Security Analysis of the Consumer Remote SIM Provisioning Protocol

被引:0
作者
Ahmed, Abu Shohel [1 ]
Peltonen, Aleksi [2 ]
Sethi, Mohit [1 ]
Aura, Tuomas [1 ]
机构
[1] Aalto Univ, Espoo, Finland
[2] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Saarland, Germany
关键词
Mobile communication; eSIM; formal modeling and verification; AUTHENTICATION;
D O I
10.1145/3663761
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote SIM provisioning (RSP) for consumer devices is the protocol specified by the GSM Association for downloading SIM profiles into a secure element in a mobile device. The process is commonly known as eSIM, and it is expected to replace removable SIM cards. The security of the protocol is critical because the profile includes the credentials with which the mobile device will authenticate to the mobile network. In this article, we present a formal security analysis of the consumer RSP protocol. We model the multi-party protocol in applied pi calculus, define formal security goals, and verify them in ProVerif. The analysis shows that the consumer RSP protocol protects against a network adversary when all the intended participants are honest. However, we also model the protocol in realistic partial compromise scenarios where the adversary controls a legitimate participant or communication channel. The security failures in the partial compromise scenarios reveal weaknesses in the protocol design. The most important observation is that the security of RSP depends unnecessarily on it being encapsulated in a TLS tunnel. Also, the lack of pre-established identifiers means that a compromised download server anywhere in the world or a compromised secure element can be used for attacks against RSP between honest participants. Additionally, the lack of reliable methods for verifying user intent can lead to serious security failures. Based on the findings, we recommend practical improvements to RSP implementations, future versions of the specification, and mobile operator processes to increase the robustness of eSIM security.
引用
收藏
页数:36
相关论文
共 61 条
  • [1] 3GPP, 2018, 33501 TS 3GPP
  • [2] 3GPP, 2021, TS 33.401 Technical specification Group Services and System Aspects
  • [3] 3GPP System Architecture Evolution (SAE), V17.0.0)
  • [4] 3GPP, 2022, TS 33.102 Technical Specification Group Services and System Aspects, V17.0.0
  • [5] Prudent engineering practice for cryptographic protocols
    Abadi, M
    Needham, R
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) : 6 - 15
  • [6] The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication
    Abadi, Martin
    Blanchet, Bruno
    Fournet, Cedric
    [J]. JOURNAL OF THE ACM, 2018, 65 (01)
  • [7] Arkko Jari, 2006, RFC 4187, DOI [10.17487/RFC4187, DOI 10.17487/RFC4187]
  • [8] Bafoutsou Georgia, 2021, Countering SIM-Swapping
  • [9] Basin D., 2018, Handbook of Model Checking, P727, DOI DOI 10.1007/978-3-319-10575-8_22
  • [10] Basin D, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P179