Upload
guestb2cc28
View
3.773
Download
1
Tags:
Embed Size (px)
DESCRIPTION
CDMA Security is most valuable and most secure technology.It provide secure data communication and data transfer.
Citation preview
CDMA SECURITY
-AN INTELLIGENCE
GUIDED BY- PROF. BHARATI S. AINAPURE
PRESENTED BY-MUKESH KUMAR
INTRODUCTION
Wireless communication of information.
Originated from military applications and cryptography.
For military communications where information transmission heavily
relies on wireless networks (for instance, from aircraft to aircraft, from
aircraft to ground control center, etc.), security and reliability of the
wireless communication systems is of number one priority, especially in
national defense and emergency response to abrupt enemy attacks
SECURITY OVERVIEW
Protecting corporate network assets is an on-going task for IT
professionals.
Some of the top security issues:-
1). Unauthorized systems and network access.
2). Theft of intellectual property and confidential business
information.
3). Internal and external sabotage .
NETWORK AND TECHNOLOGY OVERV IEW
It has Same components and technology used in corporate
network.
Difference between these two is found only in the access
network. In access network high security and access protocols
become paramount.
CDMA2000 1XRTT AND 1XEV-DO
More mobility , secure, high-speed access , and an extension of
applications across the enterprise.
Third-generation (3G) wireless networks, known as CDMA2000
The first phase of CDMA2000 is called 1xRTT.
a). Maximum theoretical data rates of 144 Kbps (downlink)
and 144 Kbps (uplink) ,Excellent voice capacity .
CDMA2000 1XRTT AND 1XEV-DO
Cdma2000 1xEV-DO Revision 0 (Rev. 0).
a). Increases the downlink maximum theoretical data rate to
2.4 Mbps, with an average data rate between 400 and 700 Kbps.
b). Supports Quality of Service (QoS) .
c). boosts the maximum theoretical uplink speed to 1.8 Mbps
(average 500–800 Kbps).
ACCESS NETWORK
Two types of access networks:- 1xRTT and 1xEV-DO .
It is the mobile station’s entry point into the network .
It maintains the communications link between the mobile station
and the core network.
It facilitates security by allowing only authorized mobile stations
to access the network.
ELEMENTS OF ACCESS NETWORK
The AN is composed of the following elements: -
a).Base Transceiver Station:-physically composed of antennas and
towers.
b).Packet Control Function:-maintains the “connection state”
between the access network and mobile stations.
c).Radio Network Controller/Base Station Controller:-packet
transmission on the air interface and manage connection between BTS’s.
ELEMENTS OF ACCESS NETWORK
CORE NETWORK
Acts as the gateway between the access network and the Internet
or enterprise private networks .
It provides authentication, authorization, and accounting (AAA)
services, provides access to network services, and manages IP
addresses .
ELEMENTS OF CORE NETWORK
The core network comprises the following elements:-
a).PDSN/Foreign Agent:-The PDSN is the gateway between
the access network and the core network.
b).AAA/Home Agent:-The AAA and the home agent (HA)
are used for authentication, authorization, and accounting for data
services .
SECURITY-CDMA NETWORK
The security protocols with CDMA-IS-41 networks are among the best in
the industry.
By design, CDMA technology makes interpretation of data very difficult.
Unique to CDMA systems, is the 42-bit PN (Pseudo-Random Noise)
Sequence called “Long Code” to scramble voice and data.
On the forward link , data is scrambled at a rate of 19.2 Kilo symbols per
second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288
Mega chips per second (Mcps).
SECURITY-CDMA NETWORK
CDMA network security protocols rely on a 64-bit authentication
key (A-Key) and the Electronic Serial Number (ESN) of the mobile
. The key factor for CDMA network is:-
Authentication:-The mobile uses the SSD_A and the broadcast
RAND* as inputs to generate an 18-bit authentication signature
(AUTH_SIGNATURE), and sends it to the base station.
SECURITY-CDMA NETWORK
Voice, Signalling, and Data Privacy:-The mobile uses the
SSD_B and to generate a Private Long Code Mask(derived from an
intermediate value called Voice Privacy Mask.
By design, all CDMA guided devices use a unique PN (Pseudo-
random Noise) code for spreading the signal, which makes it
difficult for the signal to be intercepted.
AIR INTERFACE (PHYSICAL LAYER)
Mobile stations rely on radio technology to access the network.
Security is of concern when using radio technology, but with the
advances in radio technology.
So several air interface security mechanisms have been
developed to keep signals secure while increasing access
capability.
AIR INTERFACE TECHNOLOGIES
Three types of technology :
AIR INTERFACE SECURITY BENEFITS
CDMA security works on (direct sequence spread spectrum)DSSS technology.
DSSS technology employs techniques that deliberately distribute or “spread”
data over a frequency domain.
The low probability of interception, demodulation difficulty, and anti-
jamming/interference benefits of DSSS.CDMA technologies are why the
military has used it for so many years.
This is also why CDMA technology is inherently more
secure than competing wireless technologies.
EXAMPLE :
.These are four mutually
orthogonal digital signals.
.These vectors will be
assigned to individual users
and are called the "code",
"chipping code" or "chip
code
EXAMPLE :
Each user is associated with a different code, say v.
ASSUMPTION: 1).If the data to be transmitted is a digital zero, then the
actual bits transmitted will be –v. and,
2). if the data to be transmitted is a digital one, then the actual bits
transmitted will be v.
.so If v=(1,–1), and the data that the user wishes to transmit is (1, 0, 1, 1)
this would correspond to (v, –v, v, v) which is then constructed in binary as
((1,–1),(–1,1),(1,–1),(1,–1).
EXAMPLE
If sender0 has code (1,–1) and data (1, 0, 1 ,1), and sender1 has
code (1,1) and data (0,0,1,1), and both senders transmit
simultaneously.
Because signal0 and signal1 are transmitted at the same time into
the air, they add to produce the raw signal:-(1,–1,–1,1,1,–1,1,–1) +
(–1,–1,–1,–1,1,1,1,1) = (0,–2,–2,0,2,0,2,0).
S t e p E n c o d e s e n d e r 0
E n c o d e s e n d e r 1
0 v e c t o r 0 = ( 1 ,– 1 ) , d a t a 0 = ( 1 , 0 ,1 , 1 ) = ( v, –v, v, v )
v e c t o r 1 = ( 1 ,1 ) , d a t a 1 = ( 0 ,0 , 1 , 1 ) = ( – v, -v, v, v )
1 e n c o d e 0 = ve c t o r 0 . d a t a0
e n c o d e 1 = v ec t o r 1 . d a t a 1
2 e n c o d e 0 = ( 1, – 1 ) . ( 1 , –1 , 1 , 1 )
e n c o d e 1 = ( 1 ,1 ) . ( – 1 , –1 , 1 , 1 )
3 e n c o d e 0 = ( (1 , – 1 ) , ( –1 , 1 ) , ( 1 , – 1 ) ,( 1 ,– 1 ) )
e n c o d e 1 = ( ( –1 , – 1 ) , ( – 1 , –1 ) , ( 1 , 1 ) ,( 1 , 1 ) )
4 s i g n a l 0 = ( 1 ,– 1 , – 1 , 1 , 1 , –1 , 1 , – 1 )
s i g n a l 1 = ( –1 , – 1 ,– 1 , –1 , 1 , 1 , 1 , 1 )
S t e p D e c o d e s e n d e r 0
D e c o d e s e n d e r 1
0 v e c t o r 0 = ( 1 ,– 1 ) , p a tt e r n = ( 0 ,– 2 , –2 , 0 , 2 , 0 , 2 , 0 )
v e c t o r 1 = ( 1 ,1 ) , p a tt e r n =( 0 ,–2 , 2 , 0 , 2 , 0 , 2 ,0 )
1 d e c o d e 0 = v ec t o r 0 . p a tt er n
d e c o d e 1 = v ec t o r 1 . p a tt er n
2 d e c o d e 0 = ( (0 , – 2 ) , ( –2 , 0 ) , ( 2 , 0 ) ,( 2 , 0 ) ) . ( 1 , – 1 )
d e c o d e 1 = ( (0 , – 2 ) , ( –2 , 0 ) , ( 2 , 0 ) ,( 2 , 0 ) ) . ( 1 , 1 )
3 d e c o d e 0 = ( (0 + 2 ) , ( –2 + 0 ) , ( 2 + 0 ) ,( 2 + 0 ) )
d e c o d e 1 = ( (0 – 2 ) , ( –2 + 0 ) , ( 2 + 0 ) ,( 2 + 0 ) )
4 d a t a 0 = ( 2 , –2 , 2 , 2 ) , m e a n i n g ( 1 , 0 , 1 , 1 )
d a t a 1 = ( – 2 , –2 , 2 , 2 ) , m e a n i n g ( 0 , 0 , 1 , 1 )
EXAMPLE:
ENCODER SIDE DECODER SIDE
Efficient Practical utilization of
Fixed Frequency Spectrum.
Flexible Allocation of Resources
Privacy protection in CDMA
due to anti-jamming capabilities of
PN sequences
We can change somewhat the
flow rate of voice and signal by
knowing the ESN AND MIN.
ADVANTAGE AND WEAKNESS
ADVANTAGE WEAKNESS
FUTURE AND RESEARCH
Continue work on verifying composition of security tunnels
Currently thinking about attacks so now a days AES algorithm
is used.
Add the capability to reuse tunnels.
seemed easy at first, but may require some major restructuring
of the design.
RESEARCH PLAN
iRespond is a device that will provide an immediate response to
a certain location.
CONCLUSION
It provides secure wireless communication.
Its uplink and downlink communication , make it better than
others.
It is hard to detect , decode.
Technology makes it better than other.
It is better , but it is still secondary.
REFERENCES
Viterbi, Andrew J. (1995). CDMA: Principles of Spread Spectrum Communication
(1st Ed.). Prentice Hall PTR. ISBN0201633744.
"Telecom-Resource-CDMA“ . Telecom-Resources. Undated.
http://www.freewebs.com/telecomm/cdma.html. Retrieved 2006-04-09.
Lohninger , Hans (2005-12-17). "Direct Sequence CDMA Simulation". Learning by
Simulations. http://www.vias.org/simulations/simusoft_dscdma.html. Retrieved 2006-
04-09.
Authentication and Security in Mobile Phones by Greg Rose, Qualcomm Inc.,
Australia
THANK YOU !