Securing USIM-based Mobile Communications from Interoperation of SIM-based Communications

نویسندگان

  • Eric Southern
  • Abdelkader Ouda
  • Abdallah Shami
چکیده

Mobile networks security is constantly evolving and adapting to meet the needs of users and network operators. It is a requirement that there be interoperation of legacy security frameworks into modern mobile networks. Mobile networks originally had no real security which proved to be a deployment that was attacked constantly and the providers were defrauded of millions of dollars. To address the issues the SIM authentication protocols were developed to secure the resources of the network providers. The original SIM security framework developed in GSM networks had weaknesses brought about by the one way authentication protocol as well as weaknesses in the algorithms used to secure the communication. The evolution of authentication in mobile networks to address the problems in the SIM framework brought about the creation of the USIM protocols used in UMTS, LTE and WiMAX to secure the network from the SIM framework security issues. The integration of those two SIM and USIM frameworks brought forward the major weaknesses first found in the SIM framework. This paper proposes simple and effective solutions to reduce the possible attacks on the USIM protocols due to the above integration. First we propose a subtle modification to the SIM based GSM security protocols as a stand-alone solution, and then a modification to the USIM based UMTS security protocols is proposed as a second solution.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A USIM-Based Uniform Access Authentication Framework in Mobile Communication

With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with the mobile core networks through different measures. At present, in mobile communication, though access authentication methods of various access networks are different from each other, they...

متن کامل

Mobile communication security controllers an evaluation paper

Cellular communication via a traditional mobile handset is a ubiquitous part of modern life and as device technology and network performance continues to advance, it becomes possible for laptop computers, Personal Digital Assistants (PDAs) and even electrical meters to better exploit mobile networks for wireless communication. As the diverse demands for network access and value added services i...

متن کامل

Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards

Side-channel attacks are an increasingly important concern for the security of cryptographic embedded devices, such as the SIM cards used in mobile phones. Previous works have exhibited such attacks against implementations of the 2G GSM algorithms (COMP-128, A5). In this paper, we show that they remain an important issue for USIM cards implementing the AES-based MILENAGE algorithm used in 3G/4G...

متن کامل

Wireless security: securing mobile UMTS communications from interoperation of GSM

Wireless communications have revolutionized the way the world communicates. An important process used to secure that communication is authentication. As flaws in the security of a wireless network are discovered new protocols and algorithms are required to meet those security issues. When creating new algorithms and systems it is possible that the existing equipment may not be able to implement...

متن کامل

گزارش یک مورد اطلاع خودکار قند خون بیمار دیابتی به پزشک با استفاده از سیستم Global system for Mobile Communications

  Background: Blood glucose controlling is a major issue in diabetes management. Many fluctuations in blood glucose level make the close controlling of glucose by physicians as one of the most important principles in diabetic patients managing.   Methods : The case was a 58 y/o man with a history of 14 years old diabetes under insulin therapy. After informed consult and description about using ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012