Extending the GSM/3G Key Infrastructure

advertisement
Extending the GSM/3G Key
Infrastructure
DIMACS Workshop on Mobile and Wireless Security
November 3, 2004
Scott B. Guthery
Mary J. Cronin
CTO, Mobile-Mind
Professor of Management
Boston College
Sguthery@mobile-mind.com
Cronin@bc.edu
1
Outline
• SIM for Mobile Network Authentication
• SIM for Internet Authentication
• SIM for Local Authentication
2
Subscriber Identity Module
• Integral part of GSM security from the start
• Holds secret key Ki
– other copy held by subscriber’s network operator
• 8-bit processor, 8KB EEPROM, file system,
cryptographic algorithms
Identity token with a wireless connection to an
authentication and billing service
3
GSM/3G Authentication
1) Identity
SIM
Ki
4) Challenge
5) Response
2) Identity
Visited
Network
3) Challenge
& Response
Home
Network
Ki
• Roaming is the stepping off point for
extending the GSM/3G key infrastructure
• Visited network authenticates without being in
possession of Ki
4
SIM for Internet Authentication
• EAP-SIM uses SIM for Internet authentication
– visited network is an EAP authenticator
–
draft-haverinen-pppext-eap-sim-14.txt
• Uses GSM/3G authentication but generates a
stronger session key
Internet Service
SIM
Ki
5
EAP
Authenticator
Home
Network
Ki
SIM Toolkit
• SIM gives commands to the handset
– display text, get key hit, send SMS, block call
• Operator controls loading of applications
– GlobalPlatform architecture used to manage keys
for non-operator applications
Application 1
Application 2 STK
Application 3
6
Handset
SIM for Local Authentication
• SIM-based authentication and authorization
– visited network is a merchant or a door
• SIM-based cryptographic services
– session keys, certificates, signing, tickets, etc.
Local Connections
(IR, Bluetooth, etc.)
Operator
SIM
7
Handset
3G Network
Other
SIM
User-Equipment Split
• SIM is in the device needing signing and
authentication services
• All that’s left of the mobile communication
network is the extended key infrastructure
SIM A
SIM B
SIM C
8
Handset
Network
Operator
Business Models for SIM Security Extension
Theory, Reality and Lessons Learned
• Theory: Compelling business and revenue
opportunities based on leveraging SIM security
– Enormous global installed base of active SIM cards
• Over 800 million GSM and 3G handsets and subscribers
– Well-established international standards for SIM
applications and key infrastructure
• Well documented architecture and tools for development
using SIM Application Toolkit and Java Card™ platform
– Multiple business models from different industries
(banking, retail, media, IT, health, etc.) in search of
strong mobile security solution will embrace the SIM
9
Three Potential Business Cases
• SIM-hosted and authenticated non-telephony mcommerce applications and services
– Allow trusted third parties to load applications onto the SIM
card and share the existing key infrastructure to authenticate
customers and authorize transactions via the wireless public
network
• SIM-enabled use of mobile handset for authenticated
and authorized transactions via the wireless public
network
• Embedded SIMs for authorization of users or devices
attached to any network, particularly WiFi
10
SIM-Hosted M-Commerce Applications
• Business Model: Multiple applications are stored on a
single SIM card to allow subscriber to conduct secure
banking, make and pay for purchases, download and
store value, tickets, etc to the SIM
– Third party consumer and enterprise applications both
supported
• SIM application provider gets share of projected $60 billion plus
in m-commerce transactions
• Reality as of 2004
– Technical requirements are in place
• Almost all recent SIMs are multi-application Java Card™ SIMs
• Over 260 million of them are Global Platform compliant
– SIM-hosted applications have been scarce
• Limited to small mobile banking pilots in Europe and Asia
• Majority of booming m-commerce business has moved to
handset downloads and back end server-based security systems
11
SIM-Enabled Security for Mobile Devices
• Business Model: Dual-slot handsets provide external
slot for smart card to conduct secure transactions and
move value via the SIM, making the mobile a cash
dispenser, a ticket, a POS, etc.
– 1999 launch of dual slot phones to great fanfare
• Datamonitor projected over 32 million such phones in use by 2003
• All major handset makers announced plans to manufacture them
• Reality as of 2004
– Dual slot phones are hard to find collectors’ items
– Revival of the model via “add-on” module for standard GSM
phone to create a mobile POS for developing markets
• Way Systems has some initial traction with this approach for China
12
SIM Authentication in Non-Telephony Networks
• Business Model: Embed SIM in WiFi and other
networked devices or provide SIM-USB token to
subscribers for authentication and payment for WiFi
access and roaming
– One solution for problems with 802.11 security
– Potential for portability and roaming on different networks
– Possible integration with wireless subscriber accounts
• Reality as of 2004
– WLAN Smart Card Consortium attempting to define
standards
– Commercial deployments increasing but still in early stages
•
•
•
•
13
Transat solution launches with 3,500 hotspots in the UK (4/04)
Orange implements in Switzerland (3/04)
Tartara demonstrates solution with Verisign (3/04)
TSI demonstrates solution with Boingo Wireless (5/04)
Conclusion: Still Searching for Clear
Business Case for SIM Extension
• Limited applications to date outside of wireless
telephony and some notable business failures such
as dual-slot handsets
– The combined business drivers of a billion SIMs, a rapidly growing
m-commerce market and unsolved mobile security issues continue
to bring new players and approaches to the table
• Lesson learned: Wireless carriers have made
controlling and guarding the SIM key infrastructure a
priority over increasing revenues through extension
– Carriers have the ability to cut off third party access to the
SIM platform
– WiFi and non-telephony network authentication looks like a
good match for the SIM key infrastructure, but long-term
models may require wireless carrier participation
14
Download