how secure is lte? - etsi secure is lte presenta… · lte –building on umts security umts is...

20
© ETSI 2011. All rights reserved How secure is LTE? Charles Brookson – Chairman ETSI OCG Security Special thanks to Bengt Sahlin, 3GPP SA3 Chairman & Dionisio Zumerle, 3GPP SA3 Secretary

Upload: voduong

Post on 31-Jan-2018

220 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

© ETSI 2011. All rights reserved

How secure is LTE?Charles Brookson – Chairman ETSI OCG SecuritySpecial thanks to Bengt Sahlin, 3GPP SA3 Chairman & Dionisio Zumerle, 3GPP SA3 Secretary

Page 2: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

GSM Security – is it still secure?

Chaos Computer Club – December 2010

• GSM sniffing

• Demonstration of how to fing GSM phones and

decrypt calls

© ETSI 2011. All rights reserved

decrypt calls• http://events.ccc.de/congress/2010/Fahrplan/attachments/1783_101228.27C3.GSM-

Sniffing.Nohl_Munaut.pdf

• For GSM, A5/1, only

• Admits Operators can defend by using some

methods …..

Page 3: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

LTE – building on UMTS Security

UMTS is stronger than GSM in some ways:

• Mutual authentication

• Strong algorithms

• Longer key length

© ETSI 2011. All rights reserved

• Longer key length

• Integrity keys

Page 4: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

LTE implications on security

Flat architecture: radio terminates in access network

Interworking with a variety of legacy and non-3GPP networks

Allowing eNB placement in untrusted locations

Trying to keep security breaches as local as possible

© ETSI 2011. All rights reserved

Extended AKA (Authentication and Key Agreement)

Extended key hierarchy

More complex interworking security

Additional security for eNB (compared to NB/BTS/RNC)

Page 5: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

LTE Architecture

S3 HSS

SGSN

UTRAN

GERAN

© ETSI 2011. All rights reserved

S12

S3 S1-MME S6a

S10

UE

LTE-Uu

E-UTRAN

MME

S11

S5 Serving Gateway

S1-U

S4

Confidentiality and integrity for signaling and user planeOptional user plane protection (IPsec)

Page 6: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Encryption indication on phone

Indication of access network encryption

• user is informed whether confidentiality of user

data is protected on the radio access link

• in particular when non-ciphered calls are set-up

© ETSI 2011. All rights reserved

• in particular when non-ciphered calls are set-up

Page 7: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

LTE Security Algorithms

Two sets: 128-EEA1/EIA1 & 128-EEA2/EIA2

• AES and SNOW 3G chosen as basis

• Different from each other as possible

• Cracking one would not affect the other

© ETSI 2011. All rights reserved

• Cracking one would not affect the other

Third set EEA3/EIA3 under consideration

• Based on Chinese ZUC (stream cipher)

• Public evaluation ongoing!

http://zucalg.forumotion.net/

Page 8: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Key hierarchy in LTE

USIM / AuC

UE / ASME

K

KeNBKNASint

UE / HSS

KNASenc

CK, IK

KASME

© ETSI 2011. All rights reserved

Deeper key hierarchy than UMTS• Offers faster handovers

• Keeps security breaches local

• Adds complexity to handling of security contexts

UE / MME

KUPenc

UE / eNB

KRRCint KRRCenc

Page 9: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Network Domain Security

Base stations getting more and more powerful

• LTE eNode B includes features of UMTS RNC

Coverage needs grow constantly

• Not always possible to trust physical security of location of deployment

© ETSI 2011. All rights reserved

deployment

Greater backhaul link protection needed

Certificate enrolment mechanisms for backhaul security

Page 10: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Certificate Enrollment Certificate Enrollment

for Base Stationsfor Base Stations

RA/CA

CMPv2Vendor root certificate

pre-installed.

SEG

Operator root certificate

pre-installed.

Enrolled base station

certificate is used in IKE/IPsec.IPsec

© ETSI 2011. All rights reserved

base stationbase station obtains operator-signed

certificate on its own public key from RA/CA

using CMPv2.

CMPv2

Vendor-signed certificate

of base station public key

pre-installed.

pre-installed. certificate is used in IKE/IPsec.IPsec

Picture from 3GPP TS 33.310

Page 11: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Home e Node B Security

LTE/UMTS base station in home environment

UE H(e)NB unsecure

link

Operator’s core

network

H(e)NB GW

H(e)MS H(e)MS

AAA

Server/HSS

SeGW

© ETSI 2011. All rights reserved

LTE/UMTS base station in home environment

Security features include:• Integrity checking of device

• Mutual authentication of H(e)NB and operator (SeGW) (certificate based)

• Hosting party of the H(e)NB authentication (optional, EAP-AKA based)

• H(e)MS (OAM server) authentication

• Secure SW updates

• Sensitive data not accessible in plaintext

• Access Control Mechanism

• Clock synchronization

• Location locking

• Unauthenticated traffic filtering

Page 12: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Relay Nodes

e Node B that communicates directly with other eNBs over radio

Does not require backhaul infrastructure

Objectives• improve coverage of high data rates

• improve cell edge throughput

• augment ease of deployment

Challenge:

© ETSI 2011. All rights reserved

Challenge:• Relay node “invisible” to the UE

• Relay Node looks like a UE to the network in some aspects

Basic Architecture:

Relay DeNBUECore

NW

Radio Radio Backhaul

Page 13: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Relay Node Authentication

Mutual authentication between Relay Node and

network

• AKA used

• credentials stored on a UICC

© ETSI 2011. All rights reserved

Relay node device authentication is mandatory

• Binding these two authentications needed

One-to-one binding of Relay Node and USIM

• binding realized by

• symmetric pre-shared keys (psk)

• or by certificate

Page 14: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Relay Node Security

Secure environment for storing and processing sensitive data

Device integrity check

Control plane traffic is integrity protected

Optional integrity protection of user plane traffic

© ETSI 2011. All rights reserved

Optional integrity protection of user plane traffic

Connection between Relay Node and network is confidentiality protected

Page 15: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Security for

Machine-Type Communications

Analysis of security aspects ongoing

• identification and analysis of threats

• identification of potential security impacts of the

system improvements

© ETSI 2011. All rights reserved

system improvements

• identification of potential new security features

needed

Page 16: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Single Sign On

Two ongoing studies:

• SSO Application Security for IMS (figure)

• SSO frameworks with 3GPP networks for various operator

authentication configurations UE

GmSSOa

© ETSI 2011. All rights reserved figure from draft 3GPP TR 33.914

IM Subsystem

(IMS)

using SIP Digest

S-CSCF

HSS

SIP AS

SSO

Subsystem

AS

Isc

Cx

Gm

SSOh

SSOb

Page 17: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Protection against

Unsolicited Communication (UC)

Protect mobile subscribers from receiving unsolicited

communication (aka SPIT) over IMS

Current work analyses possible solutions

chan

ges

in in

terf

aces

or p

roto

cols

requ

ired

© ETSI 2011. All rights reserved

automatedUC protection

network-to-userideal state of UC prevention

legislation (different per country)statutorily regulation of UC definition, UC handling

operator controlled environmentcontract conditions, policies, Service Level Agreements (SLAs)

re-use of DoS protection mechanismse.g. limiting number of parallel calls

network supported user self protectionbased on SS with e.g. black-/white listing

UC feedback user-to-networkweb interface, DTMF/SIP

UC score network-to-useridentifying, marking and handling of UC

complexity, im

pact on IMS

non-technical UC protection measures technical UC protection measures

no c

hang

es in

inte

rfac

es

or p

roto

cols

requ

ired

chan

ges

in in

terf

aces

or p

roto

cols

requ

ired

1

2

3

4

5

6

7

Page 18: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Selection of 3GPP Security Standards

LTE:

33.401 System Architecture Evolution (SAE); Security architecture

33.402 System Architecture Evolution (SAE); Security aspects of non-3GPP

Home (e) Node B:

33.320 Security Home (evolved) Node B (H(e)NB)

General and 3G:

33.102 Security architecture

33.203 Access security for IP-based services

Lawful Interception:

© ETSI 2011. All rights reserved

Lawful Interception:

33.106 Lawful interception requirements

33.107 Lawful interception architecture and functions

33.108 Handover interface for Lawful Interception

GBA:

33.220 GAA: Generic Bootstrapping Architecture (GBA)

Network Domain Security:

33.310 Network Domain Security (NDS); Authentication Framework (AF)

SSO:

33.914 Single Sign On for Application Security for IMS

33.924 Interworking of GBA and OpenID

33.980 Interworking of GBA and Liberty Alliance

Page 19: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

How secure is LTE?

Building on GSM and UMTS Security

Newer security algorithms, longer keys

Extended key hierarchy

New features, addressing new scenarios

© ETSI 2011. All rights reserved

New features, addressing new scenarios

• Home evolved Node B

• Relay Node

New topics• Machine-Type Communication, Single Sign-On,

Protection against Unsolicited Communication over IMS

Page 20: How secure is LTE? - ETSI secure is LTE presenta… · LTE –building on UMTS Security UMTS is stronger than GSM in some ways: ... How secure is LTE presentation at ETSI stand during

Questions?

© ETSI 2011. All rights reserved