Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers

Research Article

Symbolic Analysis for Security of Roaming Protocols in Mobile Networks

Download
283 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-31909-9_29,
        author={Chunyu Tang and David Naumann and Susanne Wetzel},
        title={Symbolic Analysis for Security of Roaming Protocols in Mobile Networks},
        proceedings={Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2012},
        month={10},
        keywords={Mobile networks GSM UMTS roaming protocols security authentication secrecy symbolic modeling automated analysis},
        doi={10.1007/978-3-642-31909-9_29}
    }
    
  • Chunyu Tang
    David Naumann
    Susanne Wetzel
    Year: 2012
    Symbolic Analysis for Security of Roaming Protocols in Mobile Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-31909-9_29
Chunyu Tang1, David Naumann1, Susanne Wetzel1
  • 1: Stevens Institute of Technology

Abstract

Both GSM (2G) and UMTS (3G) wireless standards are deployed worldwide. Like the 4G standard now appearing, these standards provide for mobile devices with differing capabilities to roam between providers or technologies. This poses serious challenges in ensuring authentication and other security properties. Automated analysis of security properties is needed to cope with the large number of possible scenarios. While some attacks exploit weaknesses in cryptographic functions, many attacks exploit flaws or other features of the protocol design. The latter attacks can be found using symbolic (Dolev-Yao) models. This paper demonstrates the use of a fully automatic tool to exhaustively analyze symbolic models of GSM, UMTS, and the respective roaming protocols. The results include the demonstration of known attacks as well as the confirmation of expected properties.