ArticlePDF Available

Security Measures and Weaknesses of the GPRS Security Architecture

Authors:

Abstract and Figures

This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect the mobile users, the radio access network, the fixed part of the network, and the related data of GPRS are presented and analyzed in details. This analysis reveals the security weaknesses of the applied measures that may lead to the realization of security attacks by adversaries. These attacks threaten network operations and data transfer through it compromising end-users and network security. To address some of the identified security weaknesses, a set of security enhancements that aims at improving the GPRS security architecture and providing advanced security services to user data traffic is proposed. The proposed enhancements can be easily integrated in the existing GPRS technology, minimizing the required changes.
Content may be subject to copyright.
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 158
Security Measures and Weaknesses of the GPRS
Security Architecture
Christos Xenakis
Security Group, Communication Networks Laboratory, Department of Informatics & Telecommunications
University of Athens, 15784 Athens, Greece (Email: xenakis@di.uoa.gr)
(Received Jan. 19, 2006; revised and accepted May 7, 2006 & Nov. 8, 2006)
Abstract
This paper presents an evaluation of the security archi-
tecture employed in the General Packet Radio Services
(GPRS). More specifically, the security measures applied
to protect the mobile users, the radio access network, the
fixed part of the network, and the related data of GPRS
are presented and analyzed in details. This analysis re-
veals the security weaknesses of the applied measures that
may lead to the realization of security attacks by adver-
saries. These attacks threaten network operations and
data transfer through it compromising end-users and net-
work security. To address some of the identified security
weaknesses, a set of security enhancements that aims at
improving the GPRS security architecture and providing
advanced security services to user data traffic is proposed.
The proposed enhancements can be easily integrated in
the existing GPRS technology, minimizing the required
changes.
Keywords: GPRS, mobile internet, mobile VPN, security
1 Introduction
The General Packet Radio Services (GPRS) [3] is a service
that provides packet radio access for Global System for
Mobile Communications (GSM) users. The GPRS net-
work architecture, which constitutes a migration step to-
ward third-generation (3G) communication systems, con-
sists of an overlay network onto the GSM network. In
the wireless part, the GPRS technology reserves radio
resources only when there is data to be sent, thus, en-
suring the optimized utilization of radio resources. The
fixed part of the network employs the IP technology and
is connected to the public Internet. Taking advantage of
these features, GPRS enables the provision of a variety of
packet-oriented multimedia applications and services to
mobile users, realizing the concept mobile Internet.
For the successful implementation of the new emerging
applications and services over GPRS, security is consid-
ered as a vital factor. This is because of the fact that wire-
less access is inherently less secure, and the radio trans-
mission is by nature more susceptible to eavesdropping
and fraud in use than wireline transmission. In addition,
users mobility and the universal access to the network im-
ply higher security risks compared to those encountered
in fixed networks. In order to meet security objectives,
GPRS uses a specific security architecture, which aims at
protecting the network against unauthorized access and
the privacy of users. This architecture is mainly based on
the security measures applied in GSM, since the GPRS
system is built on the GSM infrastructure.
Based on the above consideration, the majority of the
existing literature on security in second-generation (2G)
mobile systems refers to GSM [15, 16], which is consid-
ered that also covers GPRS. However, GPRS differs from
GSM in certain operational and service points, which re-
quire a different security analysis. This is because GPRS
is based on IP, which is an open and wide deployed tech-
nology that presents many vulnerable points. Similarly
to IP networks, intruders to the GPRS system may at-
tempt to breach the confidentiality, integrity, availability
or otherwise attempt to abuse the system in order to com-
promise services, defraud users or any part of it. Thus,
the GPRS system is more exposed to intruders compared
to GSM.
This paper presents an evaluation of the security ar-
chitecture employed in GPRS. More specifically, the se-
curity measures applied to protect the mobile users, the
radio access network, the fixed part of the network, and
the related data of GPRS are presented and analyzed in
details. This analysis reveals the security weaknesses of
the applied measures that may lead to the realization of
security attacks by adversaries. These attacks threaten
network operation and data transfer through it, compro-
mising end-users and network security. To address some
of the identified security weaknesses, a set of security en-
hancements that aims at improving the GPRS security
architecture and providing advanced security services to
user data traffic is proposed. The proposed enhancements
can be easily integrated in the existing GPRS technology,
minimizing the required changes.
The rest of this article is organized as follows. Section
2 describes briefly the GPRS network architecture. Sec-
tion 3 presents the security architecture applied to GPRS,
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 159
and section 4 analyzes its security weaknesses. Section 5
proposes some enhancements that improve the level of se-
curity provided by GPRS. Finally, section 6 contains the
conclusions.
2 GPRS Network
The network architecture of GPRS [3] is presented in Fig-
ure 1. A GPRS user owns a Mobile Station (MS) that pro-
vides access to the wireless network. From the network
side, the Base Station Subsystem (BSS) is a network part
that is responsible for the control of the radio path. BSS
consists of two types of nodes: the Base Station Controller
(BSC) and the Base Transceiver Station (BTS). BTS is
responsible for the radio coverage of a given geographi-
cal area, while BSC maintains radio connections towards
MSs and terrestrial connections towards the fixed part of
the network (core network).
The GPRS Core Network (CN) uses the network el-
ements of GSM such as the Home Location Register
(HLR), the Visitor Location Register (VLR), the Au-
thentication Centre (AuC) and the Equipment Identity
Register (EIR). HLR is a database used for the man-
agement of permanent data of mobile users. VLR is a
database of the service area visited by an MS and contains
all the related information required for the MS service
handling. AuC maintains security information related to
subscribers identity, while EIR maintains information re-
lated to mobile equipments’ identity. Finally, the Mobile
Service Switching Centre (MSC) is a network element re-
sponsible for circuit-switched services (e.g., voice call) [3].
As presented previously, GPRS reuses the majority of
the GSM network infrastructure. However, in order to
build a packet-oriented mobile network some new network
elements (nodes) are required, which handle packet-based
traffic. The new class of nodes, called GPRS support
nodes (GSN), is responsible for the delivery and routing
of data packets between a MS and an external packet data
network (PDN). More specifically, a Serving GSN (SGSN)
is responsible for the delivery of data packets from, and
to, a MS within its service area. Its tasks include packet
routing and transfer, mobility management, logical link
management, and authentication and charging functions.
A Gateway GSN (GGSN) acts as an interface between
the GPRS backbone and an external PDN. It converts
the GPRS packets coming from the SGSN into the ap-
propriate packet data protocol (PDP) format (e.g., IP),
and forwards them to the corresponding PDN. Similar is
the functionality of GGSN in the opposite direction. The
communication between GSNs (i.e., SGSN and GGSN) is
based on IP tunnels through the use of the GPRS Tun-
nelling Protocol (GTP) [5].
3 GPRS Security Architecture
In order to meet security objectives, GPRS employs a set
of security mechanisms that constitutes the GPRS secu-
GGSN: Gateway GPRS Support Node
HLR: Home Location Register
MS: Mobile Station
MSC: Mobile Switching Center
SGSN: Serving GPRS Support Node
VLR: Visited Location Register
AuC: Authentication Center
BTS: Base Transceiver Station
BSC: Base Station Controller
BSS: Base Station Subsystem
CN : Core Network
EIR: Equipment Identity Register
Gc
H
A Gb
F
CN
PSTN
G
E
Gp
Gf
Gi
Gn
D
MSC
VLR EIR
GGSN
AuC
Gr
SGSN
Um
Abis Abis
BSS
BSC
BTS BTS
HLR
MS
Figure 1: GPRS network architecture
rity architecture. Most of these mechanisms have been
originally designed for GSM, but they have been modi-
fied to adapt to the packet-oriented traffic nature and the
GPRS network components. The GPRS security architec-
ture, mainly, aims at two goals: a) to protect the network
against unauthorized access, and b) to protect the privacy
of users. It includes the following components [11]:
Subscriber Identity Module (SIM);
Subscriber identity confidentiality;
Subscriber identity authentication;
User data and signaling confidentiality between the
MS and the SGSN;
GPRS backbone security.
3.1 Subscriber Identity Module - SIM
The subscription of a mobile user to a network is person-
alized through the use of a smart card named Subscriber
Identity Module (SIM) [8]. Each SIM-card is unique and
related to a user. It has a microcomputer with a pro-
cessor, ROM, persistent EPROM memory, volatile RAM,
and an I/O interface. Its software consists of an operating
system, file system, and application programs (e.g., SIM
Application Toolkit). The SIM card is responsible for the
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 160
authentication of the user by prompting for a code (Per-
sonal Identity Number - PIN), the identification of the
user to a network through keys, and the protection of user
data through cryptography. To achieve these functions it
contains a set of security objects including:
A (4-digit) PIN code, which is used to lock the card
preventing misuse;
A unique permanent identity of the mobile user,
named International Mobile Subscriber Identity
(IMSI) [2];
A secret key, Ki, (128 bit) that is used for authenti-
cation;
An authentication algorithm (A3) and an algorithm
that generates encryption keys (A8) [11].
Since the SIM-card of a GSM/GPRS subscriber con-
tains security critical information, it should be manufac-
tured, provisioned, distributed, and managed in trusted
environments.
3.2 Subscriber Identity Confidentiality
The subscriber identity confidentiality deals with the pri-
vacy of the IMSI and the location of a mobile user. It
includes mechanisms for the protection of the permanent
identity (IMSI) when it is transferred in signaling mes-
sages, as well as measures that preclude the possibility to
derive it indirectly from listening to specific information,
such as addresses, at the radio path.
The subscriber identity confidentiality is mainly
achieved by using a Temporary Mobile subscriber Identity
(TMSI) [2, 11], which identifies the mobile user in both
the wireless and wired network segments. The TMSI has
a local significance, and, thus, it must be accompanied by
the routing area identity (RAI) in order to avoid confu-
sions. The MS and the serving VLR and SGSN only know
the relation between the active TMSI and the IMSI. The
allocation of a new TMSI corresponds implicitly for the
MS to the de-allocation of the previous one. When a new
TMSI is allocated to the MS, it is transmitted to it in a
ciphered mode. The MS stores the current TMSI and the
associated RAI in a non-volatile memory, so that these
data are not lost when the MS is switched off.
Further to the TMSI, a Temporary Logical Link Iden-
tity (TLLI) [2] identifies also a GPRS user on the radio
interface of a routing area. Since the TLLI has a local sig-
nificance, when it is exchanged between the MS and the
SGSN, it should be accompanied by the RAI. The TLLI
is either derived from the TMSI allocated by the SGSN
or built by the MS randomly, and, thus, provides identity
confidentiality. The relationship between the TLLI and
the IMSI is only known in the MS and in the SGSN.
3.3 Subscriber Identity Authentication
A mobile user that attempts to access the network must
first prove his identity to it. User authentication [3] pro-
tects against fraudulent use and ensures correct billing.
GPRS uses the authentication procedure already defined
in GSM with the same algorithms for authentication and
generation of encryption key, and the same secret key, Ki,
(see Figure 2). However, from the network side, the whole
procedure is executed by the SGSN (instead of the base
station) and employs a different random number (GPRS-
RAND), and, thus, it produces a different signed response
(GPRS-SRES) and encryption key (GPRS-Kc) than the
GSM voice counterpart.
Authentication Request (GPRS-RAND)
Authentication Response (GPRS-SRES)
Protected data
Fixed network of a
GPRS operator
SIM
A3
Ki
A8
A5
GPRS-Kc
A3
?
A8
A5
Ki
Ki
Data
Ki
GPRS-Kc
Data
check
Figure 2: GPRS authentication
To achieve authentication of a mobile user, the serv-
ing SGSN must possess security related information for
the specific user. This information is obtained by re-
questing the HLR/AuC of the home network that the
mobile user is subscribed. It includes a set of authentica-
tion vectors, each of which includes a random challenge
(GPRS-RAND), and the related signed response (GPRS-
SRES) and encryption key (GPRS-Kc) for the specific
subscriber. The authentication vectors are produced by
the home HLR/AuC using the secret key Ki of the mobile
subscriber.
During authentication the SGSN of the serving net-
work sends the random challenge (GPRS-RAND) of a
chosen authentication vector to the MS. The latter en-
crypts the GPRS-RAND by using the A3 hash algorithm,
which is implemented in the SIM-card, and the secret key,
Ki. The first 32 bits of the A3 output are used as a signed
response (GPRS-SRES) to the challenge (GPRS-RAND)
and are sent back to the network. The SGSN checks if
the MS has the correct key, Ki, and, then, the mobile
subscriber is recognized as an authorized user. Other-
wise, the Serving Network (SN) rejects the subscriber’s
access to the system. The remaining 64 bits of the A3
output together with the secret key, Ki, are used as input
to the A8 algorithm that produces the GPRS encryption
key (GPRS-Kc).
3.4 Data and Signalling Protection
User data and signaling protection over the GPRS radio
access network is based on the GPRS ciphering algorithm
(GPRS-A5) [1], which is also referred to as GPRS En-
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 161
cryption Algorithm (GEA) and is similar to the GSM
A5. Currently, there are three versions of this algorithm:
GEA1, GEA2 and GEA3 (that is actually A5/3), which
are not publicly known, and, thus, it is difficult to perform
attacks on them. The MS device (not the SIM-card) per-
forms GEA using the encryption key (GPRS-Kc), since it
is a strong algorithm that requires relatively high process-
ing capabilities. From the network side, the serving SGSN
performs the ciphering/deciphering functionality protect-
ing signaling and user data over the Um, Abis, and Gb
interfaces.
During authentication the MS indicates which ver-
sion(s) of the GEA supports, and the network (SGSN)
decides on a mutually acceptable version that will be used.
If there is not a commonly accepted algorithm, the net-
work (SGSN) may decide to release the connection. Both
the MS and the SGSN must cooperate in order to initiate
the ciphering over the radio access network. More specif-
ically, the SGSN indicates whether ciphering should be
used or not (which is also a possible option) in the Au-
thentication Request message, and the MS starts cipher-
ing after sending the Authentication Response message
(see Figure 2).
GEA is a symmetric stream cipher algorithm (see
Figure 3) that uses three input parameters (GPRS-Kc,
INPUT and DIRECTION) and produces an OUTPUT
string, which varies between 5 and 1600 bytes. GPRS-Kc
(64 bits) is the encryption key generated by the GPRS
authentication procedure and is never transmitted over
the radio interface. The input (INPUT) parameter (32
bits) is used as an additional input so that each frame is
ciphered with a different output string. This parameter
is calculated from the Logical Link Control (LLC) frame
number, a frame counter, and a value supplied by the
SGSN called the IOV (input offset value). The IOV is
set up during the negotiation of LLC and layer 3 param-
eters. Finally, the direction bit (DIRECTION) specifies
whether the output string is used for upstream or down-
stream communication.
After the initiation of ciphering, the sender (MS or
SGSN) processes (bit-wise XOR) the OUTPUT string
with the payload (PLAIN TEXT) to produce the CI-
PHERED TEXT, which is sent over the radio interface.
In the receiving entity (SGSN or MS), the OUTPUT
string is bit-wise XORed with the CIPHERED TEXT,
and the original PLAIN TEXT is obtained. When the MS
changes SGSN, the encryption parameters (e.g., GPRS-
Kc, INPUT) are transferred from the old SGSN to the
new SGSN, through the (inter) routing area update pro-
cedure in order to guarantee service continuity.
3.5 GPRS Backbone Security
The GPRS backbone network includes the fixed network
elements and their physical connections that convey user
data and signaling information. Signaling exchange in
GPRS is mainly based on the Signaling System 7 (SS7)
technology [4], which does not support any security mea-
INPUT DIRECTION
CIPHER
ALGORITHM
CIPHER
ALGORITHM
PLAIN TEXT PLAIN TEXT
CIPHERED TEXT CIPHERED TEXT
SGSN/MS MS/SGSN
OUTPUT OUTPUT
INPUT DIRECTION
GPRS-Kc GPRS-Kc
Figure 3: GPRS ciphering
sure for the GPRS deployment. Similarly, the GTP pro-
tocol that is employed for communication between GSNs
does not support security. Thus, user data and signaling
information in the GPRS backbone network are conveyed
in clear-text exposing them to various security threats.
In addition, inter-network communications (between dif-
ferent operators) are based on the public Internet, which
enables IP spoofing to any malicious third party who gets
access to it. In the sequel, the security measures applied
to the GPRS backbone network are presented.
The responsibility for security protection of the GPRS
backbone as well as inter-network communications be-
longs to mobile operators. They utilize private IP ad-
dressing and Network Address Translation (NAT) [17] to
restrict unauthorized access to the GPRS backbone. They
may also apply firewalls at the borders of the GPRS back-
bone network in order to protect it from unauthorized
penetrations. Firewalls protect the network by enforcing
security policies (e.g., user traffic addressed to a network
element is discard). Using security policies the GPRS
operator may ensure that only traffic initiated from the
MS and not from the Internet should pass through a fire-
wall. This is done for two reasons: (a) to restrict traf-
fic in order to protect the MS and the network elements
from external attacks; and (b) to protect the MS from
receiving un-requested traffic. Un-requested traffic may
be unwanted for the mobile subscribers since they pay for
the traffic received as well. The GPRS operator may also
want to disallow some bandwidth demanding protocols
preventing a group of subscribers to consume so much
bandwidth that other subscribers are noticeably affected.
In addition, application level firewalls prevent direct ac-
cess through the use of proxies for services, which analyze
application commands, perform authentication and keep
logs.
Since firewalls do not provide privacy and confidential-
ity, the Virtual Private Network (VPN) technology [9] has
to complement them to protect data in transit. A VPN
is used for the authentication and the authorization of
user access to corporate resources, the establishment of
secure tunnels between the communicating parties, and
the encapsulation and protection of the data transmit-
ted by the network. In current GPRS implementations,
pre-configured, static VPNs can be employed to protect
data transfer between GPRS network elements (e.g., an
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 162
SGSN and a GGSN that belong to the same backbone),
between different GPRS backbone networks that belong
to different mobile operators, or between a GPRS back-
bone and a remote corporate private network. The bor-
der gateway, which resides at the border of the GPRS
backbone, is a network element that provides firewall ca-
pabilities and also maintains static, pre-configured VPNs
to specific peers.
4 GPRS Security Weaknesses
Although GPRS have been designed with security in
mind, it presents some essential security weaknesses,
which may lead to the realization of security attacks that
threaten network operation and data transfer through it.
In the following, the most prominent security weaknesses
of the GPRS security architecture are briefly presented
and analyzed.
4.1 Subscriber Identity Confidentiality
A serious weakness of the GPRS security architecture is
related to the compromise of the confidentiality of sub-
scriber identity. Specifically, whenever the serving net-
work (VLR or SGSN) cannot associate the TMSI with
the IMSI, because of TMSI corruption or database fail-
ure, the SGSN should request the MS to identify itself by
means of IMSI on the radio path. Furthermore, when the
user roams and the new serving network cannot contact
the previous (the old serving network) or cannot retrieve
the user identity, then, the new serving network should
also request the MS to identify itself by means of IMSI
on the radio path. This fact may lead an active attacker
to pretend to be a new serving network, to which the
user has to reveal his permanent identity. In addition, in
both cases the IMSI that represents the permanent user
identity is conveyed in clear-text over the radio interface
violating user identity confidentiality.
4.2 Subscriber Authentication
The authentication mechanism used in GPRS also ex-
hibits some weak points regarding security. More specifi-
cally, the authentication procedure is one-way, and, thus,
it does not assure that a mobile user is connected to an
authentic serving network. This fact enables active at-
tacks using a false base station identity. An adversary,
who has the required equipment, may masquerade as a
legitimate network element mediating in the communica-
tion between the MS and the authentic base station. This
is also facilitated by the absence of a data integrity mech-
anism on the radio access network of GPRS, which de-
feats certain network impersonation attacks. The results
of this mediation may be the alternation or the inter-
ception of signaling information and communication data
exchanged.
Another weakness of the GPRS authentication pro-
cedure is related to the implementation of the A3 and
A8 algorithms, which are often realized in practise using
COMP128. COMP128 is a keyed hash function, which
uses two 16-byte (128 bits) inputs and produces a hash
output of 12 bytes (96 bits). While the actual specifica-
tion of COMP128 was never made public, the algorithm
has been reverse engineered and cryptanalyzed [7]. Thus,
knowing the secret key, Ki, it is feasible for a third party
to clone a GSM/GPRS SIM-card, since its specifications
are widely available [8].
The last weakness of the GPRS authentication pro-
cedure is related to the network ability of re-using au-
thentication triplets. Each authentication triplet should
be used only in one authentication procedure in order to
avoid man-in-the-middle and replay attacks. However,
this depends on the mobile network operator (home and
serving) and cannot be checked by mobile users. When
the VLR of a serving network has used an authentication
triplet to authenticate an MS, it shall delete the triplet
or mark it as used. Thus, each time the that VLR needs
to use an authentication triplet, it shall use an unmarked
one, in preference to a marked. If there is no unmarked
triplet, then, the VLR shall request fresh triplets from the
home HLR. If fresh triplets cannot be obtained, because
of a system failure, the VLR may re-use a marked triplet.
Thus, if a single triplet is compromised, a false BS can
impersonate a genuine GPRS network to the MS. More-
over, as the false BS has the encryption key, Kc, it will
not be necessary for the false BS to suppress encryption
on the air interface. As long as the genuine SGSN is using
the compromised authentication triplet, an attacker could
also impersonate the MS and obtain session calls that are
paid by the legitimate subscriber.
4.3 Data and Signalling Protection
An important weakness of the GPRS security architecture
is related to the fact that the encryption of signalling and
user data over the highly exposed radio interface is not
mandatory. Some GPRS operators, in certain countries,
are never switch on encryption in their networks, since
the legal framework in these countries do not permit that.
Hence, in these cases signalling and data traffic are con-
veyed in clear-text over the radio path. This situation is
becoming even more risky from the fact that the involved
end-users (humans) are not informed whether their ses-
sions are encrypted or not.
As encryption over the radio interface is optional,
the network indicates to the MS whether and which
type(s) of encryption it supports in the Authentication
request message, during the GPRS authentication proce-
dure. If encryption is activated, the MS start ciphering
after sending the Authentication response message, and
the SGSN starts ciphering/deciphering when it receives
a valid Authentication response message from the MS.
However, since these two messages are not confidentially
and integrity protected (data integrity is not provided
in the GPRS radio interface except for traditional non-
cryptographic link layer checksums), an adversary may
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 163
mediate in the exchange of authentication messages. The
results of this mediation might be either the modifica-
tion of the network and the MS capabilities regarding en-
cryption, or the suppression of encryption over the radio
interface.
4.4 GPRS Backbone
Based on the analysis of the GPRS security architecture
(see sect. 3) it can be perceived that the GPRS security
does not aim at the GPRS backbone and the wire-line
connections, but merely at the radio access network and
the wireless path. Thus, user data and signaling infor-
mation, conveyed over the GPRS backbone, may experi-
ence security threats, which degrade the level of security
supported by GPRS. In the following, the security weak-
nesses of the GPRS security architecture that are related
to the GPRS backbone network for both signaling and
data plane are presented and analyzed.
4.4.1 Signaling Plane
As mentioned previously, the SS7 technology, used for
signaling exchange in GPRS, does not support security
protection. Until recently, this was not perceived to be
a problem, since SS7 networks belonged to a small num-
ber of large institutions (telecom operator). However, the
rapid deployment of mobile systems and the liberaliza-
tion of the telecommunication market have dramatically
increased the number of operators (for both fixed and mo-
bile networks) that are interconnected through the SS7
technology. This fact provokes a significant threat to the
GPRS network security, since it increases the probability
of an adversary to get access to the network or a legiti-
mate operator to act maliciously.
The lack of security measures in the SS7 technology,
used in GPRS, results also in the unprotected exchange of
signaling messages between a VLR and a VLR/HLR, or a
VLR and other fixed network nodes. Although these mes-
sages may include critical information for the mobile sub-
scribers and the networks operation like ciphering keys,
authentication data (e.g., authentication triplets), user
subscription data (e.g., IMSI), user billing data, network
billing data, etc., they are conveyed in a clear-text within
the serving network, as well as between the home net-
work and the serving network. For example, the VLR of
a serving network may use the IMSI to request authenti-
cation data for a single user from its home network, and
the latter forwards them to the requesting VLR without
any security measure. Thus, the exchanges of signalling
messages, which are based on SS7, may disclose sensitive
data of mobile subscribers and networks, since they are
conveyed over insecure network connections without se-
curity precautions.
4.4.2 Data Plane
Similarly to the signaling plane, the data plane of the
GPRS backbone presents significant security weaknesses,
since the introduction of IP technology in the GPRS core
shifts towards open and easily accessible network archi-
tectures. In addition, the data encryption mechanism em-
ployed in GPRS does not extend far enough towards the
core network, resulting also in a clear-text transmission of
user data in it. Thus, a malicious, which gets access to the
network, may either obtain access to sensitive data traffic
or provide unauthorized/incorrect information to mobile
users and network components. As presented previously,
the security protection of users data in the fixed segment
of the GPRS network mainly relies on two independent
and complementary technologies, which are not under-
taken by GPRS, but from the network operators. These
technologies include firewalls that enforce security poli-
cies to a GPRS core network that belongs to an operator,
and pre-configured VPNs that protect specific network
connections.
However, firewalls were originally conceived to address
security issues for fixed networks, and, thus, are not
seamlessly applicable in mobile networks. They attempt
to protect the clear-text transmitted data in the GPRS
backbone from external attacks, but they are inadequate
against attacks that originate from malicious mobile sub-
scribers, as well as from network operator personnel or
any other third party that gets access to the GPRS core
network. Another vital issue regarding the deployment
of firewalls in GPRS has to do with the consequences of
mobility. The mobility of a user may imply roaming be-
tween networks and operators, which possibly results in
the changing of the user address. This fact in conjunction
with the static configuration of firewalls may potentially
lead to discontinuity of service connectivity for the mobile
user. Moreover, in some cases the security value of fire-
walls is considered limited as they allow direct connection
to ports without distinguishing services.
Similarly to firewalls, the VPN technology fails to pro-
vide the necessary flexibility required by typical mobile
users. Currently, VPNs for GPRS subscribers are estab-
lished in a static manner between the border gateway of
a GPRS network and a remote security gateway of a cor-
porate private network. This fact allows the realization
of VPNs only between a security gateway of a large or-
ganization and a mobile operator, when a considerable
amount of traffic requires protection. Thus, this scheme
can provide VPN services neither to individual mobile
users that may require on demand VPN establishment,
nor to enterprise users that may roam internationally. In
addition, static VPNs have to be reconfigured every time
the VPN topology or VPN parameters change.
5 Security Improvements in
GPRS
The weak points of the GPRS security architecture may
lead to compromises of end-users and network security of
the GPRS system. These compromises may influence the
system deployment and the users trend to utilize GPRS
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 164
for the provision of advanced multimedia services, which
realizes the concept of mobile Internet. In the following
sections, security enhancements that aim at improving
the GPRS security architecture and providing advanced
security services to user data traffic are presented.
5.1 Identity Confidentiality
To limit the exposure of the permanent identities (IMSI)
of mobile users over the vulnerable radio interface, the
additional usage of two complementary temporary iden-
tities for each mobile subscriber that is attached to the
network has been proposed [22]. One of these temporary
identities will reside at the serving network (T M SIALT ),
and the second one at the home network of the mobile
user (T M S IHE ). When the VLR of the serving network
fail to page a mobile user using the current TMSI, it can
try to page him using the alternative temporary identity
(T M S IALT ), which also resides in the VLR. In case of
a VLR database failure or a corruption of the tempo-
rary identities (i.e., TMSI and T M S IALT ) that resides in
the VLR, the VLR requests the temporary identity (i.e.,
T M S IHE ) from the home network, by which it can page
the mobile user. This identity resides in the user’s home
network in order to avoid a possible corruption after a
database (VLR) failure. In case that none of the TMSI is
valid or all of them are corrupted, the user is not attached
to the network.
Both the additional temporary identities (i.e.,
T M S IALT and T M S IHE ) derive from the current TMSI.
The latter consists of 4 octets and its generation proce-
dure is chosen by the mobile operator. However, some
general guidelines are applied in all implementations in or-
der to avoid double allocation of TMSIs, after a restart of
the allocating node (i.e., VLR or SGSN). For this reason,
some part of the TMSI may be related to the time when
it was allocated or contain a bit field, which is changed
when the allocating node has recovered from the restart.
After the generation of a TMSI, the allocating node ap-
plies two individual hash functions (i.e., HASHALT and
HASHH E ), which produce the corresponding T M SIALT
and T M S IHE , respectively. Then, the allocating node
forwards the three temporary identities to the involved
mobile user and the T M S IHE to its home network. In
cases that the home and the serving network are the same,
the T M S IHE can be stored in HLR, which is not affected
by the reasons that corrupt the other two temporary iden-
tities. Finally, each time that the current TMSI is re-
newed, the two additional temporary identities change in
order to eliminate the possibility of an adversary to link
them to the permanent user’s identity.
5.2 Signalling Protection
To address the lack of security measures in the signaling
plane of the GPRS backbone, we propose the incorpo-
ration of the Network Domain Security (NDS) features
[22] into the GPRS security architecture. NDS features,
which have been designed for the latter version of UMTS,
ensure that signaling exchanges in the backbone network,
as well as in the whole wireline network are protected. For
signaling transmission in GPRS the SS7 and IP protocol
architectures are employed, which incorporate the Mobile
Application Part (MAP) [4] and the GTP protocol [5], re-
spectively. In NDS both architectures are designed to be
protected by standard procedures based on existing cryp-
tographic techniques. Specifically, the IP-based signaling
communications will be protected at the network level by
means of the well-known IPsec suite [14]. On the other
hand, the realization of protection for the SS7-based com-
munications will be accomplished at the application layer
by employing specific security protocols [22]. However,
until now only the MAP protocol from the SS7 architec-
ture is design to be protected by a new security protocol
named MAPsec [6]. To address the increasing security
needs, this effort has to be continued to cover the entire
set of the SS7 protocol stack.
5.3 User Data Security
Another weakness of the current GPRS security architec-
ture that can be overcome is related to the lack of effective
protection of user data in the fixed part of the GPRS net-
work. To address this problem, two alternative security
solutions, which are based on existing security technolo-
gies, can be used: (a) the application layer security, and
(b) the establishment of mobile VPNs, dynamically, that
satisfy users’ needs.
5.3.1 Application Layer Security Solutions
Application layer security solutions integrate security into
applications at the level of end-users. The most promi-
nent protocol that provides security at this layer for the
Internet technology is the Secure Sockets Layer proto-
col (SSL) [12]. SSL supports server authentication using
certificates, data confidentiality, and message integrity.
Since SSL is relatively “heavy” for implementations on
mobile devices, which are characterized by limited pro-
cessing capabilities, a lightweight version of SSL named
“KiloByte” SSL (KSSL) have been proposed [12]. This
SSL implementation (KSSL) provides an advantage by
enabling mobile devices (GRPS MS) to communicate di-
rectly and securely with a considerable number of Internet
web servers that support SSL.
Application layer security is also applied in the Wire-
less Application Protocol (WAP) suite [18]. The WAP
architecture is designed for the delivery and presentation
of Internet services on wireless terminals, taking into ac-
count the limited bandwidth of mobile networks and the
limited processing capabilities of mobile devices. It sep-
arates the network in two domains (i.e., the wireless and
the Internet domain) and introduces a WAP gateway that
translates the protocols used in each domain. The WAP
architecture has been standardized in two releases (Ver-
sion 1.2.1 and Version 2.0).
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 165
WSP: Wire less S ess ion P roto col
WTLS : Wireles s Tran sport Layer S ecurit y
WTP : Wir ele ss Tran sport Protoco
WAP
Gateway
SGSN GGSN
Wireless domain
Internet domain
WAP 1 .2.1
Bearer
WDP
WTLS
WTP
WS P
IP
TCP
TLS
HT TP
WAP Gatewa y
IP
TCP
TLS
HTT P
W AE
Web Server
Bea rer
W DP
WTL S
WTP
WS P
W AE
W AP D evice
WTLS security
channel
TLS security
channel
W ired
IP
TCP
TLS
HT TP
WAE
W eb Serv er
Wire less
IP
TC P*
TLS
HTTP
W AE
W AP D evice
Wir eless
IP
TC P*
W ired
IP
TCP
WAP Gateway
TLS Se curity cha nnel
WAP 2.0
HTT P: Hyp erText Transf er Pro tocol
IP: Interne t Pro tocol
TCP: Tran smissi on C ontrol Prot ocol
TCP*: W ireless prof iled TC P
TL S: Tr ans po rt La yer S ec urit y
WAE : Wir eles s Appli cat ion En vironm ent
WAP : Wir eles s Appli cat ion Pr oto col
WDP : Wir eles s Data gra m Proto col
(a)
(b)
Web Server
Figure 4: The architecture of WAP (a) WAP 1.2.1, (b) WAP 2.0
The WAP deployment over the GPRS network archi-
tecture is presented in Figure 4. In WAP 1.2.1 (see Figure
4 (a)), security is applied by using the Wireless Transport
Layer Security (WTLS) protocol [18] over the wireless
domain and the Transport Layer Security (TLS) protocol
over the Internet domain. WTLS, which is based on TLS,
provides peers authentication, data integrity, data pri-
vacy, and protection against denial-of-service in an opti-
mized way for use over narrow-band communication chan-
nels. However, WAP 1.2.1 does not support end-to-end
security, since the conveyed data are protected by two
separate security channels (i.e., WTLS security channel
and TLS security channel).
On the other hand, WAP 2.0 (see Figure 4 (b)) intro-
duces the Internet protocol stack into the WAP environ-
ment. It allows a range of different gateways, which en-
able conversion between the two protocol stacks anywhere
from the top to the bottom of the stack. A TCP-level
gateway allows for two versions of TCP, one for the wired
and another for the wireless network domain. On the
top of the TCP layer, TLS can establish a secure channel
all the way from the MS to the remote server. Thus, the
availability of a wireless profile for TLS enables end-to-end
security allowing interoperability for secure transactions.
5.3.2 Mobile VPN
An alternative approach to the above solutions that
employ security at the application layer pertains to
these that employ security at the network layer. The
most prominent technique for providing security at
the network layer is IPsec [14]. As a network layer
security mechanism, IPsec protects traffic on a per
connection basis, and, thus, is independent from the
applications that run above it. In addition, IPsec is used
for implementation of VPNs [10]. An IPsec-based VPN
is used for the authentication and the authorization of
user access to corporate resources, the establishment of
secure tunnels between the communicating parties and
the encapsulation and protection of the data transmitted
by the network. On demand VPNs that are tailored to
specific security needs are especially useful for GPRS
users, which require any-to-any connectivity in an ad
hoc fashion. Regarding the deployment of VPNs over
the GPRS infrastructure, three alternative security
schemes have been proposed: (a) the end-to-end [21],
(b) the network-wide [20], and (c) the border-based [19].
These schemes mainly differ in the position where the
security functionality is placed within the GPRS network
architecture (MS, SGSN, and GGSN), and whether data
in transit are ever in clear-text or available to be tapped
by outsiders.
End-to-end security scheme:
The end-to-end security scheme integrates the VPN func-
tionality into the communicating peers, which negotiate
and apply security. More specifically, a MS and a remote
security gateway (SG) of a corporate private network es-
tablish a pair of IPsec Security Associations (SAs) be-
tween them, which are extended over the entire multi-
nature communication path, as shown in Figure 5. Thus,
sensitive data are secured as they leave the originator site
(MS or SG), and remain protected while they are con-
veyed over the radio interface, the GPRS backbone net-
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 166
work, and the public Internet, eliminating the possibilities
of being intercepted, or to be altered by anyone.
GPRS IP Core
Public Internet
Pri vate LAN
RemoteA
ccess
MS
Remote
Server
GGSN
Security
Gateway
Um
B SC: B ase S tation Co ntrolle r
B TS: Base Tran scei ver S tatio n
GGSN : Ga teway GPRS Supp ort N ode
MS: Mob ile Statio n
SGS N: Se rving GPRS Sup port N ode
Gb
BSC
BTS
Abis
Public Internet
On demand VPN
SGSN
E
2
e
V
P
N
G
P
R
S
C
I
P
H
E
R
I
N
G
Mobile Netw ork
Figure 5: The end-to-end security scheme
For the end-to-end VPN establishment the IKE [13]
protocol is employed. However, its standard version must
be enhanced to resolve the problems arising from the NAT
presence, and configured to operate in a mobile environ-
ment. IKE provides secure key determination via Diffie-
Hellman (DH) exchanges with authentication of partic-
ipants, protection against reply, hijacking, flooding at-
tacks, and negotiation of encryption and/or authentica-
tion transforms. Authentication is performed by end-
hosts using digital certificates, issued by a trusted cer-
tificate authority. The SA negotiation is not transparent
to the mobile subscriber and his device. However, the
mobile network operator does not even realize the exis-
tence of an end-to-end VPN, and, thus, neither service
level agreement nor trusted relations between the secu-
rity endpoints and the network operator are required. In
this scheme, the trusted relations are limited between the
security endpoints and the certificate authority, which is-
sues digital certificates and facilitates authentication pro-
cess.
The deployed end-to-end VPN has no interrelation
with the underlying network operation and the provided
network connectivity. It operates above the network layer,
and, thus, the security parameters, which are contained
within the IPsec SA, are not affected by the MS move-
ment. For this reason the MS may freely move within
the GPRS coverage area maintaining network connectiv-
ity and VPN service provision. The GPRS mobility man-
agement procedures keep track of the user location, and,
therefore, the incoming packets are routed to the MS.
In the end-to-end security scheme, the necessary en-
hancements for security service provision have minimal
impact on the existing network infrastructure. Specifi-
cally, the GPRS network nodes, and the intermediate IP
routers require no further enhancements or modifications
to support the particular VPN scheme. The changes are
limited to the security endpoints (MS and SG), which in-
corporate the IPsec functionality, including the IKE pro-
tocol to negotiate, establish, and apply security associa-
tions. However, the mobile devices (i.e., MS) are charac-
terized by limited power and processing capabilities. This
may increase significantly the processing latency and re-
sult in service inadequacy. In addition, GPRS employs an
optimized ciphering for packet data transmission over the
radio interface. Thus, the end-to-end security scheme du-
plicates encryption (packet encapsulation) over the scarce
radio interface, which increases the overall communication
cost, and decreases the access network capacity.
Finally, the end-to-end security scheme is not com-
patible with the legal interception option, or any other
application that requires access to the traversing data
within the mobile network. The enforcement of network
security policy, traditionally performed by border fire-
walls, is devolved to end hosts, which establish VPN
overlays. Despite this, the border firewalls remain to
perform packet filtering and counteract against denial of
service attacks [23].
Network-wide and border-based security schemes:
Contrary to the end-to-end security scheme, the network-
wide [20] and the border-based [19] schemes integrate
the VPN functionality into the GPRS network infrastruc-
ture following a network-assisted security model. In both
schemes a MS initiates a VPN that is negotiated and es-
tablished by the network infrastructure, thus, minimiz-
ing the impact to end-users and their devices. The net-
work operators provide the security aggregation facilities,
which are shared amongst the network subscribers, as a
complementary service granting added value. They have
solid network management expertise and more resources
to effectively create, deploy and manage VPN services
originating from mobile subscribers.
For the deployment of both security schemes (i.e.,
network-wide and border-based) the MS must be en-
hanced with a security client (SecC) and the GPRS core
network should incorporate a security server (SecS). The
SecC is employed by the user to request for VPN services
and express his preferences. It is a lightweight module
that does not entail considerable processing and memory
capabilities, and, thus, it can be easily integrated in any
type of mobile device causing minor performance over-
head. On the other side, the SecS establishes, controls
and manages VPNs between itself and remote SGs at cor-
porate LANs on behalf of the mobile users. The SecS
comprises an IPsec implementation modified to adapt to
the client-initiated VPN scheme and the security service
provision in a mobile GPRS environment. It can be read-
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 167
ily integrated in the existing network infrastructure, and,
thus, both schemes can be employed as add-on features
of GPRS.
When a mobile user wants to establish a secure remote
connection towards a SG, it uses the SecC to request for
an IPsec SA from the corporate SecS. VPN initialization
and key agreement procedures are based on an IKE-proxy
scheme [20], which enables the MS to initiate a VPN es-
tablishment, while outsourcing key negotiation to the net-
work infrastructure. The SecS (on behalf of the MS) and
the remote SG authenticate each other using digital sig-
nature. After the VPN establishment, data exchanged
between the MS and the SG are encrypted/decrypted in
the SecS, which resides in the GPRS core network, rely-
ing on the mobile network operator security policy. Thus,
the mobile subscriber and the administrator of the pri-
vate network have to trust the mobile network operator.
Moreover, all the involved parties (mobile users, mobile
operator, and corporate LAN) have to trust the authority,
which issues the digital certificates.
UMTS IP Core
Public Internet
Private LA N
RemoteAccess
Mobile Network
MS
Remote
Server
GGSN
Security
Gateway
Um
BS C: Bas e St ation Con troller
BTS : Base Transc eiver Statio n
GGSN : Gate way GP RS S upport Node
MS: Mobi le Stat ion
SGS N: Serv ing GPR S Sup port N ode
Sec S: S ecur ity Se rver
Gb
BSC
BTS
Abis
C
I
P
H
E
R
I
N
G
G
P
R
S
Public Internet
On Demand VPN
SGSN
SecS
Figure 6: The network-wide security scheme
The network-wide scheme (see Figure 6) integrates the
SecS into the SGSN of the GPRS network infrastructure.
This scheme provides maximal security services to the
communicating peers by employing the existing GPRS ci-
phering over the radio interface and extending a VPN over
the GPRS backbone and the public Internet. Thus, sen-
sitive user data remains encrypted for the entire network
route between the originator and the recipient. In order
to achieve VPN continuity as a mobile user moves and
roams, the standard GPRS mobility management proce-
dures needs to be enhanced. The enhancements include
the transfer of the related context (named as security con-
text), which contains the details of the deployed security
associations that pertain to the moving user, to the new
visited access point. This transfer enables the reconstruc-
tion of the security associations of the moving user to
the new visited access point, when the user connects to
it, providing continuous VPN services from the end-user
perspective. The network-wide scheme is compatible with
legal interception; however, UDP encapsulation is applied
for NAT traversal. Finally, the network security policy is
enforced by the SGSN, which incorporates the SecS.
UMTS IP Core
Remot
eAcce
ss
Public Internet
Private LAN
Mobile Network
MS
Remote
Server
SGSN
Security
Gateway
BSC
BTS
Abis
Um
Public Internet
BS C: B ase Station Co ntroller
BTS: Bas e Transceiver S tation
GGSN: Gatew ay GPRS S upport Node
MS: Mobile S tation
SGS N: Serving GPR S Sup port Node
On DemandV PN
G
P
R
S
C
I
P
H
E
R
I
N
G
Public Internet
GGSN
SecS
Gb
Figure 7: The border-based security scheme
By placing the SecS in the GGSN, the border-based
VPN deployment scheme is realized (see Figure 7). This
scheme protects data conveyance over the public Internet,
which is a vulnerable network segment. The user mobil-
ity is transparent to the VPN operation, as long as the
user remains under the same network operator coverage
and is served by the same GGSN. However, whenever the
mobile user roams to another GGSN, the existing secu-
rity association cannot be used and a new VPN should be
established. The border-based scheme is compatible with
the legal interception option and NAT presence. More-
over, since the SecS resides at the GGSN, it also provides
firewall services to the GPRS network applying network
security policy.
6 Conclusions
This paper has presented an evaluation of the security
architecture employed in GPRS. This architecture com-
prises a set of measures that protect the mobile users,
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 168
the radio access network, the fixed part of the network
and the related data of GPRS. Most of these measures
have been originally designed for GSM, but they have
been modified to adapt to the packet-oriented traffic na-
ture and the GPRS network components. The operational
differences between the application of these measures in
GSM and GPRS have been outlined and commented. In
addition, the security measures that can be applied by
GPRS operators to protect the GPRS backbone network
and inter-network communications, which are based on
IP, have been explored.
Although GPRS have been designed with security
in mind, it presents some essential security weaknesses,
which may lead to the realization of security attacks that
threaten network operations and data transfer through
it. These weaknesses are related to: (a) the compro-
mise of the confidentiality of subscriber’s identity, since
it may be conveyed unprotected over the radio interface;
(b) the inability of the authentication mechanism to per-
form network authentication; (c) the possibility of using
COMP128 algorithm (which has been cryptanalyzed) for
A3 and A8 implementations; (d) the ability of reusing
authentication triplets; (e) the possibility of suppressing
encryption over the radio access network or modifying en-
cryption parameters; and (f) the lack of effective security
measures that are able to protect signaling an user data
transferred over the GPRS backbone network.
The weak points of the GPRS security architecture
may lead to compromises of end-users and network se-
curity of the GPRS system. These compromises may in-
fluence the system deployment and the users’ trend to
utilize GPRS for the provision of advanced multimedia
services, which realizes the concept of mobile Internet.
To address some of the above-mentioned weaknesses, a
set of security enhancements has been proposed. These
enhancements aim at improving the GPRS security archi-
tecture and providing advanced security services to user
data traffic. They include: (a) the use of two additional
temporary identities for each mobile user that is attached
to the network; (b) the incorporation of NDS features into
the GPRS security architecture; (c) the use of application
layer security; and (d) the establishment of mobile VPNs,
dynamically, that satisfy users’ needs. The proposed en-
hancements can be easily integrated in the existing GPRS
infrastructure, minimizing the required changes.
References
[1] 3GPP TS 01.61 (v7.0.0), GPRS Ciphering Algorithm
Requirements, Sep. 2001.
[2] 3GPP TS 03.03 (v7.8.0), Numbering, Addressing and
Identification, Sep. 2003.
[3] 3GPP TS 03.6 (V7.9.0), GPRS Service Description,
Stage 2, Sep. 2002.
[4] 3GPP TS 09.02 (v7.15.0), Mobile Application Part
(MAP) specification, Mar. 2004.
[5] 3GPP TS 09.60 (V7.10.0), GPRS Tunnelling Pro-
tocol (GTP) Across the Gn and Gp Interface, Dec.
2002.
[6] 3GPP TS 33.200 (v4.3.0), 3G Security; Network
Domain Security; MAP Application Layer Security,
Mar. 2002.
[7] E. Barkan, E. Biham, and N. Neller, “Instant
ciphertext-only cryptanalysis of GSM encrypted
communication,” in Proceedings Advances in Cryp-
tology (CRYPTO 2003), LNCS 2729, pp. 600-616,
Aug. 2003.
[8] ETSI TS 100 922 (v7.1.1), Subscriber Identity Mod-
ules (SIM) Functional characteristics, July 1999.
[9] B. Gleeson, A. Lin, J. Heinanen, G. Armitage, and
A. Malis, A Framework for IP Based Virtual Private
Networks, RFC 2764, Feb. 2000.
[10] B. Gleeson, A. Lin, J. Heinanen, G. Armitage, and
A. Malis, A Framework for IP Based Virtual Private
Networks, RFC 2764, Feb. 2000.
[11] GSM 03.20, Security Related Network Functions,
Nov. 1999.
[12] V. Gupta and S. Gupta, “Securing the wireless inter-
net,” IEEE Communications Magazine, vol. 39, no.
12, pp. 68-74, Dec. 2001.
[13] D. Harkins and D. Carrel, The Internet Key Ex-
change (IKE), RFC 2409, Nov. 1998.
[14] S. Kent and R. Atkinson, Security Architecture for
the Internet Protocol, RFC 2401, Nov. 1998.
[15] C. Mitchell, The Security of the GSM Air
Interface Protocol, Technical Report, Royal
Holloway University of London, Aug. 2001.
(http://www.ma.rhul.ac.uk/techreports/)
[16] P. Pagliusi, “A Contemporary Foreword on GSM Se-
curity,” in Proceedings Infrastructure Security Inter-
national Conference (InfraSec 2002), LNCS 2437, pp
129-144, Springer-Verlag, 2002.
[17] P. Srisuresh and M. Holdrege, IP Network Address
Translator (NAT) Terminology and Considerations,
RFC 2663, Aug. 1999.
[18] Wireless Application Forum (WAP), WAP speci-
fications. (http://www.wapforum.org/what/ techni-
cal.htm)
[19] C. Xenakis and L. Merakos, “Dynamic network-
based secure VPN deployment in GPRS,” in Pro-
ceedings of IEEE International Symposium on Per-
sonal, Indoor and Mobile Radio Communications
(PIMRC’02), pp. 1260-1266, Lisboa, Portugal, Sep.
2002.
[20] C. Xenakis and L. Merakos, “On demand network-
wide VPN deployment in GPRS,” IEEE Network,
vol. 16, no. 6, pp. 28-37, Nov/Dec. 2002.
[21] C. Xenakis, E. Gazis, and L. Merakos, “Secure VPN
deployment in GPRS mobile network,” in Proceed-
ings of International Conference on European Wire-
less, pp. 293-300, Florence Italy, Feb. 2002.
[22] C. Xenakis and L. Merakos, “Security in third gener-
ation mobile networks,” Computer Communications,
vol. 27, no. 7, pp. 638-650, May 2004.
International Journal of Network Security, Vol.6, No.2, PP.158–169, Mar. 2008 169
[23] C. Xenakis and L. Merakos, “Alternative schemes
for dynamic secure VPN deployment over UMTS,”
Wireless Personal Communications, vol. 36, no. 2,
pp. 163-194, Springer, Jan. 2006.
Christos Xenakis received his B. Sc
degree in computer science in 1993
and his M.Sc degree in telecommuni-
cation and computer networks in 1996,
both from the Department of Infor-
matics and Telecommunications, Uni-
versity of Athens, Greece. In 2004 he
received his Ph. D. from the Univer-
sity of Athens (Department of Informatics and Telecom-
munications). From 1998 - 2001 he was with a Greek
telecoms system development firm, where he was involved
in the design and development of advanced telecommuni-
cations subsystems for ISDN, ATM, GSM, and GPRS.
Since 1996 he has been a member of the Communication
Networks Laboratory of the University of Athens and,
currently, he is the head of the Security Group. He has
participated in numerous projects realized in the context
of EU Programs (ACTS, ESPRIT, IST). His research in-
terests are in the field of system and network security. He
is the author of over 25 papers in the above area.
... Most commonly, such techniques aim for billing frauds [186] and denial of service [53,166] using SIP protocols. e GPRS tra c emerging from the interconnection and roaming network can also give initial access to the adversaries due to the vulnerabilities in the architecture [181,182] or due to lack of security measures in signaling protocols [137]. Similarly, exploiting the Domain Network System (DNS), which maps the mobile IP addresses to human-readable hostnames, can also be used as an initial access technique for conducting denial of service a acks on the operator's core network [170]. ...
Preprint
Full-text available
Due to the complex nature of mobile communication systems, most of the security efforts in its domain are isolated and scattered across underlying technologies. This has resulted in an obscure view of the overall security. In this work, we attempt to fix this problem by proposing a domain-specific threat modeling framework. By gleaning from a diverse and large body of security literature, we systematically organize the attacks on mobile communications into various tactics and techniques. Our framework is designed to model adversarial behavior in terms of its attack phases and to be used as a common taxonomy matrix. We also provide concrete examples of using the framework for modeling the attacks individually and comparing them with similar ones.
... The feasibility of wireless crimes with illegal transceivers to impersonate legitimate radio frequency devices or infrastructures has been studied by many researchers. Xenakis et al. [12,48,49] analyzed the vulnerabilities in cellular networks and discussed the feasibility of Man-in-the-middle attacks. Mjolsness et al. [29] showed that even the state-of-art LTE (4G) networks can suffer IMSI catcher attacks. ...
Conference Paper
Fake base station (FBS) crime is a type of wireless communication crime that has appeared recently. The key to enforcing the laws on regulating FBS based crime is not only to arrest but also to convict criminals effectively. Much work on FBS discovering, localization, and tracking can assist the arresting, but the problem of collecting evidence accurately to support a proper conviction has not been addressed yet. To fill in the gap of enforcing the laws on FBS crimes, we design FBSleuth, an FBS crime forensics framework utilizing "radio frequency (RF) fingerprints'', e.g., the unique characteristics of the FBS transmitters embedded in the electromagnetic signals. Essentially, such fingerprints stem from the imperfections in hardware manufacturing and thus represent a consistent bond between an individual FBS device and its committed crime. We model the RF fingerprint from the subtle variance of the modulation errors, instantaneous frequency, and phases of the RF signals. Our validation of FBSleuth on six FBSes from four cities over more than 5 months shows that FBSleuth can achieve over 99% precision, 96.4% recall, and 97.94% F1 score in a dynamic wild environment.
... CDMA2000 uses Authentication key (A-Key) and Electronic Serial Number (ESN, in 2006 is replaced by MEID or Mobile Equipment ID which allows hexadecimal unlike just decimal digits in GSM). However, each has been proven to have its own strength and weakness [28]- [29]. ...
Conference Paper
Full-text available
In the recent years, it has become readily more accepted that smart mobile phones with GPS or A-GPS enabled device, or even Cell-ID enabled, among the commuters, can be used as traffic sensor, which complements other traditional sensors. This development is pursued in the efforts of reducing or avoiding traffic jams. Consequently, this paper attempts to find a novel way to map match 2D local map with actual GPS traces from mobile phones. From a number of experiments, it has been found that Virtual Detection Zone method can be used to obtain 100% map matching, as it ensures matching by comparing the GPS data to a set of predetermined check points (circular VDZ, preferably with a radius of 50-185m). Furthermore, from this study, it is proposed to increase privacy, firstly by using OTP to doubly-lock the sensor's data. Secondly, by ensuring that valid data is only delivered from a significant distance of the user's private locations, and thirdly, by splitting the data to two parts before using OTP.
... a) the invocation of certain security procedures specified by the related standards, but their deployment and configuration are left to the operator; b) the cryptographic algorithms that the operator selects to employ (i.e., from the available set determined by the related standards) to protects its users' communications; c) the employed technology (i.e., 2G or 3G), since each one is accompanied by a different security architecture [3] [19]. ...
Article
The lack of precise directives in 3GPP specifications allows mobile operators to configure and deploy security mechanisms at their sole discretion. This may lead to the adoption of bad security practices and insecure configurations. Based on this observation, this paper presents the design and implementation of a novel mobile application named (U)SimMonitor that captures and analyses the security policy that a cellular operator enforces i.e., the invocation and employment of the specified security measures to protect its users. (U)SimMonitor achieve this by executing AT commands to extract network related parameters including encryption keys, identities, and location of users. Using (U)SimMonitor as our basic analysis tool, we have conducted a set of experiments for three mobile operators in Greece in a time period of 9 months. The obtained results allow us to quantify, compare and evaluate their applied security as well as pinpoint a set of generic critical observations. Numerical results and security measurements show that mobile networks have poor security configurations and practices, exposing subscribers to several attacks.
Article
This paper presents a domain-specific threat-modeling framework for the cellular mobile networks. We survey known attacks against mobile communication and organize them into attack phases, tactical objectives, and techniques. The Bhadra framework aims to provide a structured way to analyze and communicate threats on a level that abstracts away the technical details but still provides meaningful insights into the adversarial behavior. Our goals are similar to existing threat modeling frameworks for enterprise information systems, but with a focus on mobile operator networks. The framework fills a gap that has existed in tools and methodology for sharing of threat intelligence within and between organizations in the telecommunications industry. The paper includes concrete case studies of applying the framework. It can also be read as a survey of attacks against mobile networks. CCS CONCEPTS Security and privacy → Security requirements; Mobile and wireless security; Networks→ Networks Mobile networks
Article
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, we extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based on several parameters, like location of an attacker in the network, nature of a communication channel, and impersonation techniques. Based on an impersonation techniques classification, we then provide execution steps for each MITM class. We survey existing countermeasures and discuss the comparison among them. Finally, based on our analysis, we propose a categorisation of MITM prevention mechanisms, and we identify some possible directions for future research.
Conference Paper
This paper proposes a full EV charging network architecture, based on the current test-pilot of a national energy provider. The Electric Vehicle Charging Station (EVCS) follows a modular approach, allowing multi-communication technologies, such as, General Packet Radio Service (GPRS), Wi-Fi and Ethernet. The EVCS was verified both in the functional, as well as in the electrical domain. The prototype implementation of the EVCS is already fully operational and integrated in an energy operator EVCS network. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
Conference Paper
Advances in information technology depend on the availability of telecommunication, network and mobile technologies. With the rapid increasing number of mobile devices being used as essential terminals or platforms for communication, security threats now target the whole telecommunication infrastructure that includes mobile devices, radio access network, and the core network operated by the mobile operators. In particular, the mobile core network is the most important part of the mobile communication system because different access networks are consolidated at the core network. Therefore, any risks associated with the core network would have a significant impact on the mobile network regardless of technologies of access networks are in use. This paper reviews the security risks in the mobile core network for data services by considering the confidentiality, integrity and availability (CIA) aspects, and then relates them to the ITU-T X.805 reference framework. Finally, this paper provides a recommendation on how to address these risks using the ITU-T X.805 reference framework. This paper will benefit mobile operators and network designers looking to secure the mobile packet core system.
Article
Full-text available
The cellular network security decreases due to increasing numbers of operators on cellular networks. The smart phones and mobile networks are utilized for many applications such as mobile payment, money transport, stock trade and Internet banking. Despite this large number of mobile subscribers served by so many mobile networks, the cellular networks suffer from severe security vulnerabilities and attacks. This paper surveys the state of threats, vulnerabilities and security solutions for cellular network generations where each generation has its own attacks and security vulnerabilities and solutions to handle these threats. Attacks against GSM, UMTS and LTE and their solutions have also been surveyed.
Article
Full-text available
Three alternative schemes for secure Virtual Private Network (VPN) deployment over the Universal Mobile Telecommunication System (UMTS) are proposed and analyzed. The proposed schemes enable a mobile node to voluntarily establish an IPsec-based secure channel to a private network. The alternative schemes differ in the location where the IPsec functionality is placed within the UMTS network architecture (mobile node, access network, and UMTS network border), depending on the employed security model, and whether data in transit are ever in clear-text, or available to be tapped by outsiders. The provided levels of privacy in the deployed VPN schemes, as well as the employed authentication models are examined. An analysis in terms of cost, complexity, and performance overhead that each method imposes to the underlying network architecture, as well as to the mobile devices is presented. The level of system reliability and scalability in granting security services is presented. The VPN management, usability, and trusted relations, as well as their behavior when a mobile user moves are analyzed. The use of special applications that require access to encapsulated data traffic is explored. Finally, an overall comparison of the proposed schemes from the security and operation point of view summarizes their relative performance.
Article
This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at
Article
Network Address Translation is a method by which IP addresses are mapped from one realm to another, in an attempt to provide transparent routing to hosts. Traditionally, NAT devices are used to connect an isolated address realm with private unregistered addresses to an external realm with globally unique registered addresses. This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT.
Article
ISAKMP ([MSST98]) provides a framework for authentication and key exchange but does not define them. ISAKMP is designed to be key exchange independant; that is, it is designed to support many different key exchanges.
Conference Paper
In this paper we present a very practical ciphertext-only cryptanalysis of GSM encrypted communication, and various active attacks on the GSM protocols. These attacks can even break into GSM networks that use “unbreakable” ciphers. We describe a ciphertext-only attack on A5/2 that requires a few dozen milliseconds of encrypted off-the-air cellular conversation and finds the correct key in less than a second on a personal computer. We then extend this attack to a (more complex) ciphertext-only attack on A5/1. We describe new attacks on the protocols of networks that use A5/1, A5/3, or even GPRS. These attacks are based on security flaws of the GSM protocols, and work whenever the mobile phone supports A5/2. We emphasize that these attacks are on the protocols, and are thus applicable whenever the cellular phone supports a weak cipher, for instance they are also applicable using the cryptanalysis of A5/1. Unlike previous attacks on GSM that require unrealistic information, like long known plaintext periods, our attacks are very practical and do not require any knowledge of the content of the conversation. These attacks allow attackers to tap conversations and decrypt them either in real-time, or at any later time. We also show active attacks, such as call hijacking, altering of data messages and call theft.
Article
In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted communication, and various active attacks on the GSM protocols. These attacks can even break into GSM networks that use “unbreakable” ciphers. We first describe a ciphertext-only attack on A5/2 that requires a few dozen milliseconds of encrypted off-the-air cellular conversation and finds the correct key in less than a second on a personal computer. We extend this attack to a (more complex) ciphertext-only attack on A5/1. We then describe new (active) attacks on the protocols of networks that use A5/1, A5/3, or even GPRS (General Packet Radio Service). These attacks exploit flaws in the GSM protocols, and they work whenever the mobile phone supports a weak cipher such as A5/2. We emphasize that these attacks are on the protocols, and are thus applicable whenever the cellular phone supports a weak cipher, for example, they are also applicable for attacking A5/3 networks using the cryptanalysis of A5/1. Unlike previous attacks on GSM that require unrealistic information, like long known-plaintext periods, our attacks are very practical and do not require any knowledge of the content of the conversation. Furthermore, we describe how to fortify the attacks to withstand reception errors. As a result, our attacks allow attackers to tap conversations and decrypt them either in real-time, or at any later time. We present several attack scenarios such as call hijacking, altering of data messages and call theft.
Article
In the last few years, we have witnessed an explosion in demand for security measures motivated by the proliferation of mobile/wireless networks, the fixed-mobile network convergence, and the emergence of new services, such as e-commerce. 3G-systems play a key role in this network evolution, and, thus, all stakeholders are interested in the security level supported in the new emerging mobile environment. This paper elaborates on the security framework in 3G mobile networks. The security requirements imposed by the different types of traffic, and by the different players involved (mobile users, serving network and service providers) are investigated. The security architecture, which comprises all the security mechanisms that are projected for the Universal Mobile Telecommunication System (UMTS) network, is analyzed. The employment of traditional security technologies, originally designed for fixed networking, such as firewalls, and static Virtual Private Network (VPN), in order to safeguard the UMTS core network from external attacks, as well as to protect user data when conveyed over the network are examined. Critical points in the 3G-security architecture that may cause network and service vulnerability are identified and discussed. Furthermore, proposals for the enhancement of the 3G-security architecture, and the provision of advanced security services to end-user data traffic within and outside the UMTS core network are discussed. The proposed enhancements can be easily integrated in the existing network infrastructure, and operate transparently to the UMTS network functionality.
Conference Paper
This article contains a current outline of the GSM system security, with focus on the air interface protocol. It presents the terminology and de- scribes the GSM security operation, including its principles and features. This document also discusses the effectiveness of GSM authentication and the strength of GSM encryption. It includes therefore the most significant physical and cryptanalytic attacks on GSM security mechanisms, such as the up to date optical fault induction and partitioning attacks. GSM security features retained and enhanced for the 3G Security and further applications in network (Inter- net) remote access are also contemplated. This article aims primarily at con- tributing to a progressive research in mobile systems security and at reviewing the security solutions implemented in this area for further applications.