3GPP SAE/LTE Security - Niksun [PDF]

13 downloads 309 Views 2MB Size Report
Service &. Systems Aspect. Systems Aspect). CT Plenary (Core. Network & Terminal. Network & Terminal). RAN WG1. (Layer 1). RAN WG2. (Layer 2/3).
3GPP SAE/LTE Security Anand R. Prasad NEC Corporation Disclaimer: This presentation gives views/opinion of the speaker and not necessarily that of NEC Corporation.

NIKSUN WWSMC, 26 July, 2011, Princeton, NJ, USA MI事企画M11-0043

Outline ▐ Background on how this thing came into being:  Next Generation Mobile Networks (NGMN) and  Third Generation Partnership Project (3GPP)

▐ Brief overview of Evolved packet system (EPS), i.e., SAE/LTE ▐ Security in EPS:     

Requirements Security per network elements and protocol layers Key hierarchy Authentication and key agreement Mobility

▐ Today and Tomorrow – including current security activities in Global ICT Standardisation Forum for India (GISFI) For abbreviations check Slide 34 Page 2

© NEC Corporation 2009

NEC Confidential

Next Generation Mobile Networks (NGMN) and 3GPP

Towards NGMN Next Generation Mobile Network (NGMN): A project by mobile operators with the objective to establish recommendations, requirements and scenario for future mobile broadband networks 1.3 Mbps

1 Gbps 100 Mbps 42 Mbps 21 Mbps

12 Mbps

2 Mbps

100 Mbps 50 Mbps

171 kbps

14.4 kbps

11 Mbps

57.6 kbps

1 Mbps

384 kbps 9.6 kbps

14.4 kbps

1 Mbps

NGMN

144 kbps Broadband IP based Cellular network

14 kbps

1993 Phase 1 1997 Rel. 97 2000 Rel.3 2004 Rel. 6 2009 Rel.8 Future 1996 Rel. 96 1998 Rel. 98 2002 Rel. 5 2007 Rel. 7 and WiMAX Time-line of standard development towards NGMN Page 4

© NEC Corporation 2009

NEC Confidential

NGMN Architecture 3GPP Basic Architecture Service Layer Other External Networks e.g. PSTN, PLMN, Internet

Service Control e.g. IMS

Enablers PS core of NGMN

CS core network

SAE (or EPC)

Internet

Other networks like WiFi

NGMN Access Network

Subscriber Identity Module (SIM) UTRAN

LTE (or E-UTRAN) Mobile Equipment (ME)

Page 5

© NEC Corporation 2009

User Equipment (UE) NEC Confidential

GERAN

3GPP Overview PCG (Project Coordination Group) RAN Plenary (Radio Access Network) Network)

SA Plenary (Service (Service & Systems Aspect) Aspect)

CT Plenary (Core Network & Terminal) Terminal)

RAN WG1 (Layer 1)

SA WG1 (Requirement)

CT WG1 (UE/Core NW Layer 3)

RAN WG2 (Layer (Layer 2/3) /3)

SA WG2 (Architecture)

CT WG3 (Interwor (Interworking external) external)

RAN WG3 (RAN to wired) wired)

SA WG3 (Security)

CT WG4 (Core NW protocol)

RAN WG4 (Performance)

SA WG4 (Codec)

CT WG5 (Open Service Access)

RAN WG5 (UE conformance test)

SA WG5 (Management)

CT WG6 (SIM)

Page 6

© NEC Corporation 2009

NEC Confidential

This is how it works • Third Generation Partnership Project (3GPP) develops specification standardized by organizational partners (OPs) • OPs follow their government / regulatory mandate • OPs participate in the project coordination group (PCG) • Individual members are member of at least one of the OPs and provide input to the technical specification group (TSG) • Result of TSG is a TR or TS that forms standars by OPs • 3GPP also takes input from ITU and uses its guideline • Resulting specification from 3GPP TSG is taken to ITU by individual members as specification

ATIS USA

CCSA

ETSI

China

Europe

TTC

ARIB

TTA

Japan

Japan

Korea

3GPP

PCG

TSG

Organizational Partners

Page 7

© NEC Corporation 2009

NEC Confidential

ITU

Evolved Packet System (EPS) Overview and Security • EPS is also know as System Architecture Evolution (SAE) / Long Term Evolution (LTE) • SAE is also known as Evolved Packet Core (EPC) • LTE is also known as Evolved UTRAN

• Mobility Management Entity (MME) takes care of mobility within EPS and inter-RAT • Performs authentication • End-point for Non-Access Stratum (NAS) GERAN • Selects gatewaysGbfor UE

Network Overview • evolved NodeB (eNodeB) takes over RNC and NodeB function of UMTS • End-point for Access Stratum (Radio resource control and User Plane)

HSS (AuC,HLR, EIR,DNS) S6d/Gr

UTRAN

Iu SGSN PCRF

S6a

S4

S3

S12 Uu S1-MME USIM

S11 MME

ME UE

Gx

GXc

AS (RRC & UP) eNodeB

SGW S10

SGi PDNGW or PGW

S5 S8 for InterPLMN

S2a

Trusted 3GPP access, e.g. cdma2000

MME ePDG

S1-U

SWp

eNodeB

E-UTRAN

PDN Operator IP services (IMS etc.)

S2b

X2

NAS

Rx

EPC Un-trusted 3GPP access, e.g. WiFi

X2, S1-U, S2a, Rx etc. are reference points between network elements. Protocols are defined for each reference point. Solid lines between network elements are mainly for user plane traffic as defined by 3GPP while dashed lines are mainly for control plane. Highlighted network elements are newly introduced network elements in SAE/LTE (EPS). Explanation of network elements related to security are given here. Page 9

© NEC Corporation 2009

NEC Confidential

Basic Requirements ▐ Continued usage of current USIM, i.e., there should not be any change in USIM for accessing EPS network. The USIM that is used in UMTS networks should be thus reusable. ▐ Security should be at least of the same level or better than that compared to UMTS.

Page 10

© NEC Corporation 2009

NEC Confidential

Security Requirements •Mutual authentication between UE and network •Optional confidentiality •Mandatory integrity protection for RRC and NAS and optional for UP (algorithms are SNOW 3G and AES) •MSIN & IMEI(SV) should be confidentiality protected •IMEI(SV) should be sent only after NAS security is activated

• Integrity, confidentiality and replay-protection based on operator decision • Mutual authentication between network elements eNodeB X2

Uu S1-MME

UE

• Sensitive part of boot-up in secure environment • Uses authorized data/software • Ensure data/software change attempts are authorized • Ciphering /deciphering of control and user plane done in secure environment • Keys stored in secure environment • Secure environment integrity ensured • Sensitive data of secure environment not exposed

© NEC Corporation 2009

SGW

eNodeB S1-U

O&M

• Confidentiality and integrity protection of software transfer • Mutual authentication between eNB and O&M Page 11

S11 MME

NEC Confidential

Network Elements and Security Functions • Performs UE authentication • Generates AVs • End-point (UE is other end-point) for integrity and confidentiality protection of RRC and confidentiality protection of UP • Manages AS keys • Initiates UE AS security

HSS (AuC,HLR, EIR,DNS)

• End-point (UE is other end-point) for integrity protection and confidentiality protection of NAS • Manages NAS keys and participates in AS key handling • Verifies UE authorization to access service and network • Gets AVs from HSS • Initiates UE NAS security

S6a Uu S1-MME

S11 MME

UE

SGW

eNodeB S1-U

EPC

E-UTRAN

Confidentiality is optional and integrity protection is mandatory and uses SNOW 3G or AES (ZUC was added recently) Page 12

© NEC Corporation 2009

NEC Confidential

Protocol Layers and Security Functions Performs NAS key handling and integrity and confidentiality protection of NAS

NAS Has the role of AS (RRC and UP) key handling and security activation in PDCP

Application / IP

RRC

Performs integrity protection of RRC and confidentiality of RRC and UP

PDCP

RLC/MAC/L1

Page 13

© NEC Corporation 2009

NEC Confidential

Key Hierarchy Location of the keys

K

• Pre-shared secret between the AuC and the USIM • Used for Authentication and Key Agreement (AKA)

AuC & USIM

CK, IK

• Confidentiality and integrity keys resulting from AKA • Passed to HSS from AuC and ME from USIM

Kasme

• Generated by HSS and passed to MME • Concatenation of CK and IK

HSS & ME

KNASenc

MME & ME

KNASint • NAS keys: stays in MME for NAS confidentiality (encryption) and integrity protection

KeNB eNB & ME

KUenc

KRRCenc

KRRCSint • KeNB is passed to eNB from MME • AS keys: Derived from keNB for RRC confidentiality (encryption), RRC integrity protection and U-plane confidentiality

Page 14

© NEC Corporation 2009

NEC Confidential

Key separation depending on purpose

EPS Terminal Start-up and Security S1-U UE

Uu

eNB

S1 1 MME

(1)

• UE needs registration to the network • All UE and radio details are sent • ME identity can be checked by the network • Can be security protected

(2) Attach request

(3) AKA and start integrity and ciphering by security mode command (SMC)

• Mutual authentication • Set up keys • Activate security

HSS

SGW

• Radio level access and control channel are setup • With random access the UE gets radio access to eNB • RRC messages are not security protected • NAS message from UE piggy backed in RRC message • NAS message may or may not be security protected • HSS is informed at which MME the UE is located

(4)

• Create path to PDNGW • PDNGW assigns the IP address

IP address allocation

(5)

• Leads to completion of attach and setting of session • RRC message maybe sent without protection

(6)

Page 15

© NEC Corporation 2009

PGW

NEC Confidential

Authentication and Key Agreement (AKA) HSS (with AuC)

MME

USIM 1. USIM identification

2. Authentication data request 3. Authentication data response with authentication vector (AV) 4. Authentication request

5. Check whether AUTN –part of AV sent to UE– is acceptable (Authenticate network). Generate keys and RES.

Network and UE are authenticated to each other. The top-level-key (Kasme) is created

6. Authentication response {RES} 7. RES = XRES? (Authenticate UE)

Page 16

© NEC Corporation 2009

NEC Confidential

SMC: NAS Algorithm Selection Configured with list of NAS confidentiality and integrity algorithms that can be used and with priority

UE

eNB

MME

Choose highest priority algorithms NAS integrity protection start NAS Security Mode Command (eKSI, UE sec capabilities, ENEA, ENIA, [IMEI request,] [NONCEue, NONCEmme,]NAS-MAC)

Verify NAS SMC integrity. If succesful, start ciphering/ deciphering and integrity protection and send NAS Security Mode Complete.

NAS de-ciphering /ciphering start

NAS Security Mode Complete ([IMEI,] NAS-MAC)

Integrity protected with the new algorithm if there was change in algorithm

Algorithm is chosen for NAS and NAS keys are generated. NAS security starts. Page 17

© NEC Corporation 2009

NEC Confidential

SMC: AS Algorithm Selection Configured with list of AS confidentiality and integrity algorithms that can be used and with priority

UE

eNB

MME UE AS security context setup

UE security capabilities is sent to MME during connection establishment together with START value. This is informed back to UE integrity protected. UE responds back with the same thing again integrity protected. All in NAS.

UE capabilities., eKSI Choose highest priority algorithms RRC/UP integrity protection start

AS Security Mode Command RRC-Integrity protected (Integrity algo, ciphering algo, MAC-I)

Verify AS SMC integrity. If succesful, start RRC/UP integrity protection, downlink deciphering, and send AS Security Mode Complete.

RRC/UP ciphering start

AS Security Mode Complete (MAC-I) RRC/UP ciphering start

Page 18

© NEC Corporation 2009

RRC/UP deciphering start

NEC Confidential

Algorithm is chosen for AS & AS keys are generated. AS security starts.

Mobility in EPS

UMTS

EPS S3

S10 MME

MME

S1-MME S1-MME

S1-MME

SGSN

S1-MME RNC

eNodeB X2

eNodeB

eNodeB

Cell 1

Inter-MME

Inter-eNodeB / X2

Inter-eNodeB/S1

Inter-RAT

Intra-eNodeB

Page 19

© NEC Corporation 2009

NodeB

eNodeB

Cell 2

NEC Confidential

NodeB

Secure Handover in Evolved Packet System (EPS)

Provide security material before handover  Not good

Provide security material during handover  Not good

Provide security material after handover  Good

EPS Core Network (CN)

CN device

CN device BS BS

Serving  bad guy

Target BS Serving  Serving  Target bad guy bad guy

Security material given by BS  Not good

Page 20

© NEC Corporation 2009

BS

Target

Security material given by core network  Good

NEC Confidential

• Provides forward and backward security • Key changed at each handover • Algorithm can be changed at each handover

Handover and Key Handling Horizontal key derivation PCI, EARFCN-DL

NAS uplink COUNT

Vertical key derivation

KASME

KASME

KDF

Initial KeNB

KeNB

KDF

PCI, EARFCN-DL

KeNB*= KeNB

KDF

KeNB*= KeNB

KDF

NCC=1

NH

KASME

KASME

KDF

PCI, EARFCN-DL

NH

KDF

KDF

PCI, EARFCN-DL

NH

KDF

KDF: Key Derivation Function NH: Next Hop NCC: Next hop Chaining Counter PCI: Physical Cell Identity Page 21

NCC=0

© NEC Corporation 2009

PCI, EARFCN-DL

KeNB*= KeNB

KDF

PCI, EARFCN-DL

KeNB*= KeNB

PCI, EARFCN-DL

KeNB*= KeNB

KDF

KDF

KeNB*= KeNB

NCC=2

KeNB*= KeNB

NCC=3

PCI, EARFCN-DL

KeNB*= KeNB

KDF

Detail of key derivation and handling on handover NEC Confidential

Inter-Technology Handover for EPS ▐ The idea here is to derive keys both ways from the existing context and do AKA at the earliest possible especially in E-UTRAN ▐ The keys are named as follows:  Mapped context is the one derived from other RAT keys  Current context is the context being used  Native context is the context of EUTRAN

▐ On handover to E-UTRAN mapped context is used although it is recommended that native context should be used as it is considered stronger Page 22

© NEC Corporation 2009

NEC Confidential

EPS

eNodeB

Derive keys in serving network for the target network and in UE based on current keys before handover

UMTS

NodeB

Today to Tomorrow

Protection against Unsolicited Communication in IMS (PUCI) - Accounting & Charging server - IMS – application Server

Threats Data confidentiality Fraud Activities Phishing Denial of Service Bandwidth Availability Productivity Loss Call Quality Degradation Unauthorized Access

Can lead to SPIT

Eavesdropping SPIT Customer Satisfaction Authentication Re-Routing Bots, virus etc. Caller ID Spoofing

There are several VoIP threats that can lead to SPIT Page 24

© NEC Corporation 2009

NEC Confidential

Protection against Unsolicited Communication in IMS (PUCI) Solve it with Identify, Mark and React Source device Challenge Identification

(check with automatic means and static operator/user settings)

Further test

Result Marking

(indicate the likelihood of UC through marking)

Marking level Reacting

(check threshold level and take action, e.g. re-route, voice mailbox, further test etc.)

Other

(based on user or operator policy communication is sent to a given network element for action.)

Marking or no marking Destination UE

(user takes action based on marking and sender ID if available)

Page 25

© NEC Corporation 2009

3GPP TR 33.937 available. Further work on-going under SPUCI work-item. NEC Confidential

Machine to Machine Communication ▐ Known as Machine Type Communication (MTC) ▐ Scenarios are, for example, smart metering or healthcare ▐ Issues can be from the point of access control to attack on the device itself ▐ The biggest problem will be the huge number of devices trying to connect to the mobile network and thus overwhelming the network due to high traffic volume

Page 26

© NEC Corporation 2009

NEC Confidential

GISFI Security Activities ▐ The security activity in Global ICT Standardisation Forum for India (GISFI) provides solution for all the activities being carried out by the standardization forum ▐ Security SIG also provides input to Indian government ▐ The activity is still at its early stage, some of the topics covered are:  Cyber security and children  Cloud security  Inter-of-Things (starting from machine-to-machine, M2M, communication)

Page 27

© NEC Corporation 2009

NEC Confidential

What is happening today and where will it lead to? ▐ Some observations of today:  Average age of knowledge generation is decreasing with time – data and information in readily available  World is slowly but steadily moving towards similar level of life globally – impact on age of population and education level  Reachability is at 24 / 7  Need for convenience is increasing  Computing, telecommunications and networking has converged, if not, the trend has only become faster  Openness, free and shared are key words  Technology enhancement is moving at a faster pace: • Wireless data-rate is catching up with wired • Computing power is high and increasing while becoming available to all

 Human society is maturing  Business models are changing very fast: 10 to 2 years to 6 months and now 3 months  Operators business: conventional, data only, take a ride

Page 28

© NEC Corporation 2009

NEC Confidential

Thoughts: Security? ▐ Potentially faster cycle for algorithm development ▐ Need of increased awareness and concern of privacy and security ▐ Necessity of ever more system security consideration  Top-to-bottom  End-to-end

▐ Better privacy control mechanisms ▐ Choice of level of security ▐ Fast threat analysis together with proper understanding of risk and input to security solution ▐ …….

Page 29

© NEC Corporation 2009

NEC Confidential

Conclusions

Conclusions ▐ Today we took a look at Evolved Packet System (EPS) security – the next generation of mobile communications  For more: write to me, check my book or check the 3GPP technical specification TS 33.401

▐ Some of the topics currently 3GPP is working on:  Taking care of unsolicited communication (I am the rapporteur in 3GPP)  Relay node security – IMT-advanced etc.

▐ Global ICT Standardisation Forum for India (GISFI) is working on several security topics starting from Indian requirements ▐ Penetration of security understanding should increase which will bring with it more demand on security itself ▐ Complete system consideration of security from the beginning will become even more necessary – Bringing potential changes in business arena – providers of service at different layers working together?

Page 31

© NEC Corporation 2009

NEC Confidential

….the book ▐ Security in Next Generation Mobile Networks: SAE/LTE and WiMAX Anand R. Prasad and Seung-Woo Seo Publisher: River Publishers Available: August 2011 ISBN: 978-87-92329-63-9 Table of Contents: Authors:

1. 2. 3. 4. 5. 6.

Introduction to NGMN Security Overview Standardization: 3GPP, IEEE 802.16 and WiMAX SAE/LTE Security Security in IEEE 802.16e / WiMAX Security for Other Systems: MBMS, M2M, Femto

Contact: Page 32

© NEC Corporation 2009

NEC Confidential

Abbreviations 3GPP AS AuC AV DNS

Third Generation Partnership Project Access Stratum (RRC and UP) Authentication Center Autentication Vector Domain Name System

EIR

Equipment Identity Register

EPC

Evolved Packet Core

NAS NGMN PCRF PDCP PDN PDNGW or PGW PLMN

ePDG

evolved Packet Data Gateway

PUCI

E-UTRAN Evolved-UTRAN RAN GERAN GSM EDGE Radio Access Network RLC GISFI Global ICT Standardisation Forum for India RRC HLR

Home Location Register

SAE

HSS IMS IP LTE MAC ME MME

Home Subscriber Subsystem IP Multemedia Subsystem Internet Protocol Long-Term Evolution (or E-UTRAN for Medium Access Control Mobile Equipment Mobility Management Entity

SPIT SGSN SGW UE UP USIM UTRAN

Page 34

© NEC Corporation 2009

NEC Confidential

Non Access Stratum Next Generation Mobile Network Policy and Charging Rules Function Packet Data Control Protocol Packet Data network Packet Data Network Gateway Public Land-Mobile Network Protection against Unsolicited Communication in IMS Radio Access Network Radio Link Control Radio Resource Control System Architecture Evolution (or EPC for core network) Spam over Internet Telephony Serving GPRS Support Node Serving Gateway User Equipment User Plane Universal Subscriber Identity Module UMTS Terrestrial Radio Access Network

Security Overview

(IV)

User Application

Provider Application

(I) (III)

(I)

USIM

HE (II)

(I)

ME

(I)

(I)

AN

SN (II)

Transport stratum

(I)

▐ Network access security (I) ▐ Network domain security (II) ▐ User domain security (III) Page 35

© NEC Corporation 2009

▐ Application domain security (IV) ▐ Visibility and configurability of security (V)

NEC Confidential

Application stratum

Home stratum/ Serving Stratum

EPS AKA Allocated by MME after NAS ciphering S-TMSI (short GUTI) used for efficient radio resource usage e.g. service req., paging (GUTI allocation in 23.401)

USIM

eNB

MME

HSS

RRC connection setup Start of NAS communication Authentication data request

GUTI or IMSI

[IMSI, SNID (MCC+MNC), Network Type] K Pre-computed or computed on demand Recommended to fetch only 1 AV

RESUSIM ,CK, IK, AUTN

3 bits for 7 values. 111 from network to UE reserved other way it signals deletion

AKA CK || IK

K_ASME RAND, AUTN, eKSI

KDF

Authentication data response AVs(1….n) [RAND, XRESHSS ,KASME , AUTN]

K RAND

AKA

RESUSIM ,CK, IK, AUTN

AUTN acceptable?

Page 36

XRESHSS ? = RESUSIM

RESUSIM

© NEC Corporation 2009

RAND

NEC Confidential

HSS delete all AVs CK,IK never leave HSS

SNID

Other Security Aspects ▐ Network domain control plane protection

 Protection of IP based control plane will be done using 33.210. If the interfaces are trusted then such protection is not required.  Thus for S1-MME and X2-C • • • •

Implement IPsec ESP [RFC 4303 and TS 33.210] IKEv2 certificate based authentication [TS 33.310] Tunnel mode IPsec mandatory on eNB while SEG can be used in core Transport mode is optional

▐ Backhaul link user plane protection

 Protection of user plane will be done using 33.210. If the interfaces are trusted then such protection is not required.  S1-U and X2-U

• IPsec ESP as in RFC 4303 and TS 33.210 with confidentiality, integrity and replay protection • IKEv2 certificate based authentication [TS 33.310] • Tunnel mode IPsec mandatory on eNB while SEG can be used in core • Transport mode is optional

▐ Management plane protection

 Same as S1-U and X2-U  There is no management traffic over X2

Page 37

© NEC Corporation 2009

NEC Confidential