27
CDMA SECURITY -AN INTELLIGENCE GUIDED BY- PROF. BHARATI S. AINAPURE PRESENTED BY-MUKESH KUMAR

Cdma Security

Embed Size (px)

DESCRIPTION

CDMA Security is most valuable and most secure technology.It provide secure data communication and data transfer.

Citation preview

Page 1: Cdma Security

CDMA SECURITY

-AN INTELLIGENCE

GUIDED BY- PROF. BHARATI S. AINAPURE

PRESENTED BY-MUKESH KUMAR

Page 2: Cdma Security

INTRODUCTION

Wireless communication of information.

Originated from military applications and cryptography.

For military communications where information transmission heavily

relies on wireless networks (for instance, from aircraft to aircraft, from

aircraft to ground control center, etc.), security and reliability of the

wireless communication systems is of number one priority, especially in

national defense and emergency response to abrupt enemy attacks

Page 3: Cdma Security

SECURITY OVERVIEW

Protecting corporate network assets is an on-going task for IT

professionals.

Some of the top security issues:-

1). Unauthorized systems and network access.

2). Theft of intellectual property and confidential business

information.

3). Internal and external sabotage .

Page 4: Cdma Security

NETWORK AND TECHNOLOGY OVERV IEW

It has Same components and technology used in corporate

network.

Difference between these two is found only in the access

network. In access network high security and access protocols

become paramount.

Page 5: Cdma Security

CDMA2000 1XRTT AND 1XEV-DO

More mobility , secure, high-speed access , and an extension of

applications across the enterprise.

Third-generation (3G) wireless networks, known as CDMA2000

The first phase of CDMA2000 is called 1xRTT.

a). Maximum theoretical data rates of 144 Kbps (downlink)

and 144 Kbps (uplink) ,Excellent voice capacity .

Page 6: Cdma Security

CDMA2000 1XRTT AND 1XEV-DO

Cdma2000 1xEV-DO Revision 0 (Rev. 0).

a). Increases the downlink maximum theoretical data rate to

2.4 Mbps, with an average data rate between 400 and 700 Kbps.

b). Supports Quality of Service (QoS) .

c). boosts the maximum theoretical uplink speed to 1.8 Mbps

(average 500–800 Kbps).

Page 7: Cdma Security

ACCESS NETWORK

Two types of access networks:- 1xRTT and 1xEV-DO .

It is the mobile station’s entry point into the network .

It maintains the communications link between the mobile station

and the core network.

It facilitates security by allowing only authorized mobile stations

to access the network.

Page 8: Cdma Security

ELEMENTS OF ACCESS NETWORK

The AN is composed of the following elements: -

a).Base Transceiver Station:-physically composed of antennas and

towers.

b).Packet Control Function:-maintains the “connection state”

between the access network and mobile stations.

c).Radio Network Controller/Base Station Controller:-packet

transmission on the air interface and manage connection between BTS’s.

Page 9: Cdma Security

ELEMENTS OF ACCESS NETWORK

Page 10: Cdma Security

CORE NETWORK

Acts as the gateway between the access network and the Internet

or enterprise private networks .

It provides authentication, authorization, and accounting (AAA)

services, provides access to network services, and manages IP

addresses .

Page 11: Cdma Security

ELEMENTS OF CORE NETWORK

The core network comprises the following elements:-

a).PDSN/Foreign Agent:-The PDSN is the gateway between

the access network and the core network.

b).AAA/Home Agent:-The AAA and the home agent (HA)

are used for authentication, authorization, and accounting for data

services .

Page 12: Cdma Security

SECURITY-CDMA NETWORK

The security protocols with CDMA-IS-41 networks are among the best in

the industry.

By design, CDMA technology makes interpretation of data very difficult.

Unique to CDMA systems, is the 42-bit PN (Pseudo-Random Noise)

Sequence called “Long Code” to scramble voice and data.

On the forward link , data is scrambled at a rate of 19.2 Kilo symbols per

second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288

Mega chips per second (Mcps).

Page 13: Cdma Security

SECURITY-CDMA NETWORK

CDMA network security protocols rely on a 64-bit authentication

key (A-Key) and the Electronic Serial Number (ESN) of the mobile

. The key factor for CDMA network is:-

Authentication:-The mobile uses the SSD_A and the broadcast

RAND* as inputs to generate an 18-bit authentication signature

(AUTH_SIGNATURE), and sends it to the base station.

Page 14: Cdma Security

SECURITY-CDMA NETWORK

Voice, Signalling, and Data Privacy:-The mobile uses the

SSD_B and to generate a Private Long Code Mask(derived from an

intermediate value called Voice Privacy Mask.

By design, all CDMA guided devices use a unique PN (Pseudo-

random Noise) code for spreading the signal, which makes it

difficult for the signal to be intercepted.

Page 15: Cdma Security

AIR INTERFACE (PHYSICAL LAYER)

Mobile stations rely on radio technology to access the network.

Security is of concern when using radio technology, but with the

advances in radio technology.

So several air interface security mechanisms have been

developed to keep signals secure while increasing access

capability.

Page 16: Cdma Security

AIR INTERFACE TECHNOLOGIES

Three types of technology :

Page 17: Cdma Security

AIR INTERFACE SECURITY BENEFITS

CDMA security works on (direct sequence spread spectrum)DSSS technology.

DSSS technology employs techniques that deliberately distribute or “spread”

data over a frequency domain.

The low probability of interception, demodulation difficulty, and anti-

jamming/interference benefits of DSSS.CDMA technologies are why the

military has used it for so many years.

This is also why CDMA technology is inherently more

secure than competing wireless technologies.

Page 18: Cdma Security

EXAMPLE :

.These are four mutually

orthogonal digital signals.

.These vectors will be

assigned to individual users

and are called the "code",

"chipping code" or "chip

code

Page 19: Cdma Security

EXAMPLE :

Each user is associated with a different code, say v.

ASSUMPTION: 1).If the data to be transmitted is a digital zero, then the

actual bits transmitted will be –v. and,

2). if the data to be transmitted is a digital one, then the actual bits

transmitted will be v.

.so If v=(1,–1), and the data that the user wishes to transmit is (1, 0, 1, 1)

this would correspond to (v, –v, v, v) which is then constructed in binary as

((1,–1),(–1,1),(1,–1),(1,–1).

Page 20: Cdma Security

EXAMPLE

If sender0 has code (1,–1) and data (1, 0, 1 ,1), and sender1 has

code (1,1) and data (0,0,1,1), and both senders transmit

simultaneously.

Because signal0 and signal1 are transmitted at the same time into

the air, they add to produce the raw signal:-(1,–1,–1,1,1,–1,1,–1) +

(–1,–1,–1,–1,1,1,1,1) = (0,–2,–2,0,2,0,2,0).

Page 21: Cdma Security

S t e p E n c o d e s e n d e r 0

E n c o d e s e n d e r 1

0 v e c t o r 0 = ( 1 ,– 1 ) , d a t a 0 = ( 1 , 0 ,1 , 1 ) = ( v, –v, v, v )

v e c t o r 1 = ( 1 ,1 ) , d a t a 1 = ( 0 ,0 , 1 , 1 ) = ( – v, -v, v, v )

1 e n c o d e 0 = ve c t o r 0 . d a t a0

e n c o d e 1 = v ec t o r 1 . d a t a 1

2 e n c o d e 0 = ( 1, – 1 ) . ( 1 , –1 , 1 , 1 )

e n c o d e 1 = ( 1 ,1 ) . ( – 1 , –1 , 1 , 1 )

3 e n c o d e 0 = ( (1 , – 1 ) , ( –1 , 1 ) , ( 1 , – 1 ) ,( 1 ,– 1 ) )

e n c o d e 1 = ( ( –1 , – 1 ) , ( – 1 , –1 ) , ( 1 , 1 ) ,( 1 , 1 ) )

4 s i g n a l 0 = ( 1 ,– 1 , – 1 , 1 , 1 , –1 , 1 , – 1 )

s i g n a l 1 = ( –1 , – 1 ,– 1 , –1 , 1 , 1 , 1 , 1 )

S t e p D e c o d e s e n d e r 0

D e c o d e s e n d e r 1

0 v e c t o r 0 = ( 1 ,– 1 ) , p a tt e r n = ( 0 ,– 2 , –2 , 0 , 2 , 0 , 2 , 0 )

v e c t o r 1 = ( 1 ,1 ) , p a tt e r n =( 0 ,–2 , 2 , 0 , 2 , 0 , 2 ,0 )

1 d e c o d e 0 = v ec t o r 0 . p a tt er n

d e c o d e 1 = v ec t o r 1 . p a tt er n

2 d e c o d e 0 = ( (0 , – 2 ) , ( –2 , 0 ) , ( 2 , 0 ) ,( 2 , 0 ) ) . ( 1 , – 1 )

d e c o d e 1 = ( (0 , – 2 ) , ( –2 , 0 ) , ( 2 , 0 ) ,( 2 , 0 ) ) . ( 1 , 1 )

3 d e c o d e 0 = ( (0 + 2 ) , ( –2 + 0 ) , ( 2 + 0 ) ,( 2 + 0 ) )

d e c o d e 1 = ( (0 – 2 ) , ( –2 + 0 ) , ( 2 + 0 ) ,( 2 + 0 ) )

4 d a t a 0 = ( 2 , –2 , 2 , 2 ) , m e a n i n g ( 1 , 0 , 1 , 1 )

d a t a 1 = ( – 2 , –2 , 2 , 2 ) , m e a n i n g ( 0 , 0 , 1 , 1 )

EXAMPLE:

ENCODER SIDE DECODER SIDE

Page 22: Cdma Security

Efficient Practical utilization of

Fixed Frequency Spectrum.

Flexible Allocation of Resources

Privacy protection in CDMA

due to anti-jamming capabilities of

PN sequences

We can change somewhat the

flow rate of voice and signal by

knowing the ESN AND MIN.

ADVANTAGE AND WEAKNESS

ADVANTAGE WEAKNESS

Page 23: Cdma Security

FUTURE AND RESEARCH

Continue work on verifying composition of security tunnels

Currently thinking about attacks so now a days AES algorithm

is used.

Add the capability to reuse tunnels.

seemed easy at first, but may require some major restructuring

of the design.

Page 24: Cdma Security

RESEARCH PLAN

iRespond is a device that will provide an immediate response to

a certain location.

Page 25: Cdma Security

CONCLUSION

It provides secure wireless communication.

Its uplink and downlink communication , make it better than

others.

It is hard to detect , decode.

Technology makes it better than other.

It is better , but it is still secondary.

Page 26: Cdma Security

REFERENCES

Viterbi, Andrew J. (1995). CDMA: Principles of Spread Spectrum Communication

(1st Ed.). Prentice Hall PTR. ISBN0201633744. 

"Telecom-Resource-CDMA“ . Telecom-Resources. Undated.

http://www.freewebs.com/telecomm/cdma.html. Retrieved 2006-04-09. 

Lohninger , Hans (2005-12-17). "Direct Sequence CDMA Simulation". Learning by

Simulations. http://www.vias.org/simulations/simusoft_dscdma.html. Retrieved 2006-

04-09. 

Authentication and Security in Mobile Phones by Greg Rose, Qualcomm Inc.,

Australia

Page 27: Cdma Security

THANK YOU !