Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil

被引:47
作者
Hussain, Syed Rafiul [1 ]
Echeverria, Mitziu [2 ]
Singla, Ankush [1 ]
Chowdhury, Omar [2 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Univ Iowa, Iowa City, IA 52242 USA
来源
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19) | 2019年
关键词
Cellular Network; 4G LTE; 5G; Broadcast; Authentication; DIGITAL-SIGNATURES;
D O I
10.1145/3317549.3323402
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the cellular ecosystem, base stations act as trusted intermediaries between cellular devices and the core network. During connection bootstrapping, devices currently, however, do not possess any mechanisms to authenticate a base station before connecting to it. This lack of authentication has been shown to be exploitable by adversaries to install fake base stations which can lure unsuspecting devices to connect to them and then launch sophisticated attacks. Despite being a well-known threat to the cellular ecosystem, this weakness is not addressed in the current protocol versions including 5G. The current paper sets out to fill this void by proposing a Public-key infrastructure (PKI) based authentication mechanism which builds on top of the asymmetric cryptography used in 5G and adheres to the relevant deployment constraints. Our proposed authentication scheme leverages precomputation-based digital signature generation algorithms and employs optimizations in three dimensions DPKI scheme-level, protocol-level, and cryptographic scheme-level-to address the trilemma of small signature size, efficient signature generation, and short verification time. Our evaluation on a real testbed indicates that the proposed scheme is not only readily deployable but also performs better than a symmetric key-based scheme (i.e., TESLA) in terms of security guarantee, overhead, and deployment constraints (e.g., backward compatibility).
引用
收藏
页码:1 / 11
页数:11
相关论文
共 42 条
[1]  
3GPP, 3GPP TS 33.501
[2]  
Abodunrin D, 2015, IEEE CONF COMM NETW, P585, DOI 10.1109/CNS.2015.7346872
[3]  
American Bankers Association, 1999, 10 AM BANK ASS, V9
[4]  
Androulidakis I, 2011, COMM COM INF SC, V160, P281
[5]  
[Anonymous], 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security
[6]  
[Anonymous], 2014, ACSAC 14
[7]   Privacy through Pseudonymity in Mobile Telephony Systems [J].
Arapinis, Myrto ;
Mancini, Loretta Ilaria ;
Ritter, Eike ;
Ryan, Mark .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[8]  
Boeyen Sharon, 2008, RFC 5280, DOI [DOI 10.17487/RFC5280, 10.17487/RFC5280]
[9]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[10]   The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection [J].
Dabrowski, Adrian ;
Petzl, Georg ;
Weippl, Edgar R. .
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2016, 2016, 9854 :279-302