Security and IP-based 3G wireless networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Telecommunication networks are evolving from closed systems with limited, standardized services, to open systems which will allow great creativity in building and deploying new services. These systems will heavily leverage Internet technology in an effort to create this open environment. This evolution is being aggressively pursued by Wireless Service Providers (WSPs). Along with the benefits of these networks come increasingly high risks of a variety of attacks that may compromise security. Current, so called second generation (2G) wireless telecommunication networks are implemented using standardized control protocols for user and device authentication, mobility management, session control and services control. These networks are closed in the sense that control messages are exchanged on a private packet-switched network based on the Signaling System No. 7 standards. Because of their closed nature, there are few successful attacks on these networks. The next, so called third generation (3G) wireless telecommunication networks are migrating towards IP technology, with the ultimate goal being an all-IP network. Standards for these systems, called the IP Multimedia Subsystem (IMS) are being defined by the Third Generation Partnership Projects (3GPP and 3GPP2). These networks will use IP for transport of information, and Internet protocols such as the Session Initiation Protocol (SIP) and Mobile IP, for session control and mobility management. These networks open the possibility for IP-based services and must interwork with 2G networks. Because new services will be introduced in the IP-domain of these networks, new attacks on 3G networks are possible. Because IP networks are more accessible than SS7 networks, the control portion of the 3G networks is now more vulnerable to attack. These attacks may be remote denial of service attacks, or attacks that target the integrity of specific services. The means of the attack may vary depending on the interworking model used and the service being offered. In this talk we discuss the different security risks in IP-based 3G networks, different attack types, and the trade-offs of high performance, open network architectures versus secure network infrastructure.

Original languageEnglish (US)
Title of host publicationProceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005
Number of pages1
DOIs
StatePublished - Dec 1 2005
Event14th International Conference on Computer Communications and Networks, ICCCN 2005 - San Diego, CA, United States
Duration: Oct 17 2005Oct 19 2005

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
Volume2005
ISSN (Print)1095-2055

Other

Other14th International Conference on Computer Communications and Networks, ICCCN 2005
CountryUnited States
CitySan Diego, CA
Period10/17/0510/19/05

Fingerprint

Wireless networks
Telecommunication networks
Network protocols
Internet protocols
Packet networks
Open systems
Network architecture
Authentication
Computer systems
Internet

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

La Porta, T. F. (2005). Security and IP-based 3G wireless networks. In Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005 [1523849] (Proceedings - International Conference on Computer Communications and Networks, ICCCN; Vol. 2005). https://doi.org/10.1109/ICCCN.2005.1523849
La Porta, Thomas F. / Security and IP-based 3G wireless networks. Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005. 2005. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).
@inproceedings{fd779fa560714bdba0ba1eb0cb04332c,
title = "Security and IP-based 3G wireless networks",
abstract = "Telecommunication networks are evolving from closed systems with limited, standardized services, to open systems which will allow great creativity in building and deploying new services. These systems will heavily leverage Internet technology in an effort to create this open environment. This evolution is being aggressively pursued by Wireless Service Providers (WSPs). Along with the benefits of these networks come increasingly high risks of a variety of attacks that may compromise security. Current, so called second generation (2G) wireless telecommunication networks are implemented using standardized control protocols for user and device authentication, mobility management, session control and services control. These networks are closed in the sense that control messages are exchanged on a private packet-switched network based on the Signaling System No. 7 standards. Because of their closed nature, there are few successful attacks on these networks. The next, so called third generation (3G) wireless telecommunication networks are migrating towards IP technology, with the ultimate goal being an all-IP network. Standards for these systems, called the IP Multimedia Subsystem (IMS) are being defined by the Third Generation Partnership Projects (3GPP and 3GPP2). These networks will use IP for transport of information, and Internet protocols such as the Session Initiation Protocol (SIP) and Mobile IP, for session control and mobility management. These networks open the possibility for IP-based services and must interwork with 2G networks. Because new services will be introduced in the IP-domain of these networks, new attacks on 3G networks are possible. Because IP networks are more accessible than SS7 networks, the control portion of the 3G networks is now more vulnerable to attack. These attacks may be remote denial of service attacks, or attacks that target the integrity of specific services. The means of the attack may vary depending on the interworking model used and the service being offered. In this talk we discuss the different security risks in IP-based 3G networks, different attack types, and the trade-offs of high performance, open network architectures versus secure network infrastructure.",
author = "{La Porta}, {Thomas F.}",
year = "2005",
month = "12",
day = "1",
doi = "10.1109/ICCCN.2005.1523849",
language = "English (US)",
isbn = "0780394283",
series = "Proceedings - International Conference on Computer Communications and Networks, ICCCN",
booktitle = "Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005",

}

La Porta, TF 2005, Security and IP-based 3G wireless networks. in Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005., 1523849, Proceedings - International Conference on Computer Communications and Networks, ICCCN, vol. 2005, 14th International Conference on Computer Communications and Networks, ICCCN 2005, San Diego, CA, United States, 10/17/05. https://doi.org/10.1109/ICCCN.2005.1523849

Security and IP-based 3G wireless networks. / La Porta, Thomas F.

Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005. 2005. 1523849 (Proceedings - International Conference on Computer Communications and Networks, ICCCN; Vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Security and IP-based 3G wireless networks

AU - La Porta, Thomas F.

PY - 2005/12/1

Y1 - 2005/12/1

N2 - Telecommunication networks are evolving from closed systems with limited, standardized services, to open systems which will allow great creativity in building and deploying new services. These systems will heavily leverage Internet technology in an effort to create this open environment. This evolution is being aggressively pursued by Wireless Service Providers (WSPs). Along with the benefits of these networks come increasingly high risks of a variety of attacks that may compromise security. Current, so called second generation (2G) wireless telecommunication networks are implemented using standardized control protocols for user and device authentication, mobility management, session control and services control. These networks are closed in the sense that control messages are exchanged on a private packet-switched network based on the Signaling System No. 7 standards. Because of their closed nature, there are few successful attacks on these networks. The next, so called third generation (3G) wireless telecommunication networks are migrating towards IP technology, with the ultimate goal being an all-IP network. Standards for these systems, called the IP Multimedia Subsystem (IMS) are being defined by the Third Generation Partnership Projects (3GPP and 3GPP2). These networks will use IP for transport of information, and Internet protocols such as the Session Initiation Protocol (SIP) and Mobile IP, for session control and mobility management. These networks open the possibility for IP-based services and must interwork with 2G networks. Because new services will be introduced in the IP-domain of these networks, new attacks on 3G networks are possible. Because IP networks are more accessible than SS7 networks, the control portion of the 3G networks is now more vulnerable to attack. These attacks may be remote denial of service attacks, or attacks that target the integrity of specific services. The means of the attack may vary depending on the interworking model used and the service being offered. In this talk we discuss the different security risks in IP-based 3G networks, different attack types, and the trade-offs of high performance, open network architectures versus secure network infrastructure.

AB - Telecommunication networks are evolving from closed systems with limited, standardized services, to open systems which will allow great creativity in building and deploying new services. These systems will heavily leverage Internet technology in an effort to create this open environment. This evolution is being aggressively pursued by Wireless Service Providers (WSPs). Along with the benefits of these networks come increasingly high risks of a variety of attacks that may compromise security. Current, so called second generation (2G) wireless telecommunication networks are implemented using standardized control protocols for user and device authentication, mobility management, session control and services control. These networks are closed in the sense that control messages are exchanged on a private packet-switched network based on the Signaling System No. 7 standards. Because of their closed nature, there are few successful attacks on these networks. The next, so called third generation (3G) wireless telecommunication networks are migrating towards IP technology, with the ultimate goal being an all-IP network. Standards for these systems, called the IP Multimedia Subsystem (IMS) are being defined by the Third Generation Partnership Projects (3GPP and 3GPP2). These networks will use IP for transport of information, and Internet protocols such as the Session Initiation Protocol (SIP) and Mobile IP, for session control and mobility management. These networks open the possibility for IP-based services and must interwork with 2G networks. Because new services will be introduced in the IP-domain of these networks, new attacks on 3G networks are possible. Because IP networks are more accessible than SS7 networks, the control portion of the 3G networks is now more vulnerable to attack. These attacks may be remote denial of service attacks, or attacks that target the integrity of specific services. The means of the attack may vary depending on the interworking model used and the service being offered. In this talk we discuss the different security risks in IP-based 3G networks, different attack types, and the trade-offs of high performance, open network architectures versus secure network infrastructure.

UR - http://www.scopus.com/inward/record.url?scp=33748339809&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33748339809&partnerID=8YFLogxK

U2 - 10.1109/ICCCN.2005.1523849

DO - 10.1109/ICCCN.2005.1523849

M3 - Conference contribution

AN - SCOPUS:33748339809

SN - 0780394283

SN - 9780780394285

T3 - Proceedings - International Conference on Computer Communications and Networks, ICCCN

BT - Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005

ER -

La Porta TF. Security and IP-based 3G wireless networks. In Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005. 2005. 1523849. (Proceedings - International Conference on Computer Communications and Networks, ICCCN). https://doi.org/10.1109/ICCCN.2005.1523849