1 / 30

Security Issues in Mobile WiMAX (IEEE 802.16e)

Security Issues in Mobile WiMAX (IEEE 802.16e). Frank, A Ibikunle Covenant University, Electrical and Information Engineering Department, Ota. 2009 IEEE Mobile WiMAX Symposium. Wimax. 802.16x 802.16d (fixed) 802.16e (mobile) 802.16e ----3G : 韓國 ( WiBro ), 美國 , 中國大陸 ( 專利 )

vicki
Télécharger la présentation

Security Issues in Mobile WiMAX (IEEE 802.16e)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Issues in Mobile WiMAX(IEEE 802.16e) Frank, A Ibikunle Covenant University, Electrical and Information Engineering Department, Ota. 2009IEEEMobile WiMAX Symposium

  2. Wimax • 802.16x • 802.16d (fixed) • 802.16e (mobile) • 802.16e ----3G : 韓國(WiBro), 美國, 中國大陸(專利) • 802.16m ---- 4G: 起步

  3. 台灣與全球 • 頻譜與執照 • 北區 南區 全區 • 全球 • Map:http://www.wimaxmaps.org/

  4. 和WiFi的不同 • http://www.youtube.com/watch?v=chlGqhRKVjQ

  5. 基本名詞 • Main roles involved in 802.16: • Base Station (BS) • Mobile Station (MS) / Subscriber Station (SS) • Two security protocols of interest: • Authentication/Authorization protocol, establishes a shared Authorization Key (AK) • 3-way Traffic Encryption Key (TEK) Handshake

  6. AK used to derive various other keys • Traffic Encryption Keys are used to encrypt message data between the BS and MS • KEK: key encryption key • MBS:Multicast and Broadcast Service

  7. 3-way TEK Handshake • After authentication, BS initiates a 3-way handshake to transfer TEKs to MS • TEKs generated by BS • Have a specified lifetime, after which new TEK is requested by MS • Structure of the 3-way handshake: Challenge: BS → MS Request:MS → BS Response: BS → MS

  8. Define • Security: protection of data being transmitted over a wireless networks.

  9. CIA • Confidentiality: Allowing only that the intended legitimate recipients to read encrypted messages(information). • Integrity: is referred to as ensuring that another party has not altered messages after it has been sent. • Authentication: This is making sure that parties sending messages or receiving messages are who they say they are, and have the right to undertake such actions.

  10. On wired networks: • VPNs • IPSec • IDS • Firewalls…

  11. Major Problem • Securing wireless signal is in its mode of transmission communicated through the air.

  12. 802.16eprovides 2 authentication • RSA • 加密演算法: 因數分解 • 難度和bits有關 • EAP(Extensible Authentication Protocol)

  13. EAP • 常用在無線網路 • Data link layer • Packet • An authentication framework: only define message format and has many methods. • Using EAP can define a way to encapsulate EAP messages. • Provides some common functions and negotiation of authentication methods called EAP methods.

  14. MAC • Message AuthenticationCode • Like Digital Signature, but using symmetry key.

  15. Initial network • EAP-based authentication. • The BS and BS set up a common AK. • KEK is derived from the AK. (and AK is used to securely transfer further keys) • MAC digest and the transferred TEK is encrypted by the KEK. • After above, the3-way TEK-exchange for each data connection is executed. • AK – KEK -TEK

  16. Security Flaws • Unauthenticated messages • Unencrypted management communication • Shared keys in Multicast and Broadcast Service

  17. Unauthenticated messages • Most of the management messages defined in IEEE 802.16e are integrity protected. • Done by: • HMAC: Hash based message authentication code • CMAC: Cipher based message authentication code • But some messages are not covered by any authentication mechanism.

  18. Unauthenticated messages • MOB_TRF-IND:Traffic Indication message • MOB_NBR-ADV: Neighbor Advertisement message • FPC: Fast Power Control message • MSC-REQ: Multicast Assignment Request message • DBPC-REQ: Downlink Burst Profile Change Request message • PMC-REQ: • MOB_ASC-REP:Association Result Report • RNG-REQ: Ranging Request message

  19. Unencrypted management communication • In Mobile WiMAXmanagement messages are still sent in the clear. • Nearly all management information exchanged between MS and BS can be accessed by a listening adversary. • Collecting management info can create detailed profiles about MSs. • Including capabilities of devices, security settings, associations with base stations… • Also can determine the movement and approximate position of the MS.

  20. Shared keys in Multicast and Broadcast Service • Encrypted symmetrically with a shared key. • Also message authentication is based on the same shared key. • This alg. Contains the vulnerability that every group member can also encrypt and authenticate broadcast messages as if they originate from the real BS(be forged).

  21. Shared keys in Multicast and Broadcast Service • GTEK:Group TEK • MBRA: Multicast and Broadcast Rekeying Algorithm

  22. The Solutions • For Unauthenticated messages: • Easily using a HMAC or CMAC digit as well. • But most messages are very short, a tradeoff between the security and the effectiveness of the protocol has to be found. • Suggestion:use CMAC and Short HMAC to 64bits, and with all other needed parameters (i.e., packet number, key sequence number and reserved fields), both will be 104 bits in total.

  23. HMAC • 詳細請看:http://en.wikipedia.org/wiki/HMAC • Use SHA-1 (128bits ?) • SHA: Secure Hash Algorithm

  24. CMAC • 詳細請看: http://en.wikipedia.org/wiki/CMAC,too.(有點複雜......) • Use AES-128 (感覺也很偉大……) • AES:Advanced Encryption Standard • A symmetric-key encryption standard adopted by the U.S. government.

  25. For Unencrypted management communication: • Encrypt directly after both sides have established a common key. • Doesn’t introduce any overhead to the connection. • Possible to use a symmetric key, decryption can be processed very fast.

  26. For broadcasted/multicasted messages(shared keys): • From outside the group. • Use asymmtric cryptography(but may not effective). • And for the MBS, see Figures as followings.

  27. Figure 1. Possible solutions to transmit GTEK in a secure way

  28. Figure 2. Avoiding key forgery by a GTEK hash chain

  29. Contributions • Describe different security vulnerabilities found in IEEE 802.16e. • Proffer possible solutions to eliminate them.

  30. Thanks Q & A

More Related