What Is 3G
What Is 3G
What Is 3G
Used
In
3G Technology
3G Technology:-
3G is the third generation of wireless technologies. It comes
with enhancements over previous wireless technologies, like
high-speed transmission, advanced multimedia access and
global roaming.
3G is mostly used with mobile phones and handsets as a
means to connect the phone to the Internet or other IP
networks in order to make voice and video calls, to download
and upload data and to surf the net.
Message authentication and replay inhibition of the mobile’s
ciphering capabilities allows the network to verify that
encryption has not been suppressed by an attacker.
The presence of a sequence number in the challenge allows
the USIM to verify the freshness of the cipher key to help
guard against forced re-use of a compromised authentication
vector.
However, the architecture does not protect against force use
of compromised authentication vectors, which have not yet
been used to authenticate the USIM. Thus, the network is
still vulnerable to attacks using compromised authentication
vectors.
Integrity protection of critical signaling messages protects
against this attack. More specifically, data authentication and
replay inhibition of the connection set-up request allows the
serving network to verify that the request is legitimate.
In addition, periodic integrity protected messages during a
connection helps protect against hijacking of un-enciphered
connections after the initial connection establishment.
Introduction:-
Third generation (3G) networks were conceived from the
Universal Mobile Telecommunications Service (UMTS)
concept for high speed networks for enabling a variety of
data intensive applications.
3G systems consist of the two main standards, CDMA2000
and W-CDMA, as well as other 3G variants such as NTT
DoCoMo’s Freedom of Mobile Multimedia Access (FOMA)
and Time Division Synchronous Code Division Multiple
Access (TD-SCDMA) used primarily in China.
2) Overbilling Attack:-
Another major threat will be an attack called “Overbilling”.
This involves hijacking the IP of the subscriber and using
it for the attackers own purposes. Eventually, this leads to
the legitimate user being billed for activity which they did
not undertake.
The risks of attacks and other threats to 3G will keep
increasing as technology keeps developing. There is a
need for a strong, multilayered security which will help in
protecting our networks and consumers, not just in today's
3G world, but also in the future with IMS (IP Multimedia
Subsystem). There should be deployment of various
firewalls, IDPs, VPNs and other such security products.
Security:-
3G networks offer greater security than their 2G
predecessors. By allowing the UE (User Equipment) to
authenticate the network it is attaching to, the user can be
sure the network is the intended one and not an
impersonator. 3G networks use the KASUMI block crypto
instead of the older A5/1 stream cipher. However, a number
of serious weaknesses in the KASUMI cipher have been
identified.
3G Security Principles:-
It was agreed that any new security architecture must be based
on an evolution of GSM and must adopt four basic principles:-
3G security model:-
The class deals with the set of features that enables the
user to inform him whether a security mechanism is in
operation or not and whether the use and provision of
services should depend on the security mechanism.