMSIo TMSIo Unknown Identity Request IMSI Kyungpook National University, Korea
Location privacy problems • Authentication at location updating in a new VLR, old VLR not reachable MS VLRn VLRo LAI , TMSIo VLR not reachable Identity Request IMSI Kyungpook National University, Korea
A possible attack MS Attacker LAI , TMSIo VLR not reachable TMSI o unknown or Identity Request IMSI Acquire IMSI of the MS Kyungpook National University, Korea
Enhanced location privacy protocol • Abnormal Authentication (location updating) MS HLR VLR TMSI, LAI , SRES1 Eku(RAND) Identity Request AL, HLR_ID, SRES1 VLR_ID, EVH(AL) Eku(RAND) Eku(RAND) SRES2 , HLR_ID EVH(RAND, Tki, IMSI) ? SRES1 = SRES2 ETki(TMSInew) RAND, LAIn AL : Alias of the MS.15 bit-length Kyungpook National University, Korea
Discussions • Features • Mutual authentication between MS and VLR • RAND • Enhanced Location privacy in wired network • Shared symmetric keys (KVH), Alias • Reduced the data flows during the authentication. • 5 flows -> 4flows • Reduced storage space in the VLR (Only Tki is stored) • Reduced bandwidth consumption between the VLR and HLR • VLR Authenticates MS without assistance of HLR • The security of the protocol is based on the existing architecture of the GSM authentication, e.g. A3,A5,A8 Kyungpook National University, Korea
Discussions • Comparison Kyungpook National University, Korea
Conclusion • Drawbacks of the original GSM authentication • Drawbacks of the location privacy protocol • The proposed authentication protocol • Mutual authentication between MS and VLR • Enhanced Location privacy • Reduced the data flows during the authentication.(5 flows -> 4flows) • Reduced storage space in the VLR • Reduced bandwidth consumption between the VLR and HLR • VLR Authenticates MS without assistance of HLR • The security of the protocol is based on the existing architecture of the GSM authentication, e.g. A3,A5,A8 Kyungpook National University, Korea
Thank you Kyungpook National University, Korea