lecture 10 mobile security and m-commerce 第 10 讲 移动安全与移动商务

66
Lecture 10 Mobile Security and M-commerce 第 10 第 第第第第第第第第第 §10.1 Basics of Security §10.2 Security in Cellular Networks §10.3 Security in WLAN §10.4 Security in Ad hoc Networks §10.5 Mobile Commerce

Upload: viveka

Post on 20-Jan-2016

116 views

Category:

Documents


0 download

DESCRIPTION

Lecture 10 Mobile Security and M-commerce 第 10 讲 移动安全与移动商务. §10.1 Basics of Security §10.2 Security in Cellular Networks §10.3 Security in WLAN §10.4 Security in Ad hoc Networks §10.5 Mobile Commerce. Confidentiality. Secure. Integrity. Availability. CIA – Requirements. Authentication. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Lecture 10 Mobile Security and M-commerce第 10 讲 移动安全与移动商务

§10.1 Basics of Security

§10.2 Security in Cellular Networks

§10.3 Security in WLAN

§10.4 Security in Ad hoc Networks

§10.5 Mobile Commerce

Page 2: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

CIA – Requirements

Confidentiality

AvailabilityIntegrity

Secure

Page 3: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

AAA -- Measurements

Authentication

AccountingAuthority

Secure

Page 4: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Encryption

Symmetric-key cryptographyBlock: AES, DES

Stream: RC4

Hash: SHA, MD5

Public-key cryptographyRSA, DH, etc.

Page 5: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

PKI

Infrastructure on Internet digital certificates + public-key cryptography + certificate authorities

Page 6: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Network Security

Page 7: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

15-441 Networks Fall 2002

7

Common Attacks and Countermeasures

Finding a way into the networkFirewalls

Exploiting software bugs, buffer overflowsIntrusion Detection Systems

Denial of ServiceIngress filtering, IDS

TCP hijackingIPSec

Packet sniffingEncryption (SSH, SSL, HTTPS)

Page 8: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

§10.2 Security in Cellular Networks

GSM providesSubscriber identity confidentiality:

Protection against identifying which subscriber is using a given resource by listening to the signaling exchanges

Confidentiality for signaling and user data

Protection against the tracing of a user's location

Subscriber identity authentication:Protection of the network against unauthorized use

Signaling information element confidentiality:Non-disclosure of signaling data on the radio link

User data confidentiality:Non-disclosure of user data on the radio link

Page 9: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Authentication in GSM

Page 10: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Authentication in GSM

Page 11: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Authentication in GSM -- Summary

‰Only the mobile authenticates itself to the network Authentication is based on challenge-response: Challenge-response vectors are transmitted unprotected in

the signaling network ‰The permanent identification of the mobile (IMSI) is

just sent over the radio link when this is unavoidable:This allows for partial location privacy

As the IMSI is sometimes sent in clear, it is nevertheless possible to learn about the location of some entities

An attacker may impersonate a base station and explicitly demand mobiles to send their IMSIs!

‰ Basically, there is trust between all operators!

Page 12: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

General Packet Radio Service (GPRS)

Data transmission in GSM based on packet switching Using free slots of the radio channels only if data ready

Page 13: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

GPRS Protocol Architecture

Page 14: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

GPRS Security

Security objectives:Guard against unauthorised GPRS service usage (authentication)Provide user identity confidentiality (temporary identification and ciphering)Provide user data confidentiality (ciphering)

Realization of security services:�Authentication is basically identical to GSM authentication:

SGSN is the peer entityTwo separate temporary identities are used for GSM/GPRSAfter successful authentication, ciphering is turned on

User identity confidentiality is similar to GSM:�Most of the time, only the Packet TMSI (P-TMSI) is send over the airOptionally, P-TMSI “signatures” may be used between MS and SGSN to speed up re-authentication

User Data Confidentiality is realized between MS and SGSN:Difference to GSM which just ciphered between MS and BTSCiphering is realized in the LLC protocol layer

Page 15: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

3G Security

Page 16: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

UMTS Security Architecture

(I) Network access security: protect against attacks on the radio interface

(II) Network domain security: protect against attacks on the wireline network

(III) User domain security: secure access to mobile stations

(IV) Application domain security: secure message exchange for applications

(V) Visibility and configurability of security: inform user of secure operation

Homestratum/ServingStratum

USIM HE

Transportstratum

ME

SN

AN

Applicationstratum

User Application Provider Application(IV)

(III)

(II)

(I)

(I)

(I)

(I)

(I)

Page 17: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

UMTS Network Access Security Services

User identity confidentiality :User identity (IMSI) confidentiality

User location confidentiality

User untraceability Entity authentication:

User authentication

Network authentication

Page 18: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

UMTS Network Access Security Services

Confidentiality:Cipher algorithm agreement

Cipher key agreement

Confidentiality of user data

Confidentiality of signaling data ‰ Data Integrity:

Integrity algorithm agreement

Integrity key agreement

Data integrity and origin authentication of signaling data

Page 19: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

UMTS Authentication Mechanism

Page 20: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Generation of UMTS Authentication Vectors

Page 21: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Generation of UMTS Authentication Vectors

The HE/AuC starts with generating a fresh sequence number SQN and an unpredictable challenge RAND

For each user the HE/AuC keeps track of a counter SQNHE

An authentication and key management field AMF is included in the authentication token of each authentication vector

Subsequently the following values are computed:a message authentication code MAC = f1K(SQN || RAND || AMF) where f1 is a message authentication functionan expected response XRES = f2K(RAND) where f2 is a (possibly truncated) message authentication functiona cipher key CK = f3K(RAND) where f3 is a key generating function an integrity key IK = f4K(RAND) where f4 is a key generating function;an anonymity key AK = f5K(RAND) where f5 is a key generating function

Finally the authentication token AUTN = SQN AK || AMF || ⊕�MAC is constructed.

Page 22: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

UMTS User Auth. Function in USIM

Page 23: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

UMTS User Auth. Function in USIM

Upon receipt of RAND and AUTN the USIM:computes the anonymity key AK = f5K (RAND)retrieves the sequence number SQN = (SQN AK) AK⊕ ⊕computes XMAC = f1K (SQN || RAND || AMF) andcompares this with MAC which is included in AUTN.

If they are different�The user sends user authentication reject to the VLR/SGSN

If the MAC is correct�The USIM verifies that the received sequence number SQN is in the correct range:

If SQN is not in the correct range, the USIM sends synchronisation failure back to the VLR/SGSNIf SQN is in the correct range, the USIM computes:

the authentication response RES = f2K(RAND)

the cipher key CK = f3K(RAND) and the integrity key IK = f4K(RAND).

Page 24: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Network Access Security in UMTS -- Summary

Similar to GSM security:The home AUC generates challenge-response vectors

‰The challenge-response vectors are transmitted unprotected via the signaling network to a visited network that needs to check the authenticity of a mobile

IMSI is still revealed to the visited network

Still assumes trust between all network operators Unlike in GSM

The network also authenticates itself to the mobile‰ ‰

Page 25: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

§10.3 Security in WLAN

Most common variant is IEEE 802.11n, with data rate up to 150Mbps

Alternative version 802.11a/b/g 802.11 security

Shared media – like a network hubRequires data privacy - encryption

Authentication necessaryCan access network without physical presence in building

Once you connect, you are an “insider” on the network

Page 26: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

802.11 Security Approaches

Closed networkSSID can be captured with passive monitoring

MAC filteringMACs can be sniffed/spoofed

WEPCan be cracked online/offline given enough traffic & time

WPA and/or EAPMore secure

Page 27: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Wired Equivalent Privacy (WEP)

Part of 802.11 specification To achieve equivalent security as wired link Uses RC4 for encryption Shared key – 40 /104 bits A 24-bit initialization vector (IV)

Page 28: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

WEP Authentication

Open system authentication Essentially it is a null authentication algorithm Simple handshake – just two messages with no

security benefit Usually enhanced with Web-based authentication

E.g. SYSUWLAN

Page 29: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Shared Key Authentication

Mobile node sends request to AP AP sends a 128-byte challenge text Mobile node encrypts the challenge text

using the shared secret key and an IV,

Mobile node sends the secret text to AP. AP decrypts the text and

compare with the original challenge text – a match proves that mobile node knows the secret key.

AP returns a success/failure indication to mobile node and completes the authentication process

Page 30: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

WEP Data Encryption

To protect users from “casual eavesdropping” Depends on an external key management service to

distribute data enciphering/deciphering keys. A block of plaintext is bitwise XORed with a

pseudorandom key sequence of equal length. The key sequence is generated by the WEP

algorithm.

Page 31: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

WEP Data Encryption

PRNG: pseudorandom number generator

Page 32: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

WEP Frame Body Expansion

Page 33: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Problems with WEP

Key Generation ICV Generation Weak Key’s and Weak IV’s WEP Attacks

Page 34: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Key Generation Problems

The main problem of WEP is Key Generation. Secret Key is too small, only 40 Bits.

Very susceptible to brute force attacks. IV is too small.

Only 16 Million different possibilities for every packet. Secret Keys are accessible to user, therefore not secret. Key distribution is done manually.

Page 35: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

ICV Generation Problems

The ICV is generated from a cyclic redundancy check (CRC-32)

Only a simple arithmetic computation. Can be done easily by anyone.

Not cryptographically secure. Easy for attacker to change packet and then change

ICV to get response from AP.

Page 36: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Weak Key’s and IV’s

Certain keys are more susceptible to showing the relationship between plaintext and ciphertext.

There are approx 9000 weak keys out of the 40 bit WEP secret key.

Weak IV will correspond to weak keys.

Page 37: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Attacks

ReplayStatistical gathering of certain ciphertext that once sent to server will cause wanted reaction.

802.11 LLC EncapsulationPredictable headers to find ciphertext, plaintext combinations

Denial of Service AttacksFlooding the 2.4Ghz frequency with noise.

Page 38: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

WPA/WPA2

Wi-Fi Protected AccessAlso referred to as the IEEE 802.11i

WPA available around 1999 WPA2 became available around 2004 Enhanced security to replace WEP

Improved data encryptionUser authentication

Page 39: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

WPA/WPA2

Authentication 802.1x & EAP allows auth. via RADIUS also allows auth via PSK (pre-shared key)

Encryption:WPA: TKIPWPA2: CCMP

Page 40: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

WEP vs. WPA vs. WPA2

WEP WPA WPA2

Encryption RC4 RC4 AES

Key rotation

None Dynamic session keys Dynamic session keys

Key distribution

Manually typed into each device

Automatic distribution available

Automatic distribution available

Authent. Uses WEP key as AuthC

Can use 802.1x & EAP Can use 802.1x & EAP

Page 41: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

WPA Modes

WPA-Enterprisew/RADIUS for authC

WPA-PSKFor home or SOHO“Pre-Shared Keys (PSK)” modeUser enters master key on each computerMaster key kicks off TKIP & key rotation

Mixed-modeOperates in WEP-only if any non-WPA clients

Page 42: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

WPA Authentication

IEEE 802.1xAuthentication mechanism to devices of LAN or WLAN

with encapsulation of the Extensible Authentication Protocol (EAP)

Page 43: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

802.1x Authentication

Page 44: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

§10.4 Security in Ad hoc Networks

Security “on the air” Secure routing PKI in Ad hoc

Page 45: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

45

“Over the Air”

Threats due to wireless communication Attacks

Eavesdropping, jamming, spoofing, “message attacks” Sleep deprivation torture

Counter measuresFirst attacks are not specific to ad hoc networks, well researched in military context:frequency hopping, spread spectrum

Page 46: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

46

Secure Routing

Great number of attacks possible byNot participating at all to save battery or partition the network

Spamming the network with RREQ

Changing routing information in RREP messages

Constantly or never replying with RERR

Page 47: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

47

Securing Routing

IdeaPunish non collaborative/malicious nodes by non-forwarding their traffic

How to achieve?Detection through “neighborhood watch”

Building a distributed system of reputation

Enable “re-socialization” through timeouts in the black list.

Page 48: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Securing Routing Information

IdeaShare the routing information through a secure channel

How to achieve?Requires key management and security mechanisms

Page 49: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

PKI in Ad hoc

Threshold Cryptography Self-organized PKI

Page 50: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

50

Threshold Cryptography

Emulate the central authentication authority by distributing it on several nodes acting as servers

Private Key is divided into n shares s1, s2, ... sn

Page 51: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

51

Threshold Cryptography

(n, t+1) threshold cryptography configuration

n servers, if t are compromised,it is still possible to perform the service

E.g. (3, 2) threshold cryptography scheme

Page 52: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

52

Threshold Cryptography Threshold cryptography seems to be a very robust solution However it needs some nodes to assume special behaviour For instance it is appropriate for military applications Inadequate for civilian networks

Users behave in a completely selfish way

Page 53: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

53

Self-organized PKI Certificate issued by users

Bind public key to an identity Each user maintains a local certificate repository

Certificates issued by itselfOther certificates selected using some algorithms (Shortcut Hunter)Size of certificate repository is small compared to the total number of users in the system

Page 54: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

54

Self-organized PKI How it works

u wants to verify the public key of v

u and v merge their local certificate repositories (subgraphs)

u tries to find a certificate chain (path) from u to v in the merged repository

subgraph of u

subgraph of vpath from u to v

v u

Page 55: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

55

Self-organized PKI

Only probabilistic guarantee to find an appropriate certificate

Security self-organized as the WWW?How can these mechanisms be put in place preventing their misuse?

Page 56: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

§10.6 Mobile Commerce

M-commerce, M-business Any e-commerce done in a wireless environment,

especially via the Internet Creates opportunity to deliver new services to existing

customers and to attract new ones

Page 57: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Attributes and Economic Advantages

Mobility—users carry cell phones or other mobile devices Broad reach—people can be reached at any time Ubiquity—easier information access in real-time Convenience—devices that store data and have Internet,

intranet, extranet connections Instant connectivity—easy and quick connection to Internet,

intranets, other mobile devices, databases Personalization—preparation of information for individual

consumers Localization of products and services—knowing where the

user is located at any given time and match service to them

Page 58: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Mobile Service Scenarios

Financial Services.

Entertainment.

Shopping.

Information Services.

Payment.

Advertising. And more ...

Page 59: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Architecture of M-commerce

Page 60: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Mobile Payment

Can be a stand-alone serviceCan also be an important enabling service for other m-

commerce servicesCould improve user acceptance by making the services

more secure and user-friendly.

Page 61: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Mobile Payment

Customer requirements: a larger selection of merchants with whom they can

trade a more consistent payment interface when making

the purchase with multiple payment schemes, like:• Credit Card payment• Bank Account/Debit Card Payment

Merchant benefits:brands to offer a wider variety of paymentEasy-to-use payment interface development

Bank and financial institution benefitsto offer a consistent payment interface to consumer and merchants

Page 62: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Payment via Internet Payment Provider

WAP GW/Proxy

SSL tunnel

MeP

GSM Security

SMS-C

User

Browsing (negotiation)

Merchant

Mobile Wallet

CC/Bank

IPP

Page 63: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Payment via Integrated Payment Server

WAP GW/Proxy

ISO8583 Based

CP

Mobile CommerceServer

GSM Security

SMS-C

User

Browsing (negotiation)

CC/Bank

Merchant

Mobile Wallet

Voice PrePaid

VPP IF

SSL tunnel

Page 64: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Limiting Technological Factors

Mobile Devices•Battery•Memory•CPU•Display Size

Networks•Bandwidth•Interoperability•Cell Range•Roaming

Localisation•Upgrade of Network•Upgrade of Mobile Devices•Precision

Mobile Middleware•Standards•Distribution

Security•Mobile Device•Network•Gateway

Page 65: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

Security of M-commerce

Page 66: Lecture 10 Mobile Security and  M-commerce 第 10 讲 移动安全与移动商务

A Summary

Security in Cellular NetworksGSM and UTMS

Access network security Security in WLAN

WEP

WPA/WPA2 Security in Ad hoc Networks

PKI M-commerce