Академический Документы
Профессиональный Документы
Культура Документы
Insertpresenterlogo hereonslidemaster
Agenda
Historical Perspective p Data Services Cryptography C t h Countermeasures
2
Historical Perspective
CourtesyofRichHoward
Source:www.nmscommunications.com
Threat of GPS
Data collection, storage, and use
19
Evolution to 4G
LTE Advanced LTE HSPA WCDMA EGPRS GSM
2G 2.5G 3G 3.5G 4G
IMT Advanced
1 bit
+1
1 bit
-1
1 chip
+1+1+1 -1-1-1 +1 -1 +1+1 -1
+1+1+1 -1-1-1
+1 -1
+1+1 -1
+1+1+1 -1-1-1 -1
+1 -1-1
+1 -1-1-1
+1+1+1
[code * data]
+1 -1
+1+1 -1
+1+1+1 -1-1-1
+1 -1
+1+1 -1
+1+1+1 -1-1-1
+1
[code [ d * signal] i l]
-1
Uplink
DTCH Codingand interleaving DPDCH(s) Multiplexing
Control
OVSF Modulation DataOSFV generator Cntl OSFV generator Scrambling generator Offset
001101010010
S P
OSFV generator
Control
Eaves dropping requires 5 MHz receiver knowledge and application of the codes
Illustration shows the Downlink Physical Data Channel
Modulat tion
Understanding Codes
Short Code
Purpose DownlinkUsage UplinkUsage Length L th Channelization
LongCode
Scrambling
Distinguishestransmissions Distinguishesdifferent todifferentusers to different users cells/sectors Distinguishesbetween DataandControltraffic 4to256chipslong 4 t 256 hi l Distinguishesbetween differentUsers 242 1 Codeperiod10ms=38,400 chips Gold d * G ld code* No
CodeFamily C d F il Spreading
OVSF Yes
* Specifications also define short code can be used with advanced receivers
4G Transitions to OFDM
S1 S2
S2
Resource Mapping
S1 S2
Improved reliability
S1 S2
-S2*S1*
Resource Mapping
Eaves dropping will require pp g q multi antennae and sophisticated signal processing
Maximizes throughput
Eaves dropping will require Ability to distinguish between users using same frequency
20 MHz
20 MHz
Band A
Band B
IP services IMS
2004
PSTN IMS PS
IP
eNodeB
Flatter IP Architecture
3G architecture
Radio Controller Node B SGSN GGSN
Internet
4G architecture
Serving Gateway Mobility Mgmt Packet data GW
Internet
eNode B N d
LTE
Serving GW PacketRouting
Compression(PDCP) Ciphering(RLC)
eNodeB
IP Packets
Node B
31
Wi-Fi Refresher
3G Security
User Services Identity Module (USIM) for identity assertion and verification KASUMI cryptography Data integrity with f9 Data confidentiality with f8
3G Threats
Roaming S Spoofing fi Denial of Service
4G Security
No standards H t Heterogeneous services and t h l i i d technologies
4G Threats
Gaps
Examples of 4G Compromises
Ikee D h Duh
Countermeasures
38
Countermeasures
Let 4G bake a little longer C Consider 3G partially secure id ti ll Develop and enforce policy
Hosts H t Data transmission and storage Carrier standards Acceptable use
Attribution
All images licensed under Creative Commons Attribution 2.0 license 20
The End!
41