16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Security</strong> in Traditional <strong>Wireless</strong> Networks 375<br />

microwave (wireless links). GSM does not specify how to secure this link, thus making it<br />

susceptible to attacks.<br />

There is another important characteristic of the GSM authentication process that is worth<br />

discussing. In GSM, the authenticating entity is the SIM and not the subscriber per se. In<br />

other words, the network authenticates the SIM card and not the subscriber of the SIM<br />

card. Remember that the authentication process relies on a preshared secret (K i ) between<br />

the SIM and the AuC. During the authentication process, the MSC validates that the SIM<br />

trying to access the network has a valid K i . What happens if a ME is stolen and is used<br />

for making calls (and using other GSM services)?<br />

GSM does have some countermeasures to protect against equipment theft. For one, the<br />

GSM core network maintains a database of all valid mobile equipment 7 on the network.<br />

This database is called the Equipment Identity Register (EIR). If a subscriber loses their<br />

ME, it is their responsibility to report it to the service provider. Before authenticating<br />

the ME into the network, the MSC also ensures that the ME that is trying to authenticate<br />

in to the network has not been compromised. Extrapolating this approach, a service<br />

provider may also maintain a list of compromised SIMs. When a SIM is reported stolen,<br />

the service provider marks the IMSI and the corresponding K i<br />

8<br />

as compromised. If a<br />

compromised SIM tries to access the network, it is denied access.<br />

Note that when the GSM authentication process completes, it has also established a<br />

security context: the session key K c which can then be used for providing confidentiality<br />

in the network. It is the preshared secret key (K i ) between the SIM and the AuC that<br />

forms the basis of generating the session key. GSM uses the A8 algorithm to derive a<br />

session key K c from the preshared secret key K i as shown in Figure 17.4 .<br />

Compare Figure 17.4 with Figure 17.3 . The purpose of the A8 algorithm is to derive a 64-bit<br />

session key (K c ) given the 128-bit K i and the 128-bit RAND. On the other hand, the purpose<br />

of the A3 algorithm is to derive a 32-bit SRES given the same two inputs (the K i and the<br />

RAND). The important thing to note here is that A3 and A8 are not algorithms per se: they are<br />

just labels (reference names) for algorithms. In other words, a service provider is free to use<br />

7 Each ME in the GSM network is uniquely identified by the international mobile equipment<br />

identity (IMEI).<br />

8 There is a one-to-one mapping between the IMSI and the K i .<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!