Wireless and Mobile Network Security 9780070700246 0070700249 - Compress PDF
Wireless and Mobile Network Security 9780070700246 0070700249 - Compress PDF
Network Security
About the Authors
Pallapa Venkataram received his PhD degree in Infor-
mation Sciences from the University of Sheffield, UK, in
1986. He is currently a Professor of Electrical Commu-
nication Engineering with the Indian Institute of Science,
Bangalore, India. He is also the Chief Program Executive
of the Protocol Engineering Technology (PET) unit where
he is involved in research on protocol engineering, wire-
less networks, network management, computational intel-
ligence applications in communication, mobile computing security and multimedia
systems. He is a Fellow of IEE (England), Fellow of IETE(India) and a Senior
member of IEEE Computer Society. Dr Pallapa is the holder of a Distinguished
Visitor Diploma from the Orrego University, Trujillo, Peru. He has published
and presented over 150 papers in international/national journals/conferences, and
authored/contributed chapters for 12 books in the area of networking, protocol
engineering, and security.
Pallapa Venkataram
Professor
Department of Electrical Communication Engineering
Indian Institute of Science, Bangalore, Karnataka
B Sathish Babu
Professor
Department of Computer Science and Engineering
Siddaganga Institute of Technology
Tumkur, Karnataka
Information contained in this work has been obtained by Tata McGraw-Hill, from sources
believed to be reliable. However, neither Tata McGraw-Hill nor its authors guarantee the
accuracy or completeness of any information published herein, and neither Tata McGraw-
Hill nor its authors shall be responsible for any errors, omissions, or damages arising
out of use of this information. This work is published with the understanding that Tata
McGraw-Hill and its authors are supplying information but are not attempting to render
engineering or other professional services. If such services are required, the assistance of
an appropriate professional should be sought.
Typeset at The Composers, 260, C.A. Apt., Paschim Vihar, New Delhi 110 063 and printed
at Pushp Print Services, B-39/12 A, Gali No. 1, Arjun Mohalla, Moujpur, Delhi 110 053
Cover Design: K Anoop
Cover Printer: Rashtriya Printers
RZXYCRAZRQBDQ
In memory of
Dr Bharathi Pallapa
Contents
Preface ix
1. Security Issues in Mobile Communications 1
1.1 Mobile Communication History 2
1.2 Security—Wired vs Wireless 12
1.3 Security Issues in Wireless and Mobile Communications 12
1.4 Security Requirements in Wireless and Mobile Communications 15
1.5 Security for Mobile Applications 17
1.6 Advantages and Disadvantages of Application-level Security 24
Summary 25
Review Questions 25
2. Security at Device, Network, and Server Levels 27
2.1 Mobile Devices’ Security Requirements 28
2.2 Mobile Wireless Network Level Security 39
2.3 Server Level Security 47
Summary 53
Review Questions 53
3. Application Level Security in Wireless Networks 55
3.1 Application of WLANs 57
3.2 Wireless Threats 59
3.3 Some Vulnerabilities and Attack Methods over WLANs 61
3.4 Security for 1G Wi-Fi Applications 68
3.5 Security for 2G Wi-Fi Applications 70
3.6 Recent Security Schemes for Wi-Fi Applications 73
Summary 82
Review Questions 82
4. Application Level Security in Cellular Networks 83
4.1 Generations of Cellular Networks 84
4.2 Security Issues and Attacks in Cellular Networks 88
4.3 GSM Security for Applications 92
4.4 GPRS Security for Applications 100
4.5 UMTS Security for Applications 105
4.6 3G Security for Applications 109
4.7 Some of Security and Authentication Solutions 112
Summary 117
Review Questions 117
viii Contents
Overview
In today’s world of high mobility, there is a growing need for people to com-
municate with each other and have timely access to information regardless of the
location of individuals or information. This need is supported by the advances in
the technologies of networking, wireless communications, and portable comput-
ing devices with reduction in the physical size of computers, leading to the rapid
development in mobile communication infrastructure. Hence, mobile and wireless
networks present many challenges to hardware, software, network and application
designers and implementers. One of the biggest challenges is to provide a secure
mobile environment. Security plays a more important role in mobile communica-
tion systems than in systems that use wired communication. This is mainly because
of the ubiquitous nature of the wireless medium that makes it more susceptible to
security attacks than wired communications.
There are various technologies for wireless networks, such as Cellular, Blue-
tooth, Ultra Wideband (UWB), Wi-Fi, Pervasive, and hybrid wireless networks.
All of these wireless systems are vulnerable to security issues which are either
general or specific to the networks. The required level of security depends on the
design and type of the wireless network. For example, public Wi-Fi hotspots are
typically unsecure from a user perspective because there is no data encryption,
something that can allow a hacker to monitor your organization files, emails, and
passwords flying unguarded over the airwaves. Public users may need to offer
credentials to access Internet services, but the immediate wireless LAN is still
wide open to hackers.
Objective
The available books on wireless network security mainly focus on security issues,
challenges, attacks, and solutions pertaining to Wi-Fi networks, cellular networks,
ad-hoc networks, home networking, ubiquitous networks, and so on. But they lack
in providing a dimension on how security schemes could be linked with categories
of applications, and the quantum of security required for their transaction running
over these networks.
The proposed book comprehensively deals with various security issues, chal-
lenges, attacks, protocols, and available security solutions for wireless technolo-
gies. However its main focus is to bring together available research literature, and
techniques about making the security dynamic, and adaptive to applications. The
x Preface
Target Audience
This book can be used as text/reference for the following subjects:
System and Network Security; Information Privacy and Computer Security;
Telecommunications, Network and Internet Security; Special Topics in Information
Security; Wireless Networks and Security; Secure Communications; Ubiquitous
Computing; Network and Distributed Systems Security; Mobile Communication
Networks; Information Security.
These subjects are offered as compulsory/elective papers in BTech final year
and MTech 1st/2nd Semester in CSE/IT/Telecom/Information Security streams.
Also, graduate students preparing for PhD or Masters degree in network com-
munication or information systems and researchers in information security or com-
munication networks who require an introduction to the issues of mobile security
will find this book to be very useful.
Salient Features
Provides information on latest researches and developments in the field of
security related to various networking technologies
Hands-on approach for implementing different techniques linked with net-
work security
Well-organized presentation of security issues, attacks, solutions and chal-
lenges
Covers conventional as well as updated attacks pertaining to various wireless
networks
Detailed coverage on Ubiquitous and Integrated Network Security
Chapter Organisation
The book is divided into 8 chapters. Chapter 1 is on Security Issues in Mobile
Communications. This chapter deals with mobile communication history, wired vs
wireless security, security issues in wireless and mobile communications, security
requirements, security for mobile applications, and so on.
Chapter 2 on Security at Device, Server, and Network Levels describes mobile
device security requirements, mobile wireless network level security, and server
level security issues.
Chapter 3 discusses Application Level Security in Wireless Networks. This
chapter highlights security issues involved in wireless applications independent
of networks and devices. It also details wireless security issues; wireless threats;
Preface xi
Web Supplements
The book is well supported by an exhaustive website which can be accessed at
http://www.mhhe.com/venkataram/wmns which includes the following:
For Instructors
PowerPoint Slides (chapterwise)
For Students
Additional practice questions
Chapterwise links to important websites and important text materials
xii Preface
Acknowledgements
First of all, we would like to express our thanks to all those reviewers whose inputs
proved valuable while shaping this text. Their names are given below:
Dinesh Kumar Tyagi
Birla Institute of Technology and Science (BITS), Pilani, Rajasthan
Karm Veer Arya
Atal Bihari Vajpayee Indian Institute of Information Technology and
Management (ABV-IIITM), Gwalior, Madhya Pradesh
C Vijay Kumar
Dhirubhai Ambani Institute of Information and Communication (DAIICT),
Gandhinagar, Gujarat
Jigisha Patel
Sardar Vallabbhai National Institute of Technology (SVNIT), Surat, Gujarat
M P Sebastian
Indian Institute of Management, Kozhikode, Kerala
The Tata McGraw-Hill team of Shalini Jha, Surabhi Shukla, Surbhi Suman,
Sohini Mukherjee and Anjali Razdan deserves a special note of appreciation for
the enthusiasm they showed while handling the text in all its stages—development,
editing, and proofreading.
Finally, we are indebted to our families for their love, patience and wholehearted
support in everything that we do. Without their contribution, this milestone would
not be achieved.
We have taken care to present the concepts in a simple manner in this book
and hope that the teaching and student community will wholeheartedly welcome
and appreciate it. The readers should feel free to convey their criticism and sug-
gestions for further enhancement at the below mentioned publisher’s e-mail id.
PALLAPA VENKATRAM
B SATHISH BABU
Publisher’s Note
Tata McGraw Hill Education looks forward to receiving your views, feed-
back and suggestions for improvement of the book. These may be emailed at
[email protected]. Please mention the book title and author’s name in
the subject line. Please report any piracy spotted by you as well !!
List of Important
Abbreviation
OBJECTIVES
There are three lines of evolution of wireless mobile network architectures that
have been defined to support wireless technologies and the related services:
1. Those of interpersonal communication, based on the use of electromagnet-
ic bands are generally subject to regulation and for this reason are highly
estimated.
2. Those of communication among information technology and network
devices, that substitutes the shared physical media (the wire) with tech-
nologies using part of the electromagnetic spectrum. The bandwidth in-
volved can be both under or without the control of regulation authority,
according to the specific country considered.
3. Those generally used for man-machine interaction, mostly for sending
a command or an exchange of information.
GSM
GSM (Fig.1.1) is a classic digital mobile system built on a radio interface of
TDM type. Its basis was within the CEPT (Conference of European Post and
Telecommunications) with the constitution of the “Groupe Special Mobile”.
That was the origin of the name ‘GSM’, today changed to “Global System
for Mobile communications”.
Basic GSM was designed for voice communications at 9 Kbit/s, but data
capability was with the CSD service (Circuit Switched Data at a maximum of
9.6 Kbit/s), the SMS (Short Message Service, the well-known packet-oriented
messaging service), the ability to support FAX, and minimal broadcasting ca-
pabilities (the broadcast of cell information). But substantially remains linked
to the circuit switched genesis of the system. ETSI (European Telecommunica-
tions Standard Institute) carried on the extension of GSM with the inclusion
of the HCSD (High speed CSD) capable to reach 38.4 Kbit/s. In parallel
ETSI put the basis for a further evolution of the GSM radio interface defining
EDGE (Enhanced Data rates for GSM) Evolution, based on the introduction
of a new modulation and consequent increasing of the GSM/CSD/GPRS data
rates. ETSI also started the work on the W-CDMA based UMTS (Universal
4 Wireless and Mobile Network Security
ISDN
NSS MSC
PSTN
A Interface
BSS
BSC
Abis Interface
BTS
OSS
Um Interface
MS
GPRS
GPRS (General Packet Radio Service) shown in Fig. 1.2, is the first packet-
oriented extension of GSM capable of managing a minimum of bit rate. The
radio interface is the same TDMA scheme used for GSM, but the use of the
slot is significantly different. Each slot is temporarily assigned to a terminal
just for the time of the transmission, allowing the statistical multiplexing of
Security Issues in Mobile Communications 5
Circuit
Switched GPRS
GSM AUS GGSN GGSN
HLR
Internal Backbone Network
MSC
EIR
SGSN SGSN
BSS
Signalling
the slots among different terminals. GPRS foresees the allocation of multiple
slots to the same terminal, increasing significantly the maximum bit rate. Typi-
cal numbers are 4+2 (4 for downlink and 2 for uplink) to privilege download
and 2+2 for symmetric communications. GPRS also allows reducing the error
protection, incrementing the net bit rate of each slot. This is related to different
considerations—GSM was presumably designed to excessively protect against
errors with respect to the radio condition obtained in present networks. A GPRS
user is less mobile than a GSM one, so he/she has to face more stable radio
conditions. Packet transmission implements a different and shorter interleaving,
so the burst errors are less distributed on the transmission, being recovered
by RLC re-transmission for wrongly received packets. This is allowed by the
non-real time characteristics of GPRS. Depending on the radio condition, four
levels of protection are possible, namely Coding Scheme 1, 2, 3, and 4.
modulation from GSMK to 8PSK. The GSM 8-slot TDM frame is maintained
but the number of bit transmissible in each slot is increased. EDGE is fully
compatible with GPRS in the sense that as a fallback it could work as GMSK.
UMTS is essentially based on the addition to the GSM/GPRS systems of a
new type of access network, based on a completely different radio technique,
the CDMA one. The UMTS, GPRS, EDGE and GSM can be a single system
with a single CS/PS core network capable to serve all the type of accesses.
Wireless LAN
Frequency hopping is a radio transmission technology where the signal is
divided in multiple parts and then sent across the air in a random pattern of
jumping, or “hopping” frequencies. When transmitting data, these “multiple
parts” are data packets. The hopping pattern can be anywhere from several
times per second to several thousand times per second. The Secret Commu-
nications System designed for World War II was the beginning of Wireless
LAN. A Wireless LAN or WLAN can be considered as a cabled Local Area
Network (LAN) shown in Fig. 1.3, where the physical medium is substituted
by a radio frequency. Instead of towers, Wireless LANs use a base station to
talk to their devices.
When the Wireless Ethernet Compatibility Alliance (WECA) launched the
Wi-Fi certification, it was used to certify the interoperability among differ-
ent vendors. WECA’s mission is to certify interoperability of IEEE 802.11
products and to promote Wi-Fi as the global wireless LAN standard across
all market segments. Even if a WLAN does not (and probably will never) of-
fer the same performance as a cabled LAN, which can now almost reach the
Gigabit, it can give a certain number of benefits—mobility, reduced installation
costs, and high integration among different mobile devices. The fundamental
Security Issues in Mobile Communications 7
Access Point
Internet
Firewall
Intranet
Access Point
Application
Server
component of a wireless LAN is the Basic Service Set (or BSS). The BSS
contains a single Access Point (AP) and a certain number of peripheral nodes.
To establish the wireless link, each node and an AP uses a small RF radio,
which includes an antenna, a transceiver, a modem and some signal processing
electronics. All the nodes communicate with each other by using an AP as a
bridge to relay the signals.
The first role of the AP is to get all the nodes in the BSS to talk to each
other. The WLAN frequency bands are license exempt, which means that the
spectrum is available to any operator wishing to deploy a WLAN infrastruc-
ture without any need to deal with the regulator. A wireless LAN can be set
up without an AP in which all nodes communicate directly with each other.
This peer-to-peer arrangement is sometimes referred to as an ad hoc network
(See Fig. 1.4). As an example, a BSS may be a single floor in a big office
building. It is possible to interconnect two BSSs through an Extended Service
Set (ESS) by getting their individual APs to talk to each other. The 802.11
standard is really a series of standards updates reflecting improvement in tech-
nology and/or the employment of additional spectrum. There are three IEEE
approved standards—802.11b, 802.11a, and 802.11g that exist. The 802.11b
is the most popular and it works in the 2.4 GHz frequency spectrum, which
is shared with other technologies, such as cordless phones and microwave
ovens. The range is about 30–50 meters indoor. The maximum theoretical
speed is 11 Mbps, while the real throughput is about 4–6 Mbps, due to the
transmission protocol overheads. WLAN systems based on 802.11a use the 5
GHz frequency spectrum. The use of this frequency makes the IEEE 802.11a
8 Wireless and Mobile Network Security
Client
Client
Client
incompatible with the 802.11b and it is not widely used in Europe, due to
specific restrictions in the use of this frequency by private and commercial
users. The maximum theoretical speed is 54 Mbps, while the real throughput is
about 22 Mbps, but the range is only no more than 25 meters. The 802.11g is
the most recent standard, it operates in the same 2.5 GHz frequency spectrum
as 802.11b, which makes it compatible with the previous generation products.
The maximum theoretical speed is 54 Mbps, as for 802.11a, while the real
throughput is about 15–20 Mbps. The range is about 30–50 meters indoor. The
three standards “a”, “b” and “g” can coexist in the same product.
Wireless PAN
A WPAN (Wireless Personal Area Network) shown in Fig. 1.5, is a personal
area network for interconnecting devices centered around an individual person’s
workspace in which the connections are wireless. Typically, a wireless per-
sonal area network uses some technology that permits communication within
about 10 meters, in other words, a very short range. One such technology is
Bluetooth, which was used as the basis for a new standard, IEEE 802.15, a
WPAN could serve to interconnect all the ordinary computing and communi-
cating devices that many people have on their desk or carry with them today,
or it could serve a more specialised purpose such as allowing the surgeon and
other team members to communicate during an operation.
Piconet 1 Piconet 2
S SB
P
P S
M = Master
M
M S = Slave
S P = Parked
S
SB = Standby
S
P
P
A key concept in WPAN technology is known as plug and use. In the ideal
scenario, when any two WPAN-equipped devices come into close proximity
(within several meters of each other) or within a few kilometres of a central
server, they can communicate as if connected by a cable. Another important
feature is the ability of each device to lock out other devices selectively,
preventing needless interference or unauthorised access to information. The
technology for WPANs is in its infancy and is undergoing rapid development.
Proposed operating frequencies are around 2.4 GHz in digital modes. The ob-
jective is to facilitate seamless operation among home or business devices and
systems. Every device in a WPAN will be able to plug in to any other device
in the same WPAN, provided they are within physical range of one another.
In addition, WPANs worldwide will be interconnected.
Bluetooth is a specification for short-range wireless communication which
has emerged as the leading candidate for an international standard for PAN.
The bluetooth technology implements a simple low cost and low power sys-
tem which allow devices to communicate in a “piconet”. It supports many
simultaneous and private connections, with hundreds of private piconets within
range of each other. It supports both voice and data. It is very low power and
compact to support the small portable devices into which the technology will
be integrated, such as mobile computer, the mobile phone, and small personal
digital assistants. The technology must be secure as a cable, which means to
support application/link-layer authorisation, authentication, and encryption.
Broadband Networks
Broadband Internet
Local-Area Application
Access (e.g, Servers
HIPERLAN/2, IEEE
Service
802.11b, fixed
Connection & Integration
wireless)
Control Servers & Content
Corporate Delivery
Broadband Service
Access IPv6
Gateway Infrastructure
Seamless Mobility
Across
Heterogeneous
Wireless acess Mobility IP/optical Internet
networks Gateway
backbone
PSTN
Intelligent Edge ISDN
Wideband Media
Wide-area Gateway
Connection &
Access Control Servers
Mobile Networks
text, several networks with different technical characteristics are employed. Satis-
fying the requirement for secure multi-services in such environments has become
an even greater challenge than in the past. Many technical and industrial contribu-
tions favour an IP-based concept for an integrated network, where all services are
delivered above the IP-layer and all data is encapsulated within IP-packets.
Users are prone to roaming across multiple geographical and organisational
adjacent ‘domains’. The term ‘domain’ refers to an unique local access network
with characteristic security requirements and attacker capabilities, autonomous
management and enforcement of different (security) policies. Additionally, in a
wireless network environment, nodes are highly mobile under dynamic network
conditions. Thus, in an integrated network environment, mobility management
is needed to ensure that nodes can be located quickly and packet delivery
operates properly in the presence of mobility of nodes, and networks with-
out affecting the ongoing session. Thus, seamless hand-over is an important
feature, protecting the user from taking notice during any roaming between
adjacent domains. Particularly, the current user’s security and multi-service
environment are kept invariant and thus, enabling an automatic and high-
mobility facility, e.g., for mobile military units or even whole headquarters
transferred to the theater.
Any network application may communicate across multiple realms. This
puts an additional burden on the security infrastructure of integrated networks
12 Wireless and Mobile Network Security
even without taking any extra measures. For example, in order to eavesdrop on
a particular person’s mobile phone conversations, the eavesdropper has to be
located in physical proximity to the person and carry special radio equipment
which in itself represents a certain level of protection. Casual authentication,
between mobile phone users, is indirectly provided by the calling and called
party numbers. In case of voice telephony, authentication results from recog-
nising the other person’s voice.
Cryptography
Cryptography, on the other hand, gives the possibility of designing strong
security services but often creates inconveniences while using the application.
The use of cryptography, therefore, makes most sense in case of sensitive ap-
plications. When strong cryptographic security mechanisms are in place, the
remaining vulnerabilities are usually due to poor management and operation
and not by weaknesses in the cryptographic algorithms themselves.
Confidentiality
Confidentiality of transmitted data can be provided by encrypting the informa-
tion flow between the communicating parties, and the encryption can take place
end-to-end between the communicating parties or, alternatively, on separate
legs in the communication path. In GSM networks for example, only the radio
link between the mobile terminal and the base station is encrypted, whereas,
the rest of the network transmits data in clear-text. Radio link confidentiality
in GSM is totally transparent from the users point of view. Mechanisms for
implementing confidentiality of traffic, location and addresses will depend on
the technology used in a particular mobile network.
Authentication
Authentication of transmitted data is an asymmetric service, meaning for
example that when A and B are communicating, the authentication of A data
by B is independent from the authentication of B data by A. The types of au-
thentication available will depend on the security protocol used. In the Internet
for example, SSL (Secured Socket Layer) allows encryption with four different
authentication options—1) server authentication, 2) client authentication, or
3) both server and client authentication or 4) no authentication, i.e. providing
confidentiality only.
Non-repudiation
Non-repudiation is similar to authentication, but it is an asymmetric security
service. A simple way to describe the difference between authentication and
14 Wireless and Mobile Network Security
Support of Roaming
Most mobile communication systems support “roaming” of users, wherein the
user is provided service even if he/she moves into a region handled by a differ-
ent service provider or a different network of the same service provider. Thus,
there is requirement in the network for authenticating mobile users who roam
into its area. The main problem is that the subscriber related information, that
is useful for authentication, is present only in the home network of the user
and is generally not accessible by the visited (or serving) network. Thus, there
must be a method by which a subset of handset credentials are supplied to the
serving network that is enough to authenticate the user. A complete disclosure
of handset credentials may result in a security compromise.
Equipment Identifiers
In systems where the account information is separated (both logically and
physically) from the handset (which is the case in all current mobile com-
munication systems), stolen personal equipment and its resale could be an
attractive and lucrative business. To avoid this, all personal equipment must
have a unique identification information that reduces the potential of stolen
Security Issues in Mobile Communications 17
Key
Data
base
Device Drivers
from the application. We provide a brief note of some of the application level
security schemes by classifying them into five categories based on their basic
functions in the following subsections.
Principal User
Role
Permission Credential
Roles can be created for the various job functions in an organisation and users
then assigned roles, based on their responsibilities and qualifications. Users
can be easily reassigned from one role to another. Roles can be granted new
permissions as new applications and systems are incorporated, and permissions
can be revoked from roles as needed.
An important characteristic of RBAC is that by itself it is policy neutral.
RBAC is a means for articulating policy rather than embodying a particular
security policy. The policy enforced in a particular system, is the net result
of the precise configuration and interactions of various RBAC components, as
directed by the system owner. Moreover, the access control policy can evolve
incrementally over the system life cycle, and in large systems it is almost
certain to do so. The ability to modify policy, to meet the changing needs of
an organisation, is an important benefit of RBAC.
Business Logic
BLOCK
Compare profile with
True Content BLOCK
Obfuscated code Security Policy
Detection
Detection and Decoding ALLOW
HTML
Content Breakdown /Script
Contect scanning
According to Context Build Behavioral Profile
User-based Security
Organisations often implement these systems as part of ISP’s installed on
individual computers to provide security against attacks, using or targeting
individual applications. These systems look for anomalies in application be-
Security Issues in Mobile Communications 23
disguised or forged ones. The second issue that is related with the previous
one is the vulnerability of the mobile hand-held devices. They can easily be
stolen and misused. Thus, from transactional point of view, the transactional
mechanism should not rely on the device identity (such as phone number
or IP number) and it should not deduce user’s identity based on the device
identity. The third issue that is closely related with the mobility concept is
the communication autonomy of the devices. It means that the devices are not
always reachable through the network and it is natural that they are rather
often disconnected. From transactional point of view this means that transac-
tional mechanisms should not assume continuous capability of the terminals to
communicate, nor it should expect that there would be periods during which
the terminal is able and willing to communicate with other components with
(nearly) 100 per cent certainty.
SUMMARY
REVIEW QUESTIONS
OBJECTIVES
Modern technologies are becoming ever more integrated with each other.
Mobile phones are becoming increasingly intelligent, and handsets are grow-
ing more like computers in functionality. The smart devices, such as PDAs,
on-board computers, and new generation household appliances are equipped
with communication functions. We are entering into a new era—the age of
smart houses, global networks which encompass a wide range of devices, all of
them exchanging data with each other. Such trends clearly open new horizons
to malicious users, and the potential threats are self evident.
The security for mobile devices is already an issue; and the first indication
of trouble came, not surprisingly, in the form of a virus. At first glance, a
problem of malicious code appears only to be a part of the broader informa-
tion security picture. However, malicious programs inevitably mutate from
innocent amusements created by bored programmers and students who wish to
show off their skills to professional solutions created for financial gain. There
is always a need for virus research on the one hand, and network security,
28 Wireless and Mobile Network Security
According to a survey, many business users utilise their smart phones, PDAs,
laptops, not only for company business, but for e-mail, instant messaging,
browsing the Web, downloading and sharing files over the Internet, as well
as for checking financial accounts. The survey also found that the majority of
smart phone users (55.7 per cent) store confidential personal, business or client
data on their devices. More than 54 per cent of smart phone owners use their
devices to send and receive e-mails that include confidential personal data; 40
per cent access bank accounts using their smart phones; and nearly one-third
of respondents’ access credit card accounts.
Data communications and connectivity increase vulnerability of mobile de-
vices. Mobile devices that communicate and exchange data with applications
inside the enterprise can help increase worker productivity. Knowledge workers
use mobile devices for various types of connectivity from construction super-
visors entering change requests to retail workers using wireless connectivity
for inventory management. However, as mobile devices move data and files
to and from networks, and tap into existing applications, the risks increase for
compromising sensitive data and transmitting infections.
Security at Device, Network, and Server Levels 29
Although PDAs are still selling at a fairly decent rate, many people are
using the PDA functions in their mobile phones, as well. Clearly, as the tech-
nology matures, more people will be carrying sensitive data with them. So,
how safe is this data stored on handheld device? There are several kinds of
threats that afflict PDAs. First and foremost is the threat of simply losing the
device. Whoever finds it not only has PDA, but also access to all the sensi-
tive data stored on the device. Viruses also pose a threat to PDA. Several
viruses that are PDA-specific have come up in recent years, although at the
moment the cause for worry is still fairly low. Another threat to be aware of,
is various kinds of Internet-related break-ins. Now that many PDAs come with
built-in wireless and Bluetooth functionality, it is possible for someone over
the Internet, or even across in the coffee shop, to access the data on PDA or
even plant a virus.
Laptops have become a valuable part of the computing store. They allow
users powerful mobile computers with the capacity and software of many
desktops. They also allow connectivity, even outside the office, thus freeing
people to take their workplace with them. This is extremely valuable for em-
ployees who must travel frequently while remaining in continual communica-
tion with their offices. Unfortunately, the mobility, technology and information
that make laptops so useful to employees and organisations also makes them
valuables for thieves. Informal surveys indicate that about 10–15% of those
laptops are stolen by criminals intent on selling the data. Indeed, in case of
laptops belonging to CEOs, the information cost carried upon was thought
to be worth millions.
Device Loss
The challenge for users is that the inherently small form factors of PDAs and
mobile phones make them more likely to be lost or stolen. Most users carry
critical data on their devices such as e-mails, address books, meeting notes,
and calendar appointments. Also, most platforms come with a simple software-
based login scheme that allows configuring a password to protect access to
the device. Such mechanisms can easily be bypassed by reading the device
memory directly without starting the operating system. Despite the high num-
bers of mobile devices that go missing, companies are apparently not doing
enough employee education to help secure their mobile assets. The problem
is not unique, nearly two-thirds of business users do not use a password when
they logon to their laptops, and of the users who do use passwords, 15%
use their name and 10% give password details to colleagues. A third of the
respondents have not changed their passwords for years.
In the hands of someone with malicious intent, a stolen device could be
used to launch an attack against the device’s owner, the enterprise to which
30 Wireless and Mobile Network Security
the device belongs and/or the mobile operator on whose network the device
runs. As a result, there are several factors to consider when a device is lost
or stolen:
Replacement cost of the lost/stolen device.
Cost of restoring data to the device, i.e., the time it takes for reconfigur-
ing the device.
Possible compromise of confidential data (personal and/or organisation),
which could be almost anything depending on the device lost and the
data kept on it, e.g., customer records (any industry), patient information
(health care), etc.
Possible breach in the security of the network to which the wireless de-
vice connects, e.g., if network passwords are stored on the device, then
an unauthorised user could gain access to the network via an authorised
device.
Alternatively, if the device identity itself can be altered, then it can be
re-purposed to possible affect the network and to bypass network security
mechanisms based upon that identity. This is typical of the so-called clon-
ing threat wherein a stolen device is reprogrammed with a new identity
to bypass black-list enforcement.
which has a heightened threat associated with it when compared to the fixed
context. A facile example is the use of a mobile device on a busy train, where
there is an increased risk of theft of the complete device compared to the
fixed context in which there is a greater degree of physical protection from
threat agents.
These arguments allow us to postulate that there is a need to look after the
data and applications on the PDA, using counter-measures such as password
controlled access to device processing and also password controlled access to
device data. The nature of the countermeasure may need to be subtly different
depending on the electronic technology being used, but in general will rely
on some form of cryptography which will protect the data unless valid access
credentials are presented. Therefore, the arguments presented in the COMSEC
section apply, i.e. the strength and therefore assurance of the implementation
can only be derived after an objective assessment of all of the aspects of the
cryptographic implementation.
The following safety measures could reduce the risk that confidential infor-
mation will be accessed from lost or stolen mobile devices:
Provide training to personnel using mobile devices. People cannot be
held accountable to secure their information if they have not been told
how.
Remove data from devices that are not in use. Several incidents have
occurred with people obtaining “hand-me-down” mobile devices that still
had confidential company data.
Establish procedures to disable remote access for any mobile devices that
are lost or stolen. Many devices store user names and passwords for Web
site portals, which could allow a thief to access even more information
than on the device itself.
Centralise management of mobile devices. Maintain an inventory about
who’s using what kinds of devices.
Patch management for software on mobile devices should not be over-
looked. This can often be simplified by integrating patching with syncing,
or patch management with the centralised inventory database.
Fortunately, security products that can detect malicious code exist for
most mobile device operating systems. Security technologies that can protect
both the organisation and the various types of mobile devices should also be
implemented. Native mobile device security such as light encryption, basic
passwords, and physical locks may deter some hackers, but rarely block a
determined criminal.
34 Wireless and Mobile Network Security
Symbian OS
Symbian OS is an open operating system, designed for mobile devices, with
associated libraries, user interface frameworks and reference implementations
of common tools. In this, a security enhancement for its operating system,
called “platform security” is introduced. This enhancement is intended to
increase the security awareness among software developers, and it provides
tools for design and implementation.
Capability Model
permissions that an application is bound to, but they also express the level of
trust that the application has. Capabilities are used to verify the level of trust
when linking static libraries or loading dynamic libraries. Capabilities are used
to verify permissions when using inter process communication or requesting
a service provided by a server.
Data Caging
To protect both application executable and data files, Platform Security intro-
duces a feature called data caging. Certain file types (for example, executables,
resources) are stored in predefined directories, and only applications with suf-
ficiently powerful capabilities can access these directories. Application-specific
directories are automatically protected by the file system, so that only processes
with the original application Secure Identifier (SID) can access the directory.
This arrangement protects files from unauthorised access, thus providing more
trust and integrity.
Secure inter-process communication enhances the security features of cli-
ent/server communication by adding capability checking to client/server
interactions.
Secure software installer allows authentication and authorisation of in-
stalled software.
Secure backup and restore provides a way to retain the integrity of Plat-
form Security features during backup and restore operations.
Central repository is designed to store structured data securely. It is
implemented as a Symbian OS server that manages the data storage.
Server architecture also enables other security features of Platform Secu-
rity, for example access control and authentication. The data is accessed
asynchronously, and it supports transactions, logical tree structures and
naming conventions, and types defined by the Open Mobile Alliance
(OMA). Accessing is done with a Uniform Resource Identifier (URI)
address, and applications have their own root identified by SID, which
protects data from other applications. The old data-sharing mechanism
(Shared Data) has been replaced with Central Repository.
Password Protection
A remote wipe of the Windows based mobile device can be performed via
exchange synchronisation or Outlook Web Access (OWA). All user data, keys
and passwords, and configuration settings are overwritten.
Storage Card Protection
With Windows Mobile 6 OS, the data can be encrypted on the storage card,
so that it can read only on the device that encrypted it. This can be done
via exchange server policies so that it can be controlled by the administrator
and not left up to the user. Exchange server can also perform a remote wipe
of the storage card.
Propagation of Policies
In this section, some of the popularly used wireless technologies, and their se-
curity features and limitations at the hardware level are discussed. In particular,
some of the issues pertaining to IEEE 802.11, GSM and GPRS networks.
Communication Security
The protection of data and voice communications between designated end-
points. The services include message confidentiality, integrity, and end-point
authentication. In addition, they may include optional nonrepudiation, anti-re-
play protection, and traffic analysis counter measures. Finally, military tacti-
cal networks often require rapidly supporting secure communications among
dynamic groups of users or equipment, such as dynamically formed (or dis-
banded) coalitions.
Robustness
The requirement to accommodate hardware and software failures, asymmetric
and unidirectional links, or limited range of wireless communication. It in-
Security at Device, Network, and Server Levels 41
cludes the need for the networks to survive specific types of device overrun
(physical seizure), network fragmentation and denial-of-service attacks.
Efficiency
Finally, even more than their commercial counterparts, military wireless net-
works are expected to be efficient in their use of electrical and computing
power, silicon real estate, and communication bandwidth.
SSIDs
The 802.11 standard specifies the SSID (service set identifier) as a form of
password for a user’s radio NIC to join a particular wireless LAN. 802.11
requires that the user’s radio NIC has the same SSID as the access point
has to enable association and communications with other devices. In fact,
the SSID is the only “security” mechanism that the access point requires
to enable association in the absence of activating optional security features.
The use of SSIDs is a fairly weak form of security, however, because most
access points broadcast the SSID multiple times per second within the body
of each beacon frame. A hacker can easily use an 802.11 analysis tool (e.g.,
AirMagnet, Netstumbler, or AiroPeek) to identify the SSID. Some network
administrators turn off SSID broadcasting (which deletes the SSID from the
42 Wireless and Mobile Network Security
beacon frames), but a hacker can still sniff the SSID from frames that stations
use when associating with an access point. It is shown that the most serious
passive attack is the traffic analysis attack over the cipher texts because it does
more than one can foresee. From traffic analysis, the attacker can passively
simply figure out the frequency of transmission from a specific station, the
size of packets being transmitted and the time taken to receive the response.
They just have to wait until someone associates or re-associates (e.g., when
roaming) with the network. Aside from sniffing the SSID, many wireless LAN
administrators make it even easier by using the vendor’s default SSIDs, which
are pretty well known.
DHCP
Even if an intruder is capable of associating with an access point by using the
correct SSID, they must often have an applicable IP address before they can
directly access resources on the network. Many wireless LANs, though, use
DHCP (dynamic host configuration protocol) to automatically assign IP ad-
dresses to users as they become active. With DHCP enabled, a hacker receives
an applicable IP address just as other legitimate users do.
For example, a public wireless LAN may be at an Airport and someone
associated to the same wireless LAN can easily use Windows to see other
users connected to the network. If file sharing is turned on, the other person
can click on the device and drill down to documents folder and open or copy
files to their laptop. This is a serious problem that many end users overlook,
especially when operating from home and public networks.
Man-in-the-middle Attacks
Through the use of an 802.11 analyser, a person can monitor 802.11 frames
sent over the wireless LAN and easily fool the network through various “man-
in-the-middle” attacks. One can view the frames sent back and forth between a
user’s radio NIC and access point during the association process. As a result,
some one can learn information about the radio card and access point, such as
IP address of both devices, association ID for the radio NIC, and SSID of the
network. With this information, it is possible to set up a rogue access point
(on a different radio channel) closer to a particular user to force the user’s
radio NIC to re-associate with the rogue access point, because 802.11 does
not provide access point authentication.
WEP
On 802.11 networks, the WEP (wired equivalent privacy), which encrypts the
body of each frame. This is supposed to keep away hackers from viewing sensitive
Security at Device, Network, and Server Levels 43
e-mails, user names and passwords, proprietary documents, etc. WEP has two
generic limitations. First, use of WEP is optional, and as a result, many real
installations never even turn on encryption. Second, by default, WEP uses a
single shared key common to all users of a WLAN, and this common key is
often stored in software-accessible storage on each device. If any device is
lost, stolen, or compromised, the only recourse is to change the shared secret
in all of the remaining devices. The Flurer-Mantin-Shamir (FMS) attack, de-
scribes the weaknesses in the key scheduling algorithm of RC4 (Rivest Cipher
4) which facilitates an attacker to work back to the key. RC4 is effective such
that an attacker needs minimum 1 Gb of data to start inferring the randomness
of its output. However, it has few issues as described by FMS attack, RC4
generates predictable key stream in the presence of weak keys and hence one
can trace back to get the initial bytes of the secret key.
Phone Cloning
Let us look at some of the security issues w.r.t. most popular cellular networks
of the world, GSM and GPRS. The most severe attack to the cellular systems
through the air is phone cloning. A cellular phone is recognised by a pair of
uniquely assigned numbers: ESN (Electronic Serial Number) and MIN (Mo-
bile Identification Number). Such pairs of numbers are transmitted to a cell
base station through the open air whenever the cellular phone is powered on.
These numbers can be easily read by equipments and one can even possibly
find the physical location of any powered-on cellular phone. In such cases,
when placing a call, the PIN will need to be sent through the assigned voice
channel after ESN and MIN are sent through a control channel. However, PINs
are vulnerable to eavesdropping as well.
Hijacking
Another possible attack through the air is hijacking. Once a voice channel is
established between a cellular phone and a cellular base station, a counterfeit
cellular phone may seize the voice channel by increasing its power level above
that of the legitimate cellular phone. An attacker could then make an illegal
cellular call.
dard for mobile phones in the world. GSM differs from its predecessors in
that both signalling and speech channels are digital, and thus is considered
a second generation (2G) mobile phone system. One of the key features of
GSM is the Subscriber Identity Module (SIM), commonly known as a SIM
card. The International Mobile Subscriber Identity (IMSI) a unique number
for every subscriber in the world.
This has also meant that data communication was easy to build into the
system. GSM networks operate in four different frequency ranges. Most GSM
networks operate in the 900 MHz or 1800 MHz bands. It includes information
about the home network of the subscriber and the country of issue. GSM was
designed with a moderate level of security. The system was designed to au-
thenticate the subscriber using a pre-shared key and challenge-response. Com-
munications between the subscriber and the base station can be encrypted.
duration, but Wagner did it in only 02 seconds of plain text data (both up
link and down link).
The signalling data or the control data are information that can be useful to
conducting active attacks on the GPRS system and give the intruders access
to secure management data. Manipulation of user traffic, signalling data or
control data may occur in an accidental or a deliberate manner. The integrity is
exposed if the traffic and the data in any way are modified, inserted, replayed
or deleted. To jam users traffic is a physical intervention of denying someone
the services. The user traffic, signalling data and control data are, by jamming,
prevented from being transmitted over the air interface.
Security on the server level is one of the most important considerations for
a network environment. Servers in an infrastructure not only handle critical
network services, such as DNS, DHCP, directory lookups, and authentication,
but they also serve as a central location for most, if not all, critical files in
an organisation’s network. In the current corporate environment, the nature
of work is demanding employees to be mobile and this has been determining
integration of mobile gadgets with enterprise applications. It is predicted that
the global enterprise expenditure on mobile devices will grow year by year.
Most of the businesses are increasingly embracing new ways to communi-
cate, whether its IP or unified communications. Email is an important applica-
tion for organisations to disseminate information at all levels. Also, besides the
email application, employees are using mobile devices for business applications
like Customer Relationship Management (CRM), Enterprise Resource Planning
(ERP), and Sales Force Automation Systems (SFA) to interact with custom-
ers, business partners, and other businesses, etc. Improved access to business
information helps enhance employee productivity and collaboration.
48 Wireless and Mobile Network Security
To secure a server, it is essential to first define the threats that must be mitigat-
ed. Many threats against data and resources are possible because of mistakes,
either bugs in operating system and server software that create exploitable
vulnerabilities, or errors made by end users and administrators. Threats may
involve intentional actors (e.g., attacker who wants to access information on a
server) or unintentional actors (e.g., administrator who forgets to disable user
accounts of a former employee.) Threats can be local, such as a disgruntled
employee, or remote, such as an attacker in another geographical area. Or-
ganisations/Institutions should conduct risk assessments to identify the specific
threats against their servers and determine the effectiveness of existing security
controls in counteracting the threats; they then should perform risk mitigation
to decide what additional measures (if any) should be implemented. The fol-
lowing are examples of common security threats to servers:
1. Malicious entities may exploit software bugs in the server or its underly-
ing operating system to gain unauthorised access to the server.
2. Denial of Service (DoS) attacks may be directed to the server or its
supporting network infrastructure, denying or hindering valid users from
making use of its services.
3. Sensitive information on the server may be read by unauthorised indi-
viduals or changed in an unauthorised manner.
4. Sensitive information transmitted unencrypted or weakly encrypted be-
tween the server and the client may be intercepted.
5. Malicious entities may gain unauthorised access to resources elsewhere
in the organisation‘s network via a successful attack on the server.
Security at Device, Network, and Server Levels 49
1. Planning
Plan the installation and deployment of the operating system (OS) and other
components for the server. Developing such a plan enables organisations to
make informed tradeoff decisions between usability and performance, and risk.
In the planning stages of a server, the following items should be considered:
Identify the Purpose(s) of the Server
What information categories will be stored on the server? What information cat-
egories will be processed on or transmitted through the server?; What are the se-
curity requirements for this information? Will any information be retrieved from or
stored on another host (e.g., database server, directory server, Web server, Network
Attached Storage (NAS) server, Storage Area Network (SAN) server)? What
are the security requirements for any other hosts involved?; and so on.
Identify the network services that will be provided on the server, such
as Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP),
Simple Mail Transfer Protocol (SMTP), Network File System (NFS),
or database services (e.g., Open Database Connectivity [ODBC]). The
network protocols to be used for each service (e.g., IPv4, IPv6) should
also be identified.
Identify any network service software, both client and server, to be in-
stalled on the server and any other support servers.
Identify the users or categories of users of the server and any support
hosts.
Determine the privileges that each category of user will have on the
server and support hosts.
50 Wireless and Mobile Network Security
Determine how the server will be managed (e.g., locally, remotely from
the internal network, remotely from external networks).
user will not be granted access to the server. If the user is not specifically
denied access, the server checks whether the user has been granted access
directly or by virtue of a group membership. If access has been granted, the
connection to server is maintained. The user then proceeds to the appropriate
default database (where the user must also have been granted access). The ac-
cess rights of the user are then checked for any objects the user is attempting to
access. If access has not been granted for a particular set of logon credentials,
the connection to the server is terminated. For non-trusted connections, such
as when server is installed on the operating system, SIDs are not available.
In this case, server generates a 16-byte globally unique identifier (GUID). The
generated GUID is then used internally in the same way as SIDs are used for
users and groups.
Firewalls are utilised as the main perimeter protection tool; they effectively
determine which ports are closed or opened into the corporate network. The
ports that are left open provide a conduit for the hacker to penetrate the
firewall and break into a server machine. A good example is port 80 (HTTP
protocol), which is used by Web servers and therefore is always left open. An
attacker can pass a specifically crafted but legitimate HTTP message through
the firewall to a Web server, exposing its vulnerabilities. The HTTP message
can then exploit one or more of these vulnerabilities and cause a chain of
events that ultimately allows the intruder to obtain privileged access to the
Web server machine. This may seem to be a farfetched scenario. However,
executable programs that do this are widely available for download off the
Internet for those who are looking for them.
Intrusion detection systems are perceived as the next layer of defence in
addition to the firewall. However, they only detect but do not provide real time
prevention of attacks. Increasing evidence shows that Network IDS (NIDS)
products have limited detection capabilities and inherent difficulties in properly
identifying attack attempts. As a result, many attacks are left undetected, and
false positives are generated as well.
The major drawbacks of NIDS are:
NIDS cannot prevent attacks in real time. They listen to packets on the
wire, but do not block their transfer. More often than not, the packet
reaches its destination and is processed prior to interpretation by the
NIDS. As a result, it is common for an attack to be successful before it
is identified by the NIDS.
NIDS cannot detect unknown attacks. Any signature-based system (like
IDS) can handle only known attacks for which signatures exist in the
product database.
52 Wireless and Mobile Network Security
using HTTPS. The gateway is the endpoint of the HTTPS connection, and the
last leg between the gateway and Mobile Web Server is secured using SSL.
The security solutions are completely transparent from the end users point of
view.
The entire Mobile Web Server system, including the gateway and the con-
nector, is designed to take malware into consideration. The key issue here is
the role of the gateway, which protects the relatively slow mobile connections
and takes the pressure off the processor of the mobile device. As all traffic
normally goes through the gateway (barring local connectivity scenarios), it can
be filtered for malware in the process. This lowers the risk of Trojan horses or
viruses making their way into Mobile Web Server, or moving the other way
to the mobsite visitors computer.
SUMMARY
REVIEW QUESTIONS
OBJECTIVES
option because of cost, signal availability and performance issues. The idea
of automating these workers is compelling—Wi-Fi applications offer the same
access to information as typical wired applications, but without the mobility
limitations of wires. So organisations can benefit from increased employee
productivity and morale, the ability to provide better customer service, more
timely and accurate data exchange, and reduced costs.
To take advantage of the opportunities created by Wi-Fi for point-of-activity
computing, it’s important to understand the unique needs of the users. Mobile
field service workers, sales persons and professionals and on-premises users
working in departments within larger organisations, remote branch offices to
midsize businesses have common characteristics. Usually, they have minimal
access to resources, including limited or zero on-site technical support as well
as limited budget and hardware. However, once they have Wi-Fi access, their
appetite for enterprise-class functionality and information-sharing capabilities
will quickly rival that of wired users.
Cable/ADSL Modem
To Internet
PC with Ethernet
Connection
The security is the major area that developers must consider while develop-
ing application for Wi-Fi, along with areas such as roaming between hot spots;
ease of use; and ease of administration. Wireless LANs and local hot spots can
be accessed by unwelcome users unless proper security measures are taken. It
is important to remember that application files may contain confidential busi-
ness information and must be protected whether it is located on a PC in the
office or a hand-held device in the field.
Wireless LANs are useful for a wide range of applications. There are some
applications, however, that are more effective and efficient than others. Let’s
examine some applications, which are convincing situations that prompt the
use of WLANs.
Wireless
computer
Wireless
computer
Wireless
controller
Internet Applications
Network
very useful in places where workers are moving around. Some examples of
WLAN phone solutions include the following.
Retail stores where employees can communicate with each other to locate
certain clothes for a customer and/or check inventory.
Buildings where security guards can quickly call for onsite help, the
police or an ambulance.
Schools that need constant communication with teachers and administra-
tion.
Hotels where staff members are spread out on different floors and need
to respond quickly to requests.
and the assets that need to be protected, the risks posed by various attackers
might vary.
able to attack in the first place. Spending an hour hunting for a single credit
card number simply is not worth of most motivated attacker’s time. Large
enterprise environments are not likely to be targets of opportunity because
they have rudimentary wireless security mechanisms in place.
In this section we describe some situations in which WLANs and their applica-
tions are vulnerable to security attacks, and also, present some of the methods
used for attacking these networks.
Router Dos
attacks
Your WLAN
LAN Switch
Accidental association
with your trusted clients
Neighbour APs
plug cheap Small Office Home Office (SOHO) grade access points to corpo-
rate LAN. This unintentional act by the novice users punches a big hole on
enterprise security exposing critical data to outsiders. The cheap AP may not
follow enterprise standard deployment procedures thus compromising security
on the wireless and wired network. Visitors inside your building and hackers
outside your building can connect to such unauthorised APs to steal bandwidth,
send objectionable content to others, retrieve confidential data, attack company
assets, or use your network to attack others.
Mis-Configured Rogue Access Points
Sometimes an authorised access point could suddenly turn into a rogue device
due to a minor configuration flaw. Change in Service Set Identifier (SSID),
authentication settings, encryption settings, etc., should be taken seriously as
they could enable unauthorised associations if not configured properly. For
example, in open mode authentication any wireless client device in state1
(unauthenticated & unassociated) can send authentication requests to an AP
and on successful authentication would transit to state2 (authenticated but unas-
sociated). If an AP doesn’t validate the client properly due to a configuration
flaw, an attacker can send lot of such authentication requests, overflow the
64 Wireless and Mobile Network Security
IEEE 802.11 clients automatically choose the best available AP nearby and
connect with them. For example, Windows XP connects automatically to the
best connection possible in the vicinity. Due to this behaviour, authorised
clients of one organisation can connect to Access points from the neighbor-
ing organisation. Though the neighbour’s APs have not intentionally lured the
client, these associations can expose sensitive data.
Ad-hoc Devices
service in networks few feet away. Most such denial-of-service attacks aim at
exhausting AP resources such as the client-association-table.
3.3.3 Warchalking
Another point of vulnerability, which is possibly more of a compelling idea
than a physical reality called warchalking. It is a modern version of the hobo
sign language used to alert one another to places providing shelter, food, and
potential trouble. Using a fairly universal hobo sign language, individuals
mark structures that have hotspots associated with them. In many cases these
symbols incorporate much information about each node and the type of secu-
rity currently being implemented. Figure 3.5 gives some sample warchalking
symbols and their interpretations.
SSID
Open mode
Bandwidth
SSID
Closed node
SSID Access
contact
WEP node
W
Bandwidth
it stores the network SSID as a “preferred network” and will connect to it each
time it comes within range. Though this is convenient in most circumstances
for the network client, it can lead to unwanted network users. Even with
WEP enabled, which can keep unwanted clients from joining your network;
would-be clients knocking on the door, requesting connections, can consume
significant bandwidth.
HOST 1
Access Point
Listening/Sniffing Listening/Sniffing
Cracker
executing a MitM attack. Upon successful completion of the attack, they would
have three options as to how they would like to exploit the position—
The message could be intercepted, altered and sent onto the recipient
with fraudulent information.
The message could be blocked and prevented from proceeding any fur-
ther.
The message could simply be read and sent on its way without the
recipient’s knowledge.
4. Lowering the power levels of the access points to limit the ability of
hackers to connect from outside the specified boundary. This can also be
accomplished by limiting connections to transmission rates of 11 Mbps
and 5.5 Mbps.
mitigates the vulnerability that allows a hacker to inject data into a packet in
order to deduce the encryption key. AES is the newest encryption standard
and is under review for inclusion in 802.11i. AES is the strong encryption
replacement for Data Encryption Standard. According to the 802.11i standard,
AES will replace WEP and RC4 encryption. This will require a hardware
optimisation to be able to handle the more robust algorithm.
Wireless networks are vulnerable by default. An additional safeguard that
can be used to secure a wireless network is a Virutal Private Network (VPN).
A VPN solution uses a combination of tunneling, encryption, authentication
and access control. A VPN establishes a secure, encrypted network tunneled
within a potentially hostile network like a wireless network.
IEEE 802.1x has a port-based access control method that provides a better
way to control access to network ports. 802.1x does not specify an authen-
tication method, although the most common approach for WLANs is EAP
(Extensible Authentication Protocol), which is a framework for a variety of
authentication methods. The specific method is determined by the client and
access point during the authentication process. The EAP client (supplicant)
contacts the access point (authenticator), which challenges the client for au-
thentication information. The authenticator receives this information from the
client and then passes it onto an authentication server for validation. No other
communications from the client is permitted until the authentication server has
validated the logon request. If the logon is accepted, the authentication server
generates a WEP key specifically for the client and sends it through the access
point to the client. The client is now permitted to access the network behind
the access point.
There are several implementations of EAP, including the following:
1. Transport Layer Security (EAP-TLS): developed by Microsoft and used
in IEEE 802.1x clients for Windows XP. EAPTLS provides strong se-
curity, but requires each WLAN user to run a client certificate.
2. Lightweight EAP (LEAP): developed by CISCO and used in their Aironet
solution. LEAP supports dynamic WEP key generation and provides for
fixed password user authentication.
3. Protected EAP (PEAP): PEAP does not require certificates for authentica-
tion. It supports dynamic WEP key generation and provides options for
password, token or digital certificate based user authentication.
4. Tunneled Transport Layer Security (EAP-TTLS): It is developed as a
competing standard for PEAP. EAP-TTLS supports password, token
or certificate, side user authentication. Unlike EAP-TLS, EAP-TTLS
requires only the server to be certified.
72 Wireless and Mobile Network Security
Interoperability
Frequent site surveys to locate any rogue access points and clients set up in
ad-hoc mode.
Monitoring
Frequent monitoring of the logs to ensure that intrusions have not occurred.
Other
In this section we present some of security schemes developed for the benefit
of Wi-Fi applications.
Image-based Authentication
Image-based authentication is developed over a user’s successful authentica-
tion of image password set. After the username is sent to the authentication
module, it responds by displaying an image set, which consists of images from
the users password set mixed with other images. The user is authenticated by
correctly identifying the password images. The experimental results clearly
indicate that image-based authentication has an advantage over password or
PIN-based authentication especially in regards to the human interface aspect.
It is easier for a user to memorise an image than a text, and also easier to
identify an image than recalling a text. Picture password authenticates a user
through the selection of images displayed on a handheld device. Having the
ability to tailor the display interface with personal images gives users a sense
of freedom, and control.
An image recognition-based authentication scheme for wireless networks,
which authenticates a user through his/her ability to recognise previously seen
images. The working of Deja Vu scheme designed for wireless networks is given in
Table 3.2.
Begin
1. The user A creates an image portfolio, by selecting a subset of p images out of a set of
sample images.
2. The system presents a challenge set, consisting of n images.
3. To authenticate, the user must correctly identify the images which are part of
portfolio.
End
Application Level Security in Wireless Networks 75
Begin
1. The user authentication session consist of p input stages.
2. The user chooses k points in the image, these are called the passpoints.
3. Selected points are sent to the server.
4. The server evaluates the distance between selected points, and passpoints. If such
distance is lower than a threshold then the user is authenticated.
End
Begin
1. A user, U submits her/his ID to the AS. AS computes the password PW for the user U,
as, PW = IDxs mod p, where Xs is secret key and p is a large prime number.
2. AS provides a password PW, and a smart card to the user U through a secure
channel.
3. The smart card contains the public parameters (f, p), where f is a one-way function.
4. User U attaches her/his smart card to the smart card reader, and keys ID, and PW.
5. Smart card computes C1 = IDr mod p, and t = f(T PW) mod p – 1, where T is the
current date, and time of the smart card reader and r is a random number.
6. Smart card computes M = IDt mod p, and C2 = M (PW)r mod p.
7. Smart card AS : C = (ID,C1, C2,T).
8. AS: Check the format of ID. If the identity format is not correct, then AS will reject
this login request.
9. AS: Check the legal time interval due to transmission delay, if not, then rejects the login
request C.
10. IF C2(C1)xs –1 = ID f (T PW) mod p, then the AS accepts the login request. Otherwise,
the login request will be rejected.
End
Biometrics
The user is expected to present something of his/her physical attributes, e.g.,
eye, hand, face or voice. Better security is achieved when using a combina-
tion of these factors, such as a possession factor with a knowledge factor.
Examples of being factors are various: hand geometry systems, a digital
signature created with a pen, speaker recognition. These techniques are better
known as biometric systems. Most important characteristic of it is the usage
of a unique physical attribute of a person for authentication. Because the user
is needed for authentication, it is more related to authentication of persons
than the other two factors.
The securephone project’s, primary aim is to realise a mobile phone pro-
totype in which a biometrical authentication enables users to deal secure,
Application Level Security in Wireless Networks 77
1. Input: Sensors: APs contain additional code keeping eye on active connections, and
central server: computes reputation from sensor data
2. Operation:
(a) Log data on sensors.
(b) Collect data at central server.
(c) Data evaluation at central server, computes the reputation.
(d) Security countermeasures are selected and executed based on feedbacks.
Send message
Random seed. C
Mobile
Submit Information client
Target coordinate server
(Moving)
Secure channel
Insecure channel
into data transmission for mobile information system. The proposed approach
is divided into two phases: in register phase and operation phase. A mobile
client acquires a random seed of one-way hash function and MAC (message au-
thentication code) function under a secure channel in the register phase. Then,
data can be transmitted securely between information server and mobile clients
in the operation phase. The mobile client transmits a target latitude/longitude
coordinate for data encryption to information server. Then, the server encrypts
the message and sends the ciphertext back to the mobile client. The client can
only decrypt the ciphertext when the coordinate acquired from GPS receiver
matches with the target coordinate, and the approach can meet the demands
of mobile information system in the future. The pseudocode for working of
the scheme is given in Table 3.6.
SUMMARY
REVIEW QUESTIONS
OBJECTIVES
Legend
BS
PSTN
MS
Cellular Networks have been around since the beginning of 19th century. As
the demand increased and technology improved they have gradually grown into
versatile and sophisticated networks. We discuss the features of the cellular
networks as per the generation.
4.1.1 1G
First generation (1G) networks were the first cellular networks introduced in
the 1980s. They were only capable of transmitting voice at speeds of about
9.6 kbps max. In the US the system was known Advanced Mobile Phone
Application Level Security in Cellular Networks 85
System (AMPS) and in Europe the Nordic Mobile Telephony (NMT). Both
these technologies used analog modulation to transmit data as a continuously
varying waveform.1G systems had some limitations such as no support for
encryption, poor sound quality and inefficient use of the spectrum due to their
analog nature.
4.1.3 3G
3G is the next generation wireless cellular network whose aim is to provide
a world wide standard and a common frequency band for mobile networking.
The International Telecommunication Union (ITC) started the process in 1992,
the result of this effort was a new network infrastructure called International
mobile telecommunications 2000 (IMT-2000), with the 2000 signifying that
this new technology has data rates of up to 2000 Kbps with 2000 MHz fre-
quency range. The following are the list of objectives at IMT-2000.
1. To make a wide range of services, both voice and data available to users,
irrespective of location.
2. To provide services over a wide coverage area.
3. To provide the best quality of service (QoS) possible.
4. To extend the number of services provided subject to constraints like
radio transmission, spectrum efficiency and system economics.
5. To accommodate a great variety of mobile stations.
6. To admit the provision of service by more than one network in any area
of coverage.
7. To provide an open architecture to permit the easy introduction of tech-
nology advancements as well as different applications.
8. To provide a modular structure which allows the system to start from
small and simple configuration and grow as needed, both in size and
complexity within practical limits.
9. The 3rd generation gives specifications for UMTS, a 3G technology
based on Universal Terrestrial Radio Access (UTRA) radio interface
and the extended GSM/GPRS network. A second radio interface also
exists called IMT Multicarrier (IMT-MC) which is being promoted by
the 3GPP2 organisation. This interface is backward compatible with
IS-95 to make a seamless transition to 3G. This proposal is known as
CDMA2000.
4.1.4 4G
4G is the fourth-generation wireless, which is going to provide the stage
for broadband mobile communications which will supersede the 3G. 4G is
expected to provide end-to-end IP and high-quality streaming video as its
Application Level Security in Cellular Networks 87
Location-based Services
The challenge with location-based services is not in the applications but in the
implementation. For location services to be of any real value, the network must
be able to determine the location of subscribers to a high degree of accuracy
perhaps to within a few feet.
4G involves Internet Protocol version 6 (IPv6) to route data packets to the
handset. IPv6 has built in location tracking that will enhance the network’s abil-
ity to pinpoint a subscriber’s location. There are proposals for applying global
positioning system (GPS) capabilities in handsets to locate subscribers.
88 Wireless and Mobile Network Security
Entertainment Services
Entertainment services are viewed by service providers as having the great-
est potential for immediate return on investment. Entertainment services may
include streaming audio, streaming video, chat, photo trading, and gaming.
Wireless systems are more complex due to the need to support mobility and
making use of the channel effectively. By adding more complexity to systems,
potentially new security vulnerabilities can be introduced.
4. Limited Power
Wireless Systems consume high power and therefore with the existing technol-
ogy they have a limited time battery life.
5. Limited Processing Power
The processors installed on the wireless devices are increasing in power, but
still they are not powerful enough to carry out intensive processing.
6. Relatively Unreliable Network Connection
The wireless medium is an unreliable medium with a high rate of errors com-
pared to a wired network.
Application Level Security in Cellular Networks 89
There are several security issues that have to be taken into consideration
when deploying a cellular infrastructure. They are the following:
1. Authentication
Cellular networks have a large number of subscribers, and each has to be au-
thenticated to ensure the right people are using the network. Since the purpose
of 3G is to enable people to communicate from anywhere in the world, the
cross region and cross provider authentication becomes an issue.
2. Integrity
With services such as SMS, chat and file transfer it is important that the data
arrives without any modifications.
3. Confidentiality
The Cellular device may have files that need to have restricted access to them.
The device might access a database where some sort of role based access
control is necessary.
5. Operating Systems in Mobile Devices
Cellular Phones have evolved from low processing power, ad-hoc supervisors
to high power processors and full fledged operating systems. Some phones
may use a Java Based system, others use Microsoft Windows CE and have
the same capabilities as a desktop computer. Issues may arise in the OS which
might open security holes that can be exploited.
6. Location Detection
The actual location of a cellular device needs to be kept hidden for reasons
of privacy of the user. With the move to wireless networks, the issue arises
that a user may be associated with an access point and therefore their location
might be compromised.
7. Viruses and Malware
9. Device Security
This is probably the most potent attack that can bring down the entire net-
work infrastructure. This is caused by sending excessive data to the network,
more than the network can handle, resulting in users being unable to access
network resources.
It might be difficult to launch a large scale DDOS attack from a single host.
A number of hosts can be used to launch an attack.
3. Channel Jamming
4. Unauthorised Access
5. Eavesdropping
If the traffic on the wireless link is not encrypted then an attacker can eaves-
drop and intercept sensitive communication such as confidential calls, sensitive
documents, etc.
6. Message Forgery
An attacker can sit in between a cell phone and an access station and intercept
messages in between them and change them.
9. Session Hijacking
A malicious user can hijack an already established session, and can act as a
legitimate base station.
The attacks on the cellular systems can take place through air (wireless)
or through wirelines. To understand this, it is important to know that every
connection from a cellular phone to a regular telephone involves the following
types of communication: (1) air communication between the cellular phone
to a nearest cell base station, (2) wirelined communication between the cell
base station and a cellular switch station, and (3) wirelined communication
between the cellular switch and the destination through the conventional Public
Switched Telephone Network (PSTN).
The most severe attack to the cellular systems through the air is phone
cloning. Unlike a regular telephone which can be recognised by a uniquely
distinguishable wire, a cellular phone is only recognised by a pair of uniquely
assigned numbers: ESN (Electronic Serial Number) and MIN (Mobile Identi-
fication Number). Such pairs of numbers are transmitted to a cell base station
through the open air whenever the cellular phone is powered on. Some cel-
lular phones are equipped with PINs (Personal Identification Numbers). In such
cases, when placing a call, the PIN will need to be sent through the assigned
voice channel after ESN and MIN are sent through a control channel. Such
cellular phones are less likely to be cloned. However PINs are vulnerable to
92 Wireless and Mobile Network Security
GSM (Global System for Mobile communications) is the most popular stan-
dard for mobile phones in the world. GSM differs from its predecessors in
that both signaling and speech channels are digital, and thus is considered a
second generation (2G) mobile phone system. This has also meant that data
communication was easy to build into the system. GSM networks operate
in four different frequency ranges. Most GSM networks operate in the 900
MHz or 1800 MHz bands. One of the key features of GSM is the Subscriber
Identity Module (SIM), commonly known as a SIM card. GSM was designed
with a moderate level of security. The system was designed to authenticate
the subscriber using a pre-shared key and challenge-response. Communications
between the subscriber and the base station can be encrypted.
A-bits OMC
BTS
Exchange system
B
BTS
BTS D
MSC
BTS C
IWF HLR AUC
PSTN
ISDN
BTS
PSPDN
F
CSPDN EIR
D
SC
BTS
using the IMSI, a new temporary mobile subscriber identity (TMSI) is allocated
by the Public Land Mobile Network(PLMN) at least on every location update
and used to identify a MS on the air interface. When a MS attempts access
with a PLMN with which it is not presently registered, the MS uses its IMSI
to identify itself. The IMSI is then authenticated by the PLMN, which results
in the sharing of a cipher key (Kc). When the PLMN switch on encryption,
the Visitor Location Register (VLR) generates a TMSI to the MS, storing the
association of TMSI and IMSI in its database. The TMSI is then sent to the
MS, encrypted with Kc. The next time the MS attempts access in that PLMN,
it uses the TMSI previously allocated by the VLR instead of its IMSI. Then
the PLMN looks up its table of TMSI to IMSI mapping to find the MS perma-
nent identity. After a successful authentication and once an encrypted channel
has been established, the PLMN assigns to the MS another TMSI. Figure 4.3
illustrates corresponding timing diagram.
Key (Ki) and the authentication algorithm A3 implemented within the SIM,
and send a signed response (SRES) back to the PLMN. AuC performs the
same process with RAND to compute the expected response (XRES), which
is sent to the PLMN. The PLMN then compares the SRES and XRES and
if equal then the user is authenticated. Figure 4.4 depicts timing diagram for
subscriber ID Authentication.
by the phone and the network. Only in this case, the data is meaningless to
anyone intercepting it. The Kc should also keep frequently changing, in case
it is eventually compromised. The method of distributing the Kc to the phone
is closely tied in with the authentication procedure discussed above.
false BS. At the time of GSM designing it was assumed that the system should
not be subject to such attacks due to high amount of expenses as compared
to other methods of attacking. But now the cost of GSM BS devices are too
low and it is easy to use GSM BS emulators. This method is based on the
fact that ciphering of a call does not start automatically, rather the ciphering
starts when BS instructs the ME to start encryption. The instruction from
BS to ME to start encryption can be manipulated during transit not to start
encryption by an intruder.
GSM—A5/3 Ciphering
As mentioned previously, GSM supports up to 7 different algorithms for A5
(ciphering). Until recently, only the A5/1 and A5/2 algorithms were used.
Later, GSM added a much stronger algorithm, A5/3 which is based on the
Kasumi core (the core encryption algorithm for UMTS). Only few networks
and handsets support this algorithm.
Network security protocols are probably the most common use of public key
methodologies by wireless devices. The Open Mobile Alliance (OMA, for-
merly the WAP Forum) has specified a Wireless version of the IETF Transport
Layer Security (TLS) protocol, known as WTLS, to secure mobile browsing.
WTLS provided for a secure channel between the mobile phone and a WAP
gateway, which however, did not satisfy the demand for end-to-end security in
data networks. A later version of WAP (2.0) adopted the TLS protocol itself
within WAP Transport Layer end-to-end Security specification.
Access to Enterprise Networks
The access control mechanism based on PKI is deployed for service access in
cellular networks. The Mobile Electronic Transactions (MeT) group is working
on a local authentication protocol called Personal Transaction Protocol (PTP)
that will allow users to authenticate themselves at retail locations, ticket col-
lection points, workstations, etc., using their cellular phones.
Digital Signatures on Mobile Transactions
Public key cryptography can also be used to secure other kinds of mobile mes-
saging, such as SMS messages or wireless email applications using S/MIME
(Secure/Multipurpose Internet Mail Extensions)—a specification for secure
electronic mail messages in MIME format.
Content Authentication
Code signing is an essential technology for mobile devices that enable ap-
plication download over the air, such as Java applets. It is necessary, for such
devices, to have the means to assure the safety of the downloaded code. The
originator or the provider of the code may provide such assurance by digitally
signing the code, via an XML digital signature, Java API or by other interfaces.
The phone holds a trusted copy of the signers public key, for verifying the
codes signature before using it. Code signing, does not in itself, certify the
safety of the code, but it assures that the code was not originated or modified
by illegal parties.
Digital ID
A digital ID identifies its holder for multiple purposes, such as drivers’ license,
healthcare, insurance policy, etc. Digital IDs are implemented in the form of
user credentials and associated certificates. The digital IDs are created and
digitally signed by the relevant authority, according to their purpose. When
used in wireless devices, digital IDs reside on the device, and can also be
transferred (for example, in case of replacing the wireless device), either using
a detachable card as intermediate medium, or over the air.
GPRS
BG backbone
Data network
firewall (Internet)
GGSN GGSN
LAN
Router Server
Other GPRS Data network Data network
operators (Internet) (X25)
Other Network
GPRS
1 backbone
4
2 3
5
Internet
Mobile phone SGSN GGSN
and
Sim card
An attacker using a valid network address could wreak havoc by making the
attack appear to come from an organisation which did not, in fact, originate
the attack and was completely innocent. In such cases, the administrator of a
system under attack may be inclined to filter all traffic coming from the appar-
ent attack source. Adding such a filter would then result in a denial of service
to legitimate, non-hostile end-systems. In this case, the administrator of the
system under attack, unwittingly becomes an accomplice of the attacker.
The attacker launches the attack using randomly changing source addresses;
the source addresses are depicted as from within some network, which are
not generally present in the global Internet routing tables, and therefore, un-
reachable. However, any unreachable prefix could be used to perpetrate this
attack method.
When an MS enters into the service domain of the SN, or VLR (Visitor
Location Register), for the first time, it is executing the phase of distribu-
tion of authentication vectors from HE to SN and completing a registration
procedure. This procedure, in addition to making MS’s HE aware of the MS
location, can let the SN obtain the AVs (Authentication Vectors) from MS’s
HE (for authentication with the MS in the future). AVs include the n set of
authentication vectors and can provide n time authentication between MS and
108 Wireless and Mobile Network Security
Symbol Description
MS, SN, HE Mobile Station, Service Network, Home Environment
VLR,HLR Visitor Location Register, Home Location Register
AuC, SQN Authentication Centre, Sequence Number
USIM Universal Subscriber Identity Module
IMSI International Mobile Subscriber Identity
TMSI Temporary Mobile Subscriber Identity
AV, AUTN Authentication Vector, Authentication Token
K Secret Key which share between USIM and AuC
MAC Messages Authentication Code
AMF Authentication Management Field
Rand, RES Random Number, User Response
XRES Expected User Response
CK, IK, AK Cipher Key, Integer Key, Authentication Key
f1 f5 Authentication and Key Generation Function
UE User Equipment
IMPI, IMPU IP Multimedia Private Identity , IP Multimedia Public Identity
P-CSCF Proxy Call Service Control Function
I-CSCF Integrating Call Service Control Function
S-CSCF Service Call Service Control Function
P-CSCF Proxy Call Service Control Function
then send an authentication reject message to the network and the connection
is over. Finally, to stop an attacker simply replaying the legitimate networks
authentication request the SIM keeps track of the sequence numbers used (i.e.,
the same sequence number cannot be used twice, each sequence number must
be newer).
As the mobile operators move to 3G services, they are, for the most part, not
deploying entirely new networks but instead leveraging their existing 2.5G
network infrastructure GSM/GPRS/EDGE or CDMA/CDMA 1X equipment
and backbone networks. For example, most UMTS cell sites can be co-located
in GSM cell sites and much of the GSM/GPRS core network can be re-used.
The Serving GPRS Support Node (SGSN) needs to be upgraded, but the mo-
bile switching center (MSC) only requires a minor upgrade and the Gateway
GPRS Support Node (GGSN) can remain the same. Because 3G networks
were not all built from the ground up, they were not necessarily built with
IP data security in mind. Moreover, the world of IP data is relatively new to
mobile operators, they are used to dealing with comparatively more mundane
voice-centric security threats.
4.6.1 3G Attacks
There are numerous attacks that can be perpetrated against a mobile network
and they can originate from two primary vectors:
Outside the mobile network: the public Internet, private networks, other
operators networks.
Within the mobile network: from devices such as data-capable handsets
and smartphones, notebook computers or even desktop computers con-
nected to the 3G network.
Denial of Service
One of the most prevalent security threats to wired ISPs is a distributed denial
of service (DDoS) attack. Essentially, DDoS attacks use brute force methods
to overwhelm the target system with data such that the response from the
target system is either slowed or stopped. Creating enough traffic to inflict
that kind of damage typically requires a network of compromised computers,
which are often referred to as bots or zombies (sometimes collectively referred
to as botnets). Essentially, botnets are computers that have been compromised
110 Wireless and Mobile Network Security
Overbilling Attack
Another type of possible attack is called overbilling. Overbilling involves a
malicious user hijacking a subscribers’ IP address and then using that connec-
tion to initiate fee-based downloads or simply use that connection for their
own purposes. In either case, the legitimate user is billed for activity which
they did not authorise or actually conduct.
Signalling-level Attacks
The Session Initiation Protocol (SIP) is a signaling protocol used in IMS
networks to provide voice over IP (VoIP) services. There are several well-
known vulnerabilities with SIP-based VoIP systems. For example, there are
vulnerabilities in the Call Manager function (which handles call routing and
call signalling functions in VoIP systems) that might allow hackers to:
Reconfigure VoIP settings and gain access to individual users’ account
information.
Eavesdrop on VoIP communications.
Hijack a user’s VoIP subscription and subsequent communications.
Application Level Security in Cellular Networks 111
MS VLR: IMSI.
VLR MS: RAND.
MS VLR : {n1, n2, n3, (RAND)P}khlr, ra.
VLR HLR: { n1, n2, n3, (RAND)P }khlr, (RAND)kvlr.
HLR VLR: {k}kvlr, {n1,n2 k}P.
VLR MS : {n1,n2 k}P, {ra}k, rb.
MS VLR : {rb}k.
a new password based on the previous, a second type that is based on time-
synchronisation between the authentication server and the client providing the
password, and a third type that is again using a mathematical algorithm, but
the new password is based on a challenge (e.g., a random number chosen by
the authentication server or transaction details) and a counter instead of being
based on the previous password.
Mobile OTP
Mobile-OTP is a free “strong authentication” solution for java capable mobile
devices like phones or PDAs. The solution is based on time synchronous one-
time passwords. It consists of a client component (a J2ME MIDlet) and a server
component (a Unix shell script). The MIDlet generates one time passwords
by hashing the following data with MD5:
(a) the current epoch-time in a 10 second granularity.
(b) the 4-digit PIN that a user enters.
(c) a 16-hex-digit secret that has been created when the device was
initialised.
When entering a PIN, the MIDlet displays the first 6 digits of the MD5-hash.
This is the one time password. The password can be verified by the server,
as the server also knows the current time, Init-Secret and PIN of the user. To
compensate time differences, the server will accept passwords from 3 minutes
in the past to 3 minutes in the future. In addition, different time offsets can
be specified for each user on the token and/or the server. Each password will
be accepted only once. After 8 successive failed authentication attempts a user
gets locked out. Authentication is based on two factors: a PIN known by the
user and the Init-Secret stored on the mobile device.
phone into a secure OTP token which can be used to log in to any service on the
Internet. The solution is based on a simple challenge-response protocol. When the
user wants to log in, he/she presents his/her username, and a challenge is sent to the
users mobile phone. The OTP midlet installed on the phone generates an OTP
from the challenge and sends it back to the server. The server verifies that
the OTP is correct and the user is authenticated, Table 4.3 protocol message
used in OTP using GSM.
4.7.5 BioPasswords
BioPassword is a patented software-only authentication system based on the
keystroke dynamics biometric. While a user enters password the system cap-
tures information about just how a user types, including any pauses between
the pressings of different keys. Essentially the software observes the typing
rhythm, pace and syncopation. This information is used to create a statisti-
cally reliable profile for an individual. In combination with a user password
bio-password creates a so-called hardened password.
A behaviour-based passwords approach based on maps is proposed. A user is
shown a map of some N cities with some routes selected and all other routes
between all cities available but not activated. At the PassMap creation stage
also known as the enrollment stage, a user is presented with a relatively large
map of routes to which a user is asked to make any modifications. A possible
list of atomic modifications includes: Selecting a direct route between any two
cities, and Un-selecting a direct route between any two cities. In the PassMap
system of authentication a user is not required to memorise any difficult char-
acter combinations, instead a user only needs to memorise the sequence of
changes a user makes to the base map.
Application Level Security in Cellular Networks 117
SUMMARY
REVIEW QUESTIONS
OBJECTIVES
5.1 MANETS
Military Battlefield
Military equipment now routinely contains many computer based devices. Ad
hoc networking would allow the military to take advantage of commonplace
network technology to maintain an information network between the soldiers,
vehicles, and military information head quarters. The basic techniques of ad
hoc network came from this field (refer Fig. 5.2).
Commercial Sector
Ad hoc networks can be used in emergency/rescue operations for disaster
relief efforts, e.g., in fire, flood, or earthquake. Emergency rescue operations
must take place where non-existing or damaged communications infrastructure
and rapid deployment of a communication network is needed. Information
is relayed from one rescue team member to another over a small handheld
device. Other commercial scenarios include, e.g., ship-to-ship ad hoc mobile
communication, law enforcement, etc.
Application Level Security in MANETs 121
Local Level
Ad hoc networks can autonomously link an instant and temporary multime-
dia network using notebook computers or palmtop computers to spread and
share information among participants at a conference or classroom. Another
appropriate local level application might be in home networks where devices
can communicate directly to exchange information. Similarly in other civilian
environments like taxicab, sports stadium, boat and small aircraft, mobile ad
hoc communications will have many applications.
Autonomous Terminal
In MANET, each mobile terminal is an autonomous node, which may function
as both a host and a router. In other words, besides the basic processing ability
as a host, the mobile nodes can also perform switching functions as a router.
So usually endpoints and switches are indistinguishable in MANET.
Distributed Operation
Since there is no background network for the central control of the network
operations, the control and management of the network is distributed among
the terminals. The nodes involved in a MANET should collaborate amongst
themselves and each node acts as a relay as needed, to implement functions,
e.g., security and routing.
Multihop Routing
Basic types of ad hoc routing algorithms can be single-hop and multihop, based
on different link layer attributes and routing protocols. Single-hop MANET is
simpler than multihop in terms of structure and implementation, with the cost
of lesser functionality and applicability. When delivering data packets from
a source to its destination out of the direct wireless transmission range, the
packets should be forwarded via one or more intermediate nodes.
ing, and interference, and has less bandwidth than a wired network. In some
scenarios, the path between any pair of users can traverse multiple wireless
links and the link themselves can be heterogeneous.
Light-Weight Terminals
In most cases, the MANET nodes are mobile devices with less CPU process-
ing capability, small memory size, and low power storage. Such devices need
optimised algorithms and mechanisms that implement the computing and
communicating functions.
Eavesdropping
Eavesdropping is the intercepting and reading of messages and conversations
by unintended receivers. The mobile hosts in mobile ad hoc networks share
a wireless medium. The majorities of wireless communications use the RF
spectrum and broadcast by nature. Signals broadcast over airwaves can be
easily intercepted with receivers tuned to the proper frequency. Thus, messages
transmitted can be eavesdropped, and fake messages can be injected into net-
work. Moreover, a radio signal can be jammed or interfered, which causes the
Application Level Security in MANETs 125
There are attacks that target the route maintenance phase by broadcasting
126 Wireless and Mobile Network Security
false control messages, such as link-broken error messages, which cause the
invocation of the costly route maintenance or repairing operation. For example,
AODV and DSR implement path maintenance procedures to recover broken
paths when nodes move. If the destination node or an intermediate node along
an active path moves, the upstream node of the broken link broadcasts a route
error message to all active upstream neighbours. The node also invalidates the
route for this destination in its routing table. Attackers could take advantage of
this mechanism to launch attacks by sending false route error messages.
Attacks at Data Forwarding Phase
Some attacks also target data packet forwarding functionality in the network
layer. In this scenario the malicious nodes participate cooperatively with the
routing protocol for route discovery and maintenance phases, but in the data
forwarding phase they do not forward data packets consistently according to
the routing table. Malicious nodes simply drop data packets quietly, modify
data content, replay, or flood data packets; they can also delay forwarding
time-sensitive data packets selectively or inject junk packets.
End-to-End Attacks
The objectives of TCP-like Transport layer protocols in MANET include set-
ting up of end-to-end connection, end-to-end reliable delivery of packets, flow
control, congestion control, clearing of end-to-end connection. Similar to TCP
protocols in the Internet, the mobile node is vulnerable to the classic “SYN”
flooding attack or session hijacking attacks. However, a MANET has a higher
channel error rate when compared with wired networks. Because TCP does
not have any mechanism to distinguish between whether a loss was caused by
congestion, random error, or malicious attacks, TCP multiplicatively decreases
its congestion window upon experiencing losses, which degrades network
performance significantly.
SYN Flooding Attack
SYNACK packets are sent out from the victim right after it receives the SYN
packets from the attacker and then the victim waits for the response of ACK
packet. Without any response of ACK packets, the half-open data structure
remains in the victim node. If the victim node stores these half-opened connec-
tions in a fixed-size table while it awaits the acknowledgment of the three-way
handshake, all of these pending connections could overflow the buffer, and the
victim node would not be able to accept any other legitimate attempts to open
a connection. Normally there is a time-out associated with a pending connec-
tion, so the half-open connections will eventually expire and the victim node
will recover. However, malicious nodes can simply continue sending packets
that request new connections faster than the expiration of pending connections.
The SYN-flooding attack scenario is given in the Fig. 5.3.
SYN
SYN, ACK
SYN
SYN, ACK
SYN
SYN, ACK
SYN
SYN, ACK
SYN
..
. SYN, ACK
..
.
HOST A HOST B
Session Hijacking
Session hijacking takes advantage of the fact that most communications are
protected (by providing credentials) at session setup, but not thereafter. In the
TCP session hijacking attack, the attacker spoofs the victims IP address, de-
termines the correct sequence number that is expected by the target, and then
performs a DoS attack on the victim. Thus the attacker impersonates the victim
node and continues the session with the target. The TCP ACK storm problem,
could be created when an attacker launches a TCP session hijacking attack. The
attacker sends injected session data, and node A will acknowledge the receipt
of the data by sending an ACK packet to node B. This packet will not contain
128 Wireless and Mobile Network Security
Inital Session
Server A Server B
ck
ja
Hi
n
io
ss
Se
Server C
Repudiation Attack
In the network layer, firewalls can be installed to keep packets in or keep
packets out. In the transport layer, entire connections can be encrypted, end-
to-end. But these solutions do not solve the authentication or non-repudiation
problems in general. Repudiation refers to a denial of participation in all or part
of the communications. For example, a selfish person could deny conducting
an operation on a credit card purchase, or deny any on-line bank transaction,
which is the prototypical repudiation attack on a commercial system.
Application Level Security in MANETs 129
Wormhole Attack
An attacker records packets at one location in the network and tunnels them
to another location. Routing can be disrupted when routing control messages
are tunneled. This tunnel between two colluding attackers is referred as a
wormhole. Wormhole attacks are severe threats to MANET routing protocols.
For example, when a wormhole attack is used against an on-demand routing
protocol such as DSR or AODV, the attack could prevent the discovery of any
routes other than through the wormhole. The tunneling procedure generates an
illusion that the two nodes more than one hop away are in the neighbourhood
of each other. The wormhole attack is possible even if the attacker has not com-
promised any hosts, and even if communication provides all authenticity and
confidentiality. It is a severe attack and it is challenging to defend against.
Blackhole Attack
The blackhole attack has two properties. First, the node exploits the mobile ad
hoc routing protocol, such as AODV, to advertise itself as having a valid route
to a destination node, even though the route is spurious, with the intention of
intercepting packets. Second, the attacker consumes the intercepted packets
without any forwarding. However, the attacker runs the risk that neighbouring
nodes will monitor and expose the ongoing attacks. There is a more subtle
form of these attacks when an attacker selectively forwards packets. An at-
tacker suppresses or modifies packets originating from some nodes, while
leaving the data from the other nodes unaffected, which limits the suspicion
of its wrong doing.
Byzantine Attack
A compromised intermediate node works alone, or a set of compromised
intermediate nodes works in collusion and carry out attacks such as creating
routing loops, forwarding packets through non-optimal paths, or selectively
dropping packets, which results in disruption or degradation of the routing
services. Byzantine attack disrupts the routing services by dropping, fabricat-
ing, modifying, or misrouting packets.
130 Wireless and Mobile Network Security
Rushing Attack
Two colluded attackers use the tunnel procedure to form a wormhole. If a fast
transmission path (e.g., a dedicated channel shared by attackers) exists between
the two ends of the wormhole, the tunneled packets can propagate faster than
those through a normal multi-hop route. This forms the rushing attack. The
rushing attack can act as an effective denial-of-service attack against all cur-
rently proposed on-demand MANET routing protocols, including protocols
that were designed to be secure, such as ARAN and Ariadne. The attacker
forwards the route request quickly (as fast as no legitimate node can do). When
the neighbours of the target receiving requests from the attacker later receive
packets from legitimate nodes, they discard them as duplicate.
The threats posed by internal nodes are very serious, as internal nodes will
have the necessary information to participate in distributed operations. Internal
nodes can misbehave in a variety of different ways; there are four categories
of misbehaviors: failed nodes, badly failed nodes, selfish nodes and malicious
nodes. Note that two misbehaving nodes within the same category may exhibit
132 Wireless and Mobile Network Security
different degrees of incorrect node behavior. For example, some nodes will be
more selfish than others. Also, a node may demonstrate behaviors from more
than one category indeed, this may even be the typical case.
for wired networks, that implicitly assume (and often require) that the network
graph is fully connected, cannot be directly deployed into MANET as partial
connectivity and mobility features may make this assumption very often in-
valid. On the other hand, for certain security goals, such as security against
Byzantine adversaries, certain topology assumptions are necessary to achieve
security. Specifically, it directly follows from the results in the distributed
computing area that threshold cryptography over MANETs cannot be securely
implemented for very sparse ad hoc networks (regardless of mobility, which
indeed only makes things worse). The other important problem is that of
improving setup assumptions, or, in other words, relying as less as possible on
the pre-execution of setup protocols realising, e.g., public-key infrastructures,
group-based security associations, secure routing or even just physical iden-
tity-exchange. An implicit subproblem faced is that of building over threshold
cryptography protocols for wired networks so to obtain protocols with similar
security guarantees over the more challenging MANETs.
The proposed threshold password authentication in MANETS works as fol-
lows. The (t,n)-threshold password authentication scheme, is a collection of n
nodes, sharing a system key, are deployed to act as server nodes S, and only
if t (<n) of them cooperate, they fulfill mutual authentication with a registered
user. The protocol steps are given in the Table 5.1.
generates it. The corresponding public key is known to all the network nodes.
This is done by means of a network wide broadcast that is initiated by each
head immediately after it gets elected as the leader. Thus each member node
needs to maintain a pair of system keys, a cluster key and a table consisting
of cluster ids and the corresponding heads public key. The cluster head has
an additional responsibility of storing securely its private key.
Authentication Scenarios
There are three different scenarios where authentication needs to be performed.
They are:
1. When a Node Joins a Network for the First Time
This situation arises due to the movement of nodes. When a node moves from
a cluster to new one, the new cluster head treats it as any new node joining
its cluster. A mutual authentication is performed between the moved node and
its new cluster head using the system key pair. The cluster head then gives
the node the cluster key for the new cluster. The old cluster purges the entry
138 Wireless and Mobile Network Security
for this node when it doesnt receive hello message for a certain predefined
time interval.
When a Node From a Cluster Wishes to Communicate With a
Node Belonging to Another Cluster
This is a complex scenario and the scheme tries to minimise the overhead in-
volved here. For complete confidentiality of the message, the entire packet has
to be encrypted with a session key. The session key is shared solely by the two
parties involved in the communication and therefore serves as authentication.
But, in cases where the emphasis is on authentication alone and confidential-
ity is not very critical, it is unnecessary to encrypt the whole packet. A small
encrypted tag appended to each packet, is sufficient to achieve authentication.
In order to prevent the replay problems there is a need to perform strong
authentication for each packet, i.e., a series of challenge and response back
and forth. It is not feasible to do this for each packet as the delays and packet
overhead would be too high.
Fig. 5.6 A node from one cluster communicating with a node in another cluster
group key to the approved nodes to establish secure communication with group
members. The protocol provides knowledge-based group member authentica-
tion, which recognises a list of secret group keys held in a mobile node as
the nodes group membership. It employs ZKP (Zero Knowledge Proof) and
threshold cryptography.
Both of group member authentication and secret group key management are
indispensable procedures for establishing the secure group communication in
a MANET. While a secret group key is used only for encrypting and decrypt-
ing group communication in general, apply it for identifying the group that a
mobile node belongs to. In other words, each secret group key can be defined
as a unique identifier; hence the protocol examines secret group keys held by
a mobile node and then recognises the criteria of group membership status of
the node. In this protocol, a set of the secret group keys on a mobile node
is called its knowledge, and recognise the nodes knowledge shows all groups
the node previously joined.
When a mobile node wants to become a new group member, the node looks
for legitimate group members in the same network and tries to communicate
with them. These legitimate group members then investigate the nodes knowl-
edge, compare the knowledge with pre-defined required group membership,
and evaluate whether the node can join the group.
In this knowledge verification procedure, an adversary must not be able
to succeed to steal any meaningful information even if he eavesdrops all the
information exchanged between the new node and group members. Follow-
ing this line of thought, the protocol employs ZKP algorithm, which gives a
method to verify a secret key without disclosure of any secure information. In
ZKP, a new node behaves as prover and legitimate group members behave as
verifiers. In a ZKP session, verifier does not need to use a secret key for the
key verification; while the nodes knowledge consists of secret group keys the
node previously joined, the required group membership consists of publicly
available verification keys corresponding to the secret group keys.
After the knowledge verification procedure is completed, the new node is
ready to obtain the secret group key as the new group member. The threshold
cryptography is a beneficial approach as in a secret group key management
structure of this protocol; the secret group key is divided to n shares and
later generated by a new group member by the response of t group members
(among n nodes). This proposal makes the protocol be robust, because it does
not require a key server, and hence it works even within a busy MANET.
When the node obtains a new secret group key, the protocol recognises that
the node joins the new group and increases its current group membership. In
other words, the nodes knowledge can be improved step by step when the
node obtains different group keys in the proposed procedure. According to the
knowledge-based group member authentication, there are several assumptions
140 Wireless and Mobile Network Security
in the protocol. The protocol does not protect the situation that an adversary
invades (or cracks) a legitimate group member node and steals a secret group
key from the disk or memory on that node. And since a mobile node that has
all the required group membership can become the group member (i.e., can
obtain the group key) in the protocol scheme.
The MCA, migrates to a client mobile device along with Belief Formulator
logic, during the service initiation request by mobile user (MU). The agent
formulates beliefs using the belief Formulator, and communicates them to the
SCA along with transaction details. The SCA co-ordinates functions of all the
components at the authentication server. It is responsible for migrating the
MCA to MU and carrying out communications with the MCA. Upon receiv-
ing the beliefs and transaction details from the MCA, the SCA submits them
to Belief Analyzer and Transaction Classifier respectively. Based on the value
of cumulative deviation factor, the SCA produces one of the following three
types of opinions on the given MU: NORMAL-USER, SUSPICIOUS-USER,
ABNORMAL-USER. The results obtained from these modules are passed onto
Action Planner for suitable authentication actions. We explained the procedure
of authentication by considering two transactions one at level-1 and another
at level-3.
Suspicious duration for data entry, More number of invalid data items entered,
More number of mistakes/corrections, and Important data items are skipped.
Observation Generated
Mischievous customer.
0.56.
Authentication Action
Behaviors Observed
Observation Generated
Fraudulent behavior.
Beliefs Formulated
Fraudster.
0.65.
Authentication Action
SUMMARY
REVIEW QUESTIONS
OBJECTIVES
played on the terminal’s screen. However, because the driver cannot look at
the screen until the car has stopped, the system automatically switches to voice
guidance. In addition, when the driver stops the engine and leaves the car, the
service continues to send information to the drivers cell phone. This requires
a mechanism that makes it unnecessary for the service side to consider the
communication media and terminal; otherwise, the extra processing that the
service application program needs to perform will cause a cost increase.
6.1.1 UC Vision
The term ‘ubiquitous computing’ is a very broad term that is often overloaded
to mean diverse things to different applications. In many cases, researchers
define ubiquitous computing by example, with respect to their own research.
Therefore, it is important to define exactly what is the vision of ubiquitous
computing. More precisely, ubiquitous computing refers to a proliferation of
hundreds or thousands of computing devices, sensors and embedded processors
that will provide new functionality, offer specialised services, boost productiv-
ity, and facilitate seamless interaction with the surrounding environment and
available resources. Ubiquitous computing allows to realise additional abstrac-
tions that did not exist in traditional computing paradigms. The salient features
of ubiquitous computing includes the following:
150 Wireless and Mobile Network Security
Context Awareness
An ubiquitous computing model should be able to capture the different contexts
and situational information and integrate them with users and devices. This al-
lows the active space to take on the responsibility of locating and serving users
and automatically tailoring itself to meet their expectations and preferences.
6.1.2 UC Applications
This section lists some of the popular applications developed under UC.
RFID Chef
In this application, grocery items are equipped with RFID tags (instead of the
bar codes that are commonly used). When placed on a kitchen counter with
an integrated RFID reader, a nearby display suggests dishes that could be
prepared with the grocery items available, or shows missing ingredients. The
suggested dishes not only depend on the available ingredients, but also on the
preferences of the cook, who might for example prefer vegetarian or Asian
dishes. To implement this functionality, the cook is identified by an RFID tag
with the form factor of a credit card, carried in his or her wallet.
Smart Homes
The notion that we could eventually live in so-called “smart homes” domestic
environments in which we are surrounded by interconnected technologies that
are, more or less, responsive to our presence and actions seems increasingly
plausible. The Aware Home project is noteworthy among the smart home
researches. In the Aware Home project, they built a three-story, 5040 square-
foot home that functions as a living laboratory for interdisciplinary design,
development and evaluation.
Ubiquitous Healthcare
Ubiquitous healthcare is an emerging field of technology that uses a large num-
ber of environmental and patient sensors and actuators to monitor and improve
patients physical and mental condition. Tiny sensors are being designed to
gather information on bodily conditions such as temperature, heart rate, blood
pressure, blood and urine chemical levels, breathing rate and volume, activity
levels, and almost any other physiological characteristic that provides infor-
mation that can be used to diagnose health problems. These sensors are worn
on or implanted in the body, or installed in patients homes and workplaces.
Actuators go further and trigger actions such as the release of small quantities
of pharmaceuticals into the bloodstream or the electrical stimulation of brain
areas. The main purpose of these sensors and actuators is to help patients and
their carers monitor health status and design and implement interventions to
improve that status.
Depending on the type of data and the cost of possible loss, modification,
and stolen data, a security strategy must be devised and implemented. In ad-
dition to security and privacy risks, new vulnerabilities arise due to the use of
wireless devices. These could lead to possible change/deletion of information,
and denial of service. In addition to these, many more security issues arise
due to poor implementation, feature interactions, unplanned growth and new
flaws that are created due to prior attacks (Fig. 6.2).
Furthermore, the closer interaction between the real world and the virtual world
presents its own set of challenges. The ubiquitous computing forces us to think
about and evaluate security technology using a radically different approach.
Issues such as dependability of the components and the infrastructure, as well
as the impact of failures on security protocols, now become magnified and
increasingly crucial to the survivability of the system. For the reasons stated
above, new revolutionary security mechanisms need to be devised. These
mechanisms need to be context aware, ubiquitous, and non-distracting.
Following are the some of security requirements and challenges for ubiquitous
networks.
Authentication
This is the most important of all security services, as it allows one entity to
verify the identity of another entity. Mutual authentication is required in the
ubiquitous networks. Thus, we require mutual authentication protocols to pre-
vent man-in-the-middle for User-to-Device (U2D), Device-to-Device (D2D),
Device-to-Network (D2N), and User-to-Service-Provider (U2S) authentica-
tions.
Authorisation
This is the process of giving a ubiquitous network device the permission to
execute tasks and assign users access rights on that device. For home devices,
ubiquitous network environment authorisation corresponds to the users access
rights on particular devices. For foreign devices, the owner of the device del-
egates certain access rights to foreign users who will need to pay for the use
of these foreign devices in most cases.
156 Wireless and Mobile Network Security
Non-Repudiation
This is a service that prevents an entity from denying previous commitments
or actions.
Delegation
Ubiquitous networking has environments that engage numerous devices and
services running on these devices on behalf of the ubiquitous network users.
Because of the self-adapting characteristics of the ubiquitous networking, a
service could change the device or the entire subnetwork where it is running,
for example, a device moves from a car network environment into the home
network environment. It is very much complicated for the ubiquitous network
users to authorise all these changes and therefore it is necessary that the users
delegate their rights to a management function acting on their behalf.
Platform Protection
A major motivation behind the development of the ubiquitous networking is
the ability to download applications securely to the ubiquitous network devices
and allowing the ubiquitous network devices to be reconfigured in a secured
manner. Since the goal of the ubiquitous network devices is to give access
to a vast variety of services, if restrictions are not placed on the source of
downloaded applications, then there is a risk that malicious applications may
reconfigure a device in an unauthorised manner. Therefore, it is important to
provide some form of Secure Mobile Execution Environment (SMExE) to
protect the platform from such attacks.
Single Sign-On
Ubiquitous networks inter-operate with other existing environments, each of
which has a specific authentication infrastructure in place. Since the users need
to authenticate different devices, networks, and services, all acting in different
roles, it is necessary to implement a single sign-on solution. This will allow
users to authenticate only once to initiate ubiquitous networks seamless op-
erations in all network domains. This allows the ubiquitous network users to
leave and join the ubiquitous networks without any interruptions.
Content Protection
Significant driving force behind the development of the ubiquitous networking
is the capability to deliver new services to the ubiquitous network users. As
the digital nature of the content allows perfect copies to be made, content pro-
viders are naturally concerned that their copyright is protected. For ubiquitous
network environments to fully exploit the potential access to mobile content,
some forms of Digital Rights Management (DRM) system will be required to
be implemented in ubiquitous network devices.
158 Wireless and Mobile Network Security
Trust is a relationship between two entities such that one entity believes,
expects, and accepts that the other trusted entity will act or intend to act ben-
eficially. Trust represents the degree to which a node would be trustworthy,
secure, or reliable in any interaction with the node.
In ubiquitous computing, interaction between mutually unknown smart
artifacts can take place only if there is an adequate level of trust between the
parties. A trust security task will provide devices with the ability to operate
and make security related decisions autonomously. While trust defies stringent
definition, it is proposed that a model with explicit trust values can be realised
in sufficient detail to be used either to augment other security mechanisms
or as a basis for unencrypted interactions. With a range of explicit values
representing trust, a finer granularity of representation is achieved, providing
entities with enhanced information on which to base decisions. Thus the trust
security task provides the security to the devices in the network as well as
it generates the trust on the new devices depending on their behaviors. Trust
security can be provided to devices that are present in the ubiquitous network
by formulation of a set of rules in a trust security task.
Man-in-the-Middle Attacks
When appliances offer physical services such as playing music or deliver-
ing goods or money, the user has to verify that the appliance he/she is hold-
ing or touching will really deliver the service. In other words, he/she has to
authenticate the appliance. Otherwise he/she could pay for a service provided
to someone else. When a user has to provide a secret (e.g., password, PIN
code) to an artifact or has to delegate it some rights, it is also mandatory to
authenticate the artifact.
Ubiquitous Computing Man-in-the-middle attacks occur when actors, which
can be artifacts or users, forward challenges and responses in order to simulate
Application Level Security in Ubiquitous Networks 161
the presence of other actors. In a regular scenario a client plugs his credit
card and uses inputs and outputs of the terminal. Even with correct security
protocols and tamper-resistant point of sale terminals, a masquerade attack is
possible: a dummy terminal is proposed to the client and his/her inputs and
outputs are modified before being redirected. A dummy credit card is plugged
in the real terminal and acts as a proxy. Mutual authentication between the
right terminal and the users credit card succeed but the user is not holding
this right terminal. As a result, the attacker can modify the transaction without
tampering with the terminal and without stealing the card. This attack, which
cannot occur in virtual context, is possible because there is no way for the
card to verify if it is plugged in the right terminal.
A similar attack can be mounted against a tamper-resistant appliance of-
fering services to visitors. For example, suppose that a shop offers a discount
to any customer coming frequently enough. In this shop, a short-range local
transmitter broadcasts random challenges periodically. Each visitor can return
his ID certificate and a challenge signed with his private key. The shop is
then able to list the users that are present and that will receive the discount.
Unfortunately, any visitor can forward challenges to other remote users and
build a peer-to-peer location sharing system in which any member of the group
can pretend to be present in order to get discounts.
As a result, man-in-the-middle attacks allow the impersonation of artifacts
and users. It is already a relevant attack against point of sale terminals and
will become more frequent when numerous micro-payments and rights delega-
tions will occur daily within ubiquitous computing. It is necessary to defeat
that kind of attack.
Furthermore, there is the possibility that the attacker can disguise itself as
the internal user through the interactive Digital TV, IP set top box or home
pad or access it illegally through other means to control the home appliances.
Physical problem or malfunction of the home appliance can also leak the
information, or problems of the device can cause inconvenience to the user
when needed.
Data Manipulation
The authenticity of a sensor data cannot be certified directly by the sensor
itself, due to computational restrictions. However, an intermediary device can
keep record logs of incoming sensor data, and certify the findings on its own
behalf. This makes it technically impossible to firmly attribute data to the sen-
sor, but by use of certain means, the trust in the authenticity of data can be
increased. The data manipulation can be handled by using the encryption/de-
cryption techniques, but it always remains as a question how these techniques
could be deployed on computationally poor infrastructure.
This section briefly discussess some of the solutions designed for providing
security and authentication to UC applications and networks.
Mikes short-term behaviour regarding his usage of the printer, a string with
the length of 100 will be set to follow the printing probability distributions
in his profile.
key can share this secret with A as long as it does not disclose it. Finally, in
(label 5), The local proof of secret protocol is used to verify that the artifact
knows the secret.
The local proof of secret is based on a message round trip time (RTT)
measurement. If a user could check in one nanosecond that an artifact knows a
secret, it could not be farther than fifteen centimeters (due to the physical limit
imposed by the speed of light). To reach such a high performance, it is not
possible to rely on application layer. The exchange has to occur at the physical
layer and the messages have to be as short as possible. One-bit challenges and
one-bit responses are exchanged by simple dedicated hardware (logical gates).
As a first step, physical contact between artifacts has been chosen because it
does not require any distance measurement.
protect a user privacy, the tag only communicates with a fixed back-end database
since the tag must synchronise the tag’s dynamic ID value with the back-end
database. However if a tag’s ID is static value, then the tag can perform au-
thentication protocol with any back-end database since the scheme does not
need synchronisation of the tag’s ID between a back-end database and the tag.
Therefore, the tag holding static ID is able to communicate with any reader
in ubiquitous computing environment.
In RFID systems, since an adversary can monitor all messages transmitted in
wireless communication between a reader and a tag, the adversary can infringe
upon a person’s privacy using various methods. Therefore, RFID systems must
be designed to be secure against attacks such as eavesdropping, traffic analysis,
message interception and impersonation (e.g., spoofing and replay).
Information Leakage
A person is prone to carrying various tagged objects in every life. Some of
objects such as expensive products and medicine are quite personal and provide
information that the user does not want anyone to know. In RFID systems,
the tag emits only distinguishable information in response to a query from
a nearby reader. So, various personal information can be leaked without the
acknowledgment of the user.
Traceability
When a target tag transmits a response to a nearby reader, an adversary can
record the transmitted message and can establish a link between the response
and the target tag. Once a link is established, the adversary is able to know
the user’s location history.
6.5.6 Biometrics
Biometric authentication techniques sparked an enormous interest lately. Bio-
metrics show good potential for providing seamless and automated methods
for determining and confirming identity while being less obtrusive. Good
fingerprint recognition or face recognition techniques, for example, are faster
168 Wireless and Mobile Network Security
than entering secure passwords and do not require users to carry special equip-
ment (e.g., PDAs or badges). However, biometric authentication is plagued
with several shortcomings. Many biometric authentication techniques have
overt characteristics, i.e., the authentication data is often observable to ev-
eryone (handwriting signatures can be observed and forged, and fingerprints
can be extracted relatively easily). Accuracy and seamlessness of biometric
authentication techniques are very dependent on hardware. Finally, biometric
authentication techniques still lack a good and secure method of storing the
biometric features in a way that prevents compromise of sensitive data and
preserves anonymity while providing enough flexibility to accommodate partial
matches and deduce a suitable confidence level.
SUMMARY
REVIEW QUESTIONS
OBJECTIVES
Cellular and WLAN systems face distinct security challenges, and each has
addressed security in unique (although not necessarily perfect) ways. Although
fraudulent access has been reduced in 3G systems compared to previous
generations, the major role of 3G in packet-switched services introduces new
challenges regarding security. And the weakness of WLANs original security
architecture, WEP (Wired Equivalent Privacy), spurred the creation of the WPA
(Wi-Fi Protected Access) security architecture by the Wi-Fi Alliance and the
IEEE 802.11i task group. Security and performance are major challenges to
the inter-working of 3G and WLAN, especially for access control and privacy
of mobile stations. The composition of two secure architectures may produce
an insecure result. This occurs because of differing, possibly contradictory,
security assumptions, e.g., the compromise of a session in a WLAN network
may endanger subsequent sessions in 3G systems. Furthermore, support for
high bandwidth service with mobility demands a highly efficient authentication
mechanism during handover. When a mobile station switches connectivity to
a different network, the mobile station and the network have to authenticate
each other. However, the authentication process required by each individual
network tends to be complicated and costly. For example, the GSM technical
specification on performance requirements assumes that the mobile station re-
sponds to an authentication request from the network in just under 1 second.
In WLAN, EAP-TLS authentication takes about 800 ms. Long authentication
delays during handover can cause a disruption of service that is perceivable
by users.
7.1 INTRODUCTION
mounting hardware, and cable) can be carried by one person. Each Roofnet
node runs identical turn-key software consisting of Linux, routing software
implemented in Click, a DHCP server, and a web-server so users can monitor
the network status.
From the users perspective, the node acts like a cable or DSL modem: the
user connects a PC or laptop to the nodes Ethernet interface, and the node
automatically configures the users computer via DHCP, listing the node itself
as the default IP router. Some users choose to connect the node to their own
wireless access point. In order that Roofnet nodes be completely self-configur-
ing, the software must automatically solve a number of problems: allocating
addresses, finding a gateway between Roofnet and the Internet, and choosing
a good multi-hop route to that gateway.
When a large-scale disaster strikes, first responders are sent to the site im-
mediately. Once the most pressing needs of the disaster are addressed, the
next step is to establish a command and control centre. To accommodate the
need, a communication infrastructure is required to provide decision makers
with data and information from the site to receive digital maps, data, and
feedback from personnel in the field in a timely manner. Also, it should be
able to provide a reliable connection with enough resources for a distributed
command and control center.
176 Wireless and Mobile Network Security
long as there is a line of sight between nodes. These wireless access nodes
allow users to communicate with each other when there is no wired con-
figuration. Figure 7.5 shows the infrastructure of the mesh network deployed
at a disaster scene which provides connectivity to the command center and
throughout the disaster site.
Five different enterprise objects are used to make up the WMANET. These
objects are the following:
User
A person or a device who requests a service. The user could be a mobile user,
semi-mobile user, or fixed user.
180 Wireless and Mobile Network Security
Service
A set of meaningful capabilities or valuable functions offered to a user by
the service provider. The service provider could be a retailer, broker, or third
party service provider.
Access
The entity that the user contacts in order to get the service. It has two possible
modes: infrastructure-less wireless ad hoc mode and infrastructure-based wire-
less mode. In the infrastructure-less wireless ad hoc mode, the access object
consists of a group of an independent wireless mobile (semi-mobile) nodes
communicating on a peer-to-peer basis with no pre-established infrastruc-
ture needed. The mobile stations could be laptops, Personal Digital Assistant
(PDAs), cellphones, etc. In the infrastructure-based wireless mode, the Access
Objects could be any infrastructure based access units available in wireless
environment such as Base Stations (BSs) in cellular systems or access points
in WLAN. Both infrastructure and infrastructure less modes can be integrated
in a heterogeneous wireless mode in order to provide the user with a proper
access to the service party under any conditions that could prevent the other
two access modes from working individually in an effective way.
Core
Manages and controls the behaviour of three objects: user, access, and service
in order to guarantee the delivery of the service. The core object is mainly
concerned with the provisioning and support of the management functions:
Operation, Administration, Maintenance and Provisioning (OAM&P) (ITU-T
M.3020 2000, ITU-T M.3400 2000) and Fault, Configuration, Accounting,
Performance, Security (FCAPS) (ITU-T M.3010 2000, ITU-T X.700 1992,
ITU-T X.701 1997).
Application
Tools installed or used on the user side to facilitate effective communication
and service provision. It could be a service-specific application or a generic
control and management application. This object manipulates data, video, or
voice that is received by the user to meet both the user and service require-
ments.
Based on the defined WMANET, a comprehensive, top-down, end-to-end
security solution for WMANET is proposed. This security solution addresses
the global security challenges of WMANET in order to detect, predict, and
correct security vulnerabilities. Table 7.1 presents the security solution in a
tabular form and illustrates a methodical approach to secure WMANET. Each
Application Level Security in Heterogeneous Wireless Networks 181
The WLANs are located within the range of UMTS networks they are
affiliated with, which assures that a MT has the public key to validate
the AS of a WLAN.
The MT supports the PEAP, including USIM extension.
The mutual authentication procedure to a WLAN is as follows (see also
Figure 7.7):
The AS sends a PEAP/Start packet, which is an EAP-Request packet with
EAP-Type=PEAP, the Start (S) bit set, and no data. The initial clear text
identity exchange is omitted to protect the identification of the end-user
from disclosure. The AP acts as a proxy and Network Access Server
(NAS) between the MT and the AS.
The MT sends an EAP response packet with EAP-Type=PEAP. The
data filed of the packet contains the information needed to setup a TLS
link.
The AS sends its certificate to the MT while setting up the TLS secure
link. The MT validates the certificate using the public key it received
from the UMTS network during its association with current UMTS
network. If the authentication succeeds, the procedure continues, as the
secure link has been set up.
The MT and AS negotiate and agree to use PEAP-USIM authentication
method.
The AS sends a RAND to the MT. The MT processes the challenge using
the CK in its USIM and sends the result to the AS.
The AS verifies the MT by looking up the P-TMSI list and finds the CK
in the VLR of the end-user. It then carries out the same calculation as the
MT did using the RAND and CK and compares the results. (According
to the assumptions, hotspots deployed by service provider A are within
the range of UMTS networks of service provide A, the AS need only to
check the data in its local VLR.)
If the authentication succeeds, the AS sends an authentication success
message to AP, which will enable its controlled port for the MTs MAC
address and enables a WEP key.
The MT obtains a new local IP address which will be used in the WLAN.
The new local IP address will be registered at home agent.
SUMMARY
REVIEW QUESTIONS
OBJECTIVES
The term ‘mobile commerce (m-commerce)’ was coined in the late 1990s
during the dot-com boom. The idea that highly profitable to m-commerce ap-
plications, would be the broadband mobile telephony provided by 2.5G and
3G cellphone services. The m-commerce is an e-commerce brought to mobile
users via mobile devices such as palmtops, PDAs or most dominantly mobile
phones. With an ever increasing number of devices in the market, mobile
phones will undoubtedly play a crucial role in promoting the m-commerce. It
allows users to conduct e-commerce on their mobile devices, obtain marketing
and sales information, receive ordering information, make a purchase decision,
pay for it, obtain the service or product and finally, receive customer support
required.
M-commerce follows the user and is available anytime and anywhere.
Although mobility is a valuable characteristic to the user in general, it is
especially precious for m-commerce because it enables a key factor, which is
Security for Mobile Commerce Application 189
missing in other e-commerce forms, namely the ability to adapt to the user
demands. In fact, the essence of commerce is to be able to satisfy the demands
of the users. It is important not only to be able to offer whatever the user wants
but also whenever he/she wants. M-commerce can also be customised such that
it fits the preferences of the user in combination with time and location.
Another important aspect of m-commerce is the ability to mix electronic
media with other media such as newspaper, TV, radio, natural communication
in any of the commerce phases, i.e., presentation, selection, ordering, payment,
delivery and customer care. For example, a mobile user can browse on his/her
mobile phone and obtain the location of the closest shop. In this case, the
presentation and selection are done electronically via the mobile phone while
the rest is done in a traditional way via natural communication. In another
situation, a user buys groceries and pays through a mobile phone. The pre-
sentation, selection, ordering, delivery and customer care phases are carried
out in traditional way and only the payment phase is done electronically.
8.1.3 Banking
Mobile banking addresses the fundamental limitation of Internet banking, by
reducing the customer requirement to just a mobile device. The main reason
that Mobile banking scores over Internet banking is that it enables “Anywhere
banking”. One of the ways to categorise the mobile banking services is by
the nature of the service, which results in transaction-based and enquiry-based
services. Example, a request for a bank statement is an enquiry-based service
and a request for fund’s transfer to some other account is a transaction-based
Security for Mobile Commerce Application 191
Registration
Customer opens an account with payment service provider for payment service
through a particular payment method.
Transaction
Payment service provider then requests the trusted third party for authentication
and authorisation. Payment service provider informs content provider about
the status of the authentication and authorisation. If customer is successfully
authenticated and authorised, content provider will deliver the purchased
content.
Payment Settlement
Electronic mails are used to send and receive money in PayPal system, the
user of a PayPal system should provide his/her profile to the system includ-
ing the credit card information. Once a payment takes place, the money is
withdrawn from the credit card account to the automated clearinghouse. The
receiver of the payment will be notified. PayPal offers instance notification and
194 Wireless and Mobile Network Security
confirmation of the fund transfer. Thus, PayPal is a third party that organises
the money transfer among users.
NetPay Model
This model allows the payer to remain anonymous during the transaction,
however anonymity is controlled by trusted third party, which is called Judge.
This model tries to make a balance between the two major characteristics of
the e-payment system, which are anonymity and tractability. It allows a trusted
third party to control the anonymity in suspicious payment transaction. The
main objective is to prevent criminal use of funds such as money laundering
and blackmailing.
PayWord Model
Cheque
Fig. 8.3 (a) Cheque like Payment System, (b) Bank Transfer Payment System
Credit Card
In terms of the information flow, credit card based payment systems are
similar to cheque-like payment systems, with the difference that credit-card
based payment systems use the existing credit card infrastructure for settling
the payment.
Security for Mobile Commerce Application 197
Bank Transfer
The bank transfer model is sketched in Fig. 8.3 (b). Here, the customer in-
structs the issuer to transfer money to the merchants account at the acquirer.
The merchant is notified of the incoming payment.
Debit Advice
This model describes the opposite case to the bank transfer model. The mer-
chant instructs the acquirer to charge the account at the issuer. The customer
is notified of the outgoing payment.
In this case, monetary value is stored on the mobile device and the customer
has full control of his/her money wherever the person goes and whatever he/
she does. An electronic coin is represented as a file containing, among other
information, a value, a serial number, a validity period, and the signature of
the issuing bank. Since software electronic coins are easy to copy, the validity
of an electronic coin depends on its uniqueness in terms of its serial number.
The customer transfers electronic coins to the merchant, who forwards them
to the issuing bank for the double spending test. In this test, it is checked
whether the electronic coin has been spent beforehand. If yes, it is rejected.
Otherwise, its serial number is entered into the double spending database and
the money is credited to the merchant’s account. The generation and storage
of electronic coins is an orthogonal problem. Due to the limitations of mobile
devices, electronic coins may have to be generated and stored externally, until
they are downloaded onto the mobile device.
Hardware Electronic Coins
other and a secure channel is set up between them. Then, electronic money can
be transferred from one to the other. This approach is quite attractive because
smart cards provide an additional level of mobility. That means that the pay-
ment smart card can also be used in point-of-sale transactions.
Background Account
3D Secure
Visa’s 3D-Secure is Visa International’s global specification that ensures the
security of Internet payments made over mobile phones. Developed in con-
junction with some 15 major industry players, the specification is part of Visa
Authenticated Payment, a comprehensive e-commerce program designed to
ensure safe and secure online payment transactions. The Mobile 3-D Secure
specification extends payment authentication initiatives into mobile commerce,
enabling Visa card issuers to validate the identity of their cardholders in real
time. It ensures that payment data sent over open networks is not compromised
and allows consumers to actively protect their Visa accounts from unauthorised
use when shopping on-line over mobile devices.
Mobey
The Mobey Forum brings together the substantial expertise of the world’s
leading on-line financial institutions and the leading companies in mobile
Internet technologies such as Wireless Application Protocol (WAP). The lead-
ing mobile phone manufacturers, Ericsson, Motorola and Nokia, acknowledge
that the Mobey Forum will play a valuable part in the development of online
wireless financial services.
Fundamo
There is also Fundamo, an initiative, which has developed the capability to
deliver a working mobile payment solution to cellular networks using existing
Phase 2+ compliant technology. This means the Fundamo solution can be used
on both WAP handsets as well as Phase 2+ compliant handsets.
Radicchio
The Radicchio, a global initiative to define a standard security platform for
mobile e-commerce using Wireless PKI (Public Key Infrastructure). Mobile
commerce on WAP-phones is likely to be secured by Java and Wireless Identity
Modules (WIMs) using PKI.
200 Wireless and Mobile Network Security
Sat Forum
The SAT (SIM Application Toolkit) initiative which is a part of the ETSI/SMG
standard for Value Added Services and m-commerce using GSM phones to
do the transactions. You will be able to check your bank account and pay
bills using your SIM Toolkit-enabled phone with an appropriate SIM Toolkit-
specific SIM card which will provide much of the intelligence to conclude
a transaction over GSM. Wireless Internet Gateway (WIG) gives WAP and
SIM Application Toolkit (SAT) terminals access to WML-based applications.
It brings WAP to legacy terminals via SMS and supports end-to-end security,
push and location-based services. A SIM-based WML browser not only lets
a GSM operator deliver web-style content to the current large installed base
of mobile phone subscribers, but it offers increased security inherent in the
Smart Card technology.
eSIGN
eSign is an initiative between leading companies in the mobile marketplace
to make mobile digital signatures. The consortium aims to develop a uniform
application interface as the de-facto standard for the integration of the mobile
phone into the Internet world and to use the mobile phone for implementing
mobile digital signatures.
MEST
The MEST (Mobile Electronic Signature) Consortium is an association of
companies active in the internet and mobile phone sectors. Its objective is to
develop a secure and universal application infrastructure capable of employing
mobile digital signatures.
8.4.1 Interruption
Interruption (Refer Fig. 8.4) is the action of preventing a message from reach-
ing its intended recipient. It can also occur when an asset of the system is
destroyed or becomes unavailable or unusable. This is an attack on availability.
202 Wireless and Mobile Network Security
8.4.2 Interception
Interception (Refer Fig. 8.5) is where an unauthorised party gains access to
information. This is an attack on confidentiality. The unauthorised party might
be a person, program or a computing system. A loss due to this kind of at-
tack might be noticed quickly, but a silent interceptor might leave no traces
by which the interception can be detected. Examples of these kinds of attacks
include: Wiretapping to capture data in a network; Illicit copying of files or
programs; and so on.
Information Information
source Interception
destination
Attacker
8.4.3 Modification
Modification is where an unauthorised party not only gains access to an asset,
but tampers with it (Refer Fig. 8.6). This is an attack on the integrity of the
message. Examples include: Changing of values in a database for personal
Security for Mobile Commerce Application 203
Modification
Information Information
source destination
Attacker
8.4.4 Fabrication
Fabrication (Refer Fig. 8.7) occurs when an unauthorised party inserts coun-
terfeit objects into the computing system. This is an attack on the authentic-
ity of the message. These insertions can sometimes be detected as forgeries,
but if skilfully done, they are virtually indistinguishable from the real thing.
Examples include: Insertion of spurious information into the network com-
munication system; Adding additional records to an existing file or database;
and so on.
Fabrication
Information Information
source destination
Attacker
The model is investigated through the accessing procedure, the roaming man-
agement procedure, and the electronic trade procedure. To solve the security
problem in the WLAN, a novel authentication method is used, in which the
mobile node (MN) is validated twice by an access point (AP) and a mobile
agent (MA), and all the devices are authenticated in a register procedure with
the PKI/CA mechanism.
A model of m-commerce based on WLAN is shown in Fig. 8.8, in which a
mobile user uses a MN to conduct e-commerce with a merchant connecting to
the Internet. The user accesses the Internet through WLAN, and moves from
subnet 1 to subnet 2, and is still able to finish the m-commerce transaction
regardless of mobility. The most important device in WLAN is the access
point (AP) through which the wireless stations can access into the Internet.
The mobile devices (PDA, notepad, handheld, called as mobile node) with
802.11 adapter can contact other devices, for example, static hosts (SH) or
other mobile hosts. If an MN moves into another WLAN, the MN can connect
to the new AP to realise the re-association after the authentication.
A concept of mobile agent (MA) is introduced to mobile IP system, which
can be divided into home agent (HA) and foreign agent (FA). When moving
The security schemes for the m-commerce environment can be viewed from
regular key-based schemes to application-level schemes. This section provides
some of the security schemes available for m-commerce applications.
Then, the MN and the AP generate their conversation key. The ECDH
(Diffie-Hellman key exchange algorithm of ECC) is used for generating the
conversation key. The conversation key of MN(KMN) is generated by the AP’s
public key and the MNs private key, while the conversation key of AP(KCAP)
is generated by the MN’s public key and the AP’s private key. This leads to K
= KAP = KMN. The key is used in the entire session including the registration
to MA and the m-commerce transactions.
refuse service attack generated by the forge AP or FA, where attacker may
take its IP address as care-of address of a certain MN to intercept the mes-
sage sent to the MN, while the genuine MN is refused. In addition, to ensure
the MN is not an invader, an alternative authentication method with shared
key is also used.
Before transferring the data, a register procedure must be initiated by MN
through sending a register request. For example, the keyed-MD5 authentica-
tion algorithm “prefix+suffix” mode to compute a 128-bit “message digest”
of the registration message is used. The message digest is combined with the
PKI/CA to get a more reliable transmission shown in Fig. 8.10. At the same
time, the authentication of AP is added.
the MN to validate the MAC to prove the identification of the MN. The HA
sends a register reply to the MN after the successful authentication. The reg-
ister reply is forwarded by the FA and AP with authentication extension too,
which can be used by the MN to authenticate it. To ensure the AP is valid
when the MN moves out of the current AP covered area within a subnet, the
MN initiates a new register procedure.
Preliminaries
Ideally, the adequate authentication service for mobile users to access Internet
m-commerce services should satisfy the following security requirements:
S1
The authentication service should ensure that the assisted party is accountable
for all the messages it sends in the authentication process.
In addition to these security requirements, the service should also meet the
following performance requirements:
Security for Mobile Commerce Application 209
I1
The overhead introduced by the authentication service, e.g. the number and
size of authentication messages, should be minimal, especially for the wire-
less segment.
I3
Network Infrastructure
The wireless/wired integrated network infrastructure is illustrated in Fig. 8.11.
The infrastructure consists of a number of functional entities: a Mobile Station
(MS), a Home (wireless access) Network (HN), a Home Location Register
(HLR) and a Service Provider (SP).
An MS is a user equipment consisting of a mobile terminal and a User
Service Identity Module (USIM). One of the most important parameters
stored in USIM is the International Mobile User Identity (IMUI), which
uniquely identifies the MS.
An HN has overall responsibility for the provision of a set of services to
users. It has a database that contains all the subscription data including
all the security parameters such as the IMUI. The HLR is the operational
entity of the HN.
Notations
The notations used for the protocol presentation are summarised as follows:
A, B: Concatenation of data items A and B
h(x): A one-way hash function with the following properties: (a) for any x, it
is easy to compute h(x); (b) given x, it is hard to find x ( x) such that
h(x) = h(x); and (c) given h(x), it is hard to compute x. An example of
such a one-way hash function is SHA-1.
EK(x): The cipher-text of a data item x encrypted with a key K. EK() is com-
puted using a public-key cryptosystem if the corresponding decryption
key is not K, and using a conventional cryptosystem otherwise.
Design Assumptions
The following assumptions have been used in the protocol design. The HN has
a supplier-subscriber relationship with the MS, i.e., the MS is a subscriber of
the HN. The HN provides the MS network access service. The responsibilities
of the HN include the management of subscriber data and on-line interaction
to ensure that users are properly authenticated to use the provided services.
The HN keeps subscriber information confidential to itself. This supplier-sub-
scriber relationship between the HN and MS is currently have with most of
the wireless providers. It is thus sensible to let the HN to assist the MS in its
authentication with the SP and to ensure that this assistance is provided with
accountability assurance. In addition, as an MS and its HN appear together
as one ‘virtual’ client in its mutual authentication with the SP, the SP needs
to authenticate both the MS and the HN. It is also assumed that there is no
collusion between any two of the three entities, i.e., an MS, the HN of the
MS, and an SP, to cheat the third entity.
connects to the HN. After the MS-HN authentication process, the MS and HN
will share a secret session key KMS-HN and a secret temporary identity TMUI
which is used as the identity of the user during this communication session.
HN-SP Authentication Protocol
to re-send the message. For repeated failures, the HN can terminate the
protocol run. This is applied to all other transactions.
2. The HLR forwards EpuSP(x) to the SP together with a hash value h(TMUI)
and its signature sigHN. Here h(TMUI) is generated by the HLR using the
MSs TMUI stored in the HN and will be used to authenticate the MS
to the SP. As TMUI is the identity of the MS, to protect its privacy, the
HLR hashes it before sending it to the SP. The message confidentiality
is provided using the session key KHN-SP. The integrity and authenticity
services are provided using the HLRs digital signature sigHN (= EpvHN
(h(h(TMUI)), EpuSP}(x))), where pvHN is the private key of the HN. With
this signature, the HN cannot later deny that it has not sent this message,
and therefore is accountable for its action. These security techniques are
also applied to transaction 3.
3. The SP replies to the MSs request with a random number y and its sig-
nature sigSP (= EpvSP(h(y))), where pvSP is the private key of the SP.
It then computes the secret session key KMS–SP (= h(x, y)).
4. The HLR forwards y to the MS with a hashed value h(KHN–SP). h(KHN–SP)
will be used to authenticate the SP to the MS.
5. The MS computes the session key KMS–SP (= h(x, y)) using its secret x
and the value y received, and sends a verifiable authenticator h(h(TMUI),
KMS–SP) to the SP. This verifiable authentication hash value is to authen-
ticate the MS to the SP. As this authenticator is generated using a hash
function, the HLR is unable to acquire the session key KMS–SP.
6. Upon the receipt of h(h(TMUI), KMS–SP) from the MS, the SP computes
hash value h(h(TMUI), KMS–SP), where the value h(TMUI) is received in
transaction 2 and KMS-SP is computed by the SP. The SP then compares
this calculated value with the one received. If they are equal, the SP is
assured that the MS is authenticated. Then the SP produces an authenti-
cator h (h(KHN-SP), KMS–SP) and sends it to the MS. As in transaction 5,
the HLR cannot access to the session key KMS-SP because it is hashed.
7. Once h(h(KHN–SP), KMS–SP) is received, the MS uses h(KHN-SP) received in
transaction 4 and the key KMS-SP to compute value h(h(KHN-SP), KMS–SP),
and compares it with the one received. If they are equal, the MS is as-
sured that the SP is authenticated and the authentication process is suc-
cessfully completed.
Notice that properties are similar to the mobile device ones since the inter-
action during the authentication process must be ensured. However, portability
of the access point is not needed. The last property stated above anticipate that
authentication process can be used to access different services and resources.
Examples of access point can be very different. For instance, a desktop com-
puter can be an access point to an intranet network. On the other hand, a
electronic lock can also be regarded as an access point to control room physical
access. As soon as WPAN technology will be extended to different devices,
authentication using MASPA will increase its possibilities thanks to the wide
range of possible access points (vending machines, phone boxes, etc.).
Transaction Level
Analyser
CFA
Transaction Service
Trans.
Handler CFA analyser
data
Transaction
parameters
MCSP
MCA
TBAS TBSS
Security
Security Trusted Security techniques
Authentication repository
techniques Server (TSS)
database
repository
Fig. 8.15 Transaction-based Security and Authentication System for Mobile Commerce
Customer
Customer is an entity who buys goods or services using his/her mobile devices.
The security techniques repository is either hosted on the customer device or
Security for Mobile Commerce Application 219
on the trusted security server. The Mobile Cognitive Agent (MCA) is migrated
onto client device.
Vendor
An organisation, whether a profit business or a non-profit entity, conducting
m-Commerce with customers. Vendor hosts security techniques repository.
The working of the proposed system is illustrated with the following ex-
ample. A mobile client wish to purchase an electronic item, say, calculator
from some mobile commerce vendor.
220 Wireless and Mobile Network Security
Step 1: The commerce service starts with the request from a client to the
MCSP to know the available vendors who sells a calculator.
Step 2: The MCSP provides the list of vendors who sells the product calcula-
tor.
Step 3: After obtaining the list, the client selects a vendor from the list and
forwards his/her selection to the MCSP.
Step 4: The MCSP migrates an instance of the MCA with initial security-ID
to the client device, and indicates the selected vendor regarding this.
Step 5: The client communicates the transaction to the vendor, if the transac-
tion is non-sensitive the vendor do not demand any authentication. Meantime,
the MCA communicates the beliefs generated to the SCA at the MCSP.
Step 6: The SCA keep analysing the variations in belief and transaction sensi-
tivity levels, if there is any increase in transaction sensitivity level, or the belief
deviation factor is crossing the threshold. The SCA generates the next security
technique to be used, and conveys the same to both the MCA and the vendor.
The SCA also creates an authentication challenge and validates the client, based
on the transaction sensitivity level and the belief deviation factor.
Step 7: This process continues for remaining transactions in the session.
The Table 8.2, discusses three test cases of purchasing scenario, which
are distinguished based on the number of products the customer purchased.
In each test case, we have listed the number of various levels of transactions
took place during the purchase.
Figure 8.16 shows the transactions arrival patterns, along with type of au-
thentication challenges generated, and also demonstrates the instances where
the deviation factor has gone above established threshold of normal behaviours.
The distribution shows, in the first two cases sensitivity levels of transac-
tions increases gradually with the progress of purchase, since the customer’s
buying behaviours is normally of type case-1 and case-2, we will not notice
frequent authentication challenges, and changes in security levels. But, during
the case-3, the deviation factor computed over behaviours of a customer, has
Security for Mobile Commerce Application 221
Case 1 t
LEGEND
T0 transaction
T1 transaction
T2 transaction
T3 transaction
Auth. Challenges
Deviation Factor
Case 2 t
Increased
Case 3 t
Table 8.3 Results Recorded in Every Time Slot, with Threshold as 0.45
The Table 8.4, shows the average time of cryptographic techniques ex-
ecuted by the system for the given three cases. At each level, there is a set
of cryptographic operations, which perform similar operations, the methods
are chosen randomly by the TBSS-Scheme. Since level-0 type of transactions
are not coming under any security requirements, they were not listed in the
table. The Table 8.5, shows the number of authentication challenges generated
by the TBAS-Scheme, for various levels of transaction during the execution
of test cases.
Table 8.4 Avg. Time for Security Operations for Various Cases
SUMMARY
REVIEW QUESTIONS