Securing USIM-based Mobile Communications from Interoperation of SIM-based Communications
نویسندگان
چکیده
Mobile networks security is constantly evolving and adapting to meet the needs of users and network operators. It is a requirement that there be interoperation of legacy security frameworks into modern mobile networks. Mobile networks originally had no real security which proved to be a deployment that was attacked constantly and the providers were defrauded of millions of dollars. To address the issues the SIM authentication protocols were developed to secure the resources of the network providers. The original SIM security framework developed in GSM networks had weaknesses brought about by the one way authentication protocol as well as weaknesses in the algorithms used to secure the communication. The evolution of authentication in mobile networks to address the problems in the SIM framework brought about the creation of the USIM protocols used in UMTS, LTE and WiMAX to secure the network from the SIM framework security issues. The integration of those two SIM and USIM frameworks brought forward the major weaknesses first found in the SIM framework. This paper proposes simple and effective solutions to reduce the possible attacks on the USIM protocols due to the above integration. First we propose a subtle modification to the SIM based GSM security protocols as a stand-alone solution, and then a modification to the USIM based UMTS security protocols is proposed as a second solution.
منابع مشابه
A USIM-Based Uniform Access Authentication Framework in Mobile Communication
With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with the mobile core networks through different measures. At present, in mobile communication, though access authentication methods of various access networks are different from each other, they...
متن کاملMobile communication security controllers an evaluation paper
Cellular communication via a traditional mobile handset is a ubiquitous part of modern life and as device technology and network performance continues to advance, it becomes possible for laptop computers, Personal Digital Assistants (PDAs) and even electrical meters to better exploit mobile networks for wireless communication. As the diverse demands for network access and value added services i...
متن کاملSmall Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
Side-channel attacks are an increasingly important concern for the security of cryptographic embedded devices, such as the SIM cards used in mobile phones. Previous works have exhibited such attacks against implementations of the 2G GSM algorithms (COMP-128, A5). In this paper, we show that they remain an important issue for USIM cards implementing the AES-based MILENAGE algorithm used in 3G/4G...
متن کاملWireless security: securing mobile UMTS communications from interoperation of GSM
Wireless communications have revolutionized the way the world communicates. An important process used to secure that communication is authentication. As flaws in the security of a wireless network are discovered new protocols and algorithms are required to meet those security issues. When creating new algorithms and systems it is possible that the existing equipment may not be able to implement...
متن کاملگزارش یک مورد اطلاع خودکار قند خون بیمار دیابتی به پزشک با استفاده از سیستم Global system for Mobile Communications
Background: Blood glucose controlling is a major issue in diabetes management. Many fluctuations in blood glucose level make the close controlling of glucose by physicians as one of the most important principles in diabetic patients managing. Methods : The case was a 58 y/o man with a history of 14 years old diabetes under insulin therapy. After informed consult and description about using ...
متن کامل