Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Proceedings on Privacy Enhancing Technologies ; 2020 (1):126–142 Ankush Singla*, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, and Ninghui Li Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks Abstract: This paper focuses on protecting the cel- in such an idle state, it does not overlook any pending lular paging protocol — which balances between the network services (e.g., phone calls). This is where the quality-of-service and battery consumption of a device cellular paging protocol comes into play. — against security and privacy attacks. Attacks against By adhering to the cellular paging protocol, a device this protocol can have severe repercussions, for instance, periodically wakes up from its idle state to poll for any allowing attacker to infer a victim’s location, leak a paging messages triggered by the core network for noti- victim’s IMSI, and inject fabricated emergency alerts. fying any pending services. On receiving a paging mes- To secure the protocol, we first identify the underlying sage (containing the device’s Temporary Mobile Sub- design weaknesses enabling such attacks and then pro- scriber Identity or TMSI), the device gets ready for the pose efficient and backward-compatible approaches to service by re-establishing a secure connection to the core address these weaknesses. We also demonstrate the de- network. The exact time periods when the cellular de- ployment feasibility of our enhanced paging protocol by vice wakes up and polls for paging messages (also known implementing it on an open-source cellular protocol li- as the device’s paging occasion) is fixed by design—a brary and commodity hardware. Our evaluation demon- deterministic function of the device’s persistent iden- strates that the enhanced protocol can thwart attacks tity (International Mobile Subscriber Identity or IMSI) without incurring substantial overhead. and some public parameters (broadcast by the serving network)—in the 4G cellular protocol. Apart from ser- Keywords: Cellular Networks, Paging Procedure, vice notifications, paging messages are also used to dis- Broadcast Authentication seminate emergency messages, such as earthquake and DOI 10.2478/popets-2020-0008 tsunami warnings. Because of such critical use cases, Received 2019-05-31; revised 2019-09-15; accepted 2019-09-16. the paging protocol is an attractive attack target for motivated adversaries (e.g., nation-states, terrorist or- ganizations) for nefarious purposes (e.g., surveillance, 1 Introduction creating artificial panic). It is, thus, paramount to ana- lyze the security and privacy threats of paging protocol, Receiving and transmitting radio packets as part of the and develop robust defense mechanisms for mitigating cellular communication protocol are arguably two of the the detected vulnerabilities. most demanding functions of a cellular device with re- Prior work [13, 15, 16, 18, 23] has identified a num- spect to energy consumption. To save device battery, ber of exploitable weaknesses in the 4G and 5G pag- the cellular protocols allow a device to transition to a ing protocols. We classify these vulnerabilities into three low-power, idle state when the network detects a pre- categories: ¶ Lack of confidentiality and anonymity: A defined period of cellular inactivity from the device. It device’s TMSI (originally designed to obfuscate the per- is, however, crucial to ensure that when the device is sistent identity) is sent in the paging message in plain- text. Furthermore, the core network often chooses not to update TMSI frequently, because of the expensive cryp- tographic operations and protocol interactions required *Corresponding Author: Ankush Singla: Purdue Univer- sity, E-mail: asingla@purdue.edu for changing the TMSI [13, 18, 23]. The adversary ex- Syed Rafiul Hussain: Purdue University, E-mail: hussain1@ ploiting such weak anonymity policies can map a user’s purdue.edu phone number to its TMSI and track the user’s location Omar Chowdhury: The University of Iowa, E-mail: omar- in a particular area. · Fixed paging occasion: The spe- chowdhury@uiowa.edu cific time frame at which the device wakes up from the Elisa Bertino: Purdue University, E-mail: bertino@purdue. idle state is fixed. This creates a side-channel, which edu Ninghui Li: Purdue University, E-mail: ninghui@cs.purdue. enables the adversary to map a user’s phone number edu to its paging occasion, track the user, and recover the
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 127 user’s IMSI [16]. ¸ Lack of authentication: The paging a high computation and storage overhead. On the con- protocol does not have authentication or integrity pro- trary, with the second approach the network and the tection. This allows an adversary to hijack the paging device seamlessly select the next P-TMSI only when a channel [15] and push fabricated paging messages in- paging message is sent to the cellular device. This policy cluding emergency alerts to all devices in a target area trades off strong anonymity guarantees for significant [15]. overhead reduction. In this paper, we aim to design and evaluate de- Finally, to protect the devices against paging chan- fense mechanisms that would mitigate the above men- nel hijacking and unauthorized injection of fake paging tioned vulnerabilities without incurring prohibitive per- messages, we propose a symmetric-key based broadcast formance and communication overhead, or requiring sig- authentication scheme [21]. We sign the paging mes- nificant protocol or infrastructural changes. sages in a particular paging cycle using the correspond- Existing proposals for mitigating the paging pro- ing signing key from a pre-generated one-way key-chain tocol vulnerabilities [11, 12, 16, 19, 24] require either and attach the signature to the paging message. The heavy signaling overhead or major overhauls of the cel- network reveals the verification key in the next paging lular systems, rendering legacy devices incompatible. cycle, which the cellular device uses to verify the paging Also, there are currently no proposed techniques that message sent in the previous cycle. Our approach, thus, can efficiently provide authentication for paging mes- enables an efficient authentication/verification scheme, sages. both in terms of computation and communication over- Our approach: Our defense mechanisms address each head at the expense of negligible latency. of the paging protocols’ vulnerabilities discussed above. Our contributions: The paper has the following tech- To protect devices from unauthorized tracking due to nical contributions: infrequent TMSI updates, we propose a new ephemeral 1. We design a defense mechanism which mitigates the identifier called P-TMSI (Pseudo-TMSI ). In contrast to design vulnerabilities of the cellular paging protocol. TMSI, which is explicitly assigned and sent to a device Particularly, we address each of the paging protocol securely and reliably (with acknowledgement) by the vulnerabilities in the following way: core network, the P-TMSI is sequentially selected by (a) We design an approach to prevent tracking of the core network and the device from a list of P-TMSIs a UE in a particular area enabled by observ- generated from a pre-shared, secret seed agreed upon ing the TMSIs included in the paging messages. during the mutual authentication and thus does not re- Our approach introduces an ephemeral identi- quire any additional interactions. fier called the P-TMSI. To defend against the side-channel attacks exploit- (b) We design a secure and lightweight mechanism ing the weakness of fixed paging occasion, we propose to randomize the paging occasion, so that it a variable paging occasion such that any two successive does not leak information about the IMSI. Our paging messages for the same UE are not sent/received mechanism, thus, provides privacy protection at the same paging occasion. To realize this, we propose against the ToRPEDO attack [16]. to compute the paging occasion based on the frequently (c) We evaluate the cost of adding broadcast au- updated P-TMSI value of the device instead of its IMSI. thentication to paging messages to prevent ma- We also propose two policies governing the update licious tampering or injection of fake alerts. frequency of the paging occasion and P-TMSI— (1) to 2. We implemented our enhanced protocol using open- refresh after each paging occasion, or (2) only after a source libraries and commodity hardware, and car- paging message is sent to the device. With the first ap- ried out an extensive evaluation. The evaluation proach the network and the device select a new P-TMSI shows that our protocol is efficient in terms of exe- and compute the new paging occasion after every pag- cution, memory, and performance overhead. ing cycle. Since this approach guarantees that no two consecutive paging occasions are the same, it offers a stronger security guarantee against a resourceful adver- 2 Background sary who already knows the current P-TMSI of the user and tries to inject fake paging messages at the victim’s In this section, we briefly introduce the architecture of paging occasion [15]. In this approach, however, the pag- 4G and 5G cellular networks, the attach and the paging ing occasion is renewed even in the absence of any pag- procedures, and how the paging occasion is computed. ing message sent to the cellular device and thus induces
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 128 Fig. 1. Cellular Network Architecture. 2.1 Cellular Architecture Cellular architecture. In cellular networks, a geo- Fig. 2. Paging Procedure. graphical area is partitioned into hexagonal cells man- aged by one or more base-stations. These base-stations provide connectivity between the core network and the 2.2 Attach Procedure nearby cellular devices (as shown in Fig. 1). A Mobility Whenever a UE is switched on with a valid SIM card, Management Entity referred to as MME (resp., Access it first scans the network and selects the base-station and Mobility Management Function or AMF in 5G) in that satisfies its selection criteria. To establish a con- the core network manages the connectivity and mobility nection with the core network, the UE then sends an of the devices in its tracking area (TA) consisting of one attach_request message to the MME, containing its or more cells. IMSI/TMSI and the supported cipher suites. The UE Device identity. A cellular device (also referred to as and the core network authenticate each other using a User Equipment or UE) equipped with a SIM (Sub- challenge-response protocol (using a pre-installed sym- scriber Identification Module) card is assigned an In- metric master key in the SIM card) and then negotiate ternational Mobile Subscriber Identity (IMSI) which the cipher suite to be used for encryption and message uniquely identifies the UE. The IMSI typically does authentication based on their individual capabilities. Fi- not change once assigned, and its leakage can enable nally, the MME completes the attach procedure by send- tracking and impersonation of unsuspecting victims. To ing an encrypted and integrity protected attach_accept prevent unwanted exposure of a user’s IMSI, the MME message containing the UE’s TMSI. assigns a randomly generated Temporary Mobile Sub- scriber Identity (TMSI) to the UE for further commu- 2.3 Paging Procedure nication with the core network. The TMSI has to be The paging procedure (see Fig. 2) allows a UE to enter updated every time the UE moves to a new tracking a low power-consumption mode only when there are no area or after a certain time interval. The Third Gen- uplink (from UE to network) or downlink (from network eration Partnership Project (3GPP) [2], the standards to UE) messages for a pre-defined amount of time. body for cellular network protocols, recommends chang- Paging cycle. When in idle mode, the UE periodically ing the TMSI frequently to prevent user tracking. wakes up (for ∼1 ms) to check if there is any notification Time synchronization. In 4G and 5G cellular net- for pending service(s) (e.g., phone call, SMS, or incom- works, the communication between a UE and a base- ing data), at a predetermined time-frame once every station is carried out using radio frames (also called paging cycle. A paging cycle can have any time dura- system frames) each of which spans 10 milliseconds. tion from 320 ms (32 radio frames) to 2.56 seconds (256 These radio frames are indexed using a circular counter radio frames) [3] depending on network parameters. from 0 to 1023, which is also called its system frame Paging occasion. The radio frame at which the number (SFN). Each SFN is further partitioned into 10 UE wakes up in every paging cycle to check for a sub-frames of 1 millisecond each. A base-station peri- paging message is known as the paging frame (PF). odically broadcasts a master_information_block mes- It is computed as follows using the paging cycle sage which includes the current SFN of the network and value T ∈ {32, 64, 128, 256}, another public parameter other parameters used by UE to synchronize itself with nB ∈ {4T, 2T, T, T2 , T4 , T8 , 16 T T , 32 }, and the UE’s identifier the base-station. UE_ID, where UE_ID = IMSI mod 1024. T PF = ( N ) × (UE_ID mod N), where N = Min(T, nB)
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 129 T and nB are system parameters shared in the messages intended for the same user. This guarantee is system_info_block messages broadcast by the base- achieved by using the transient TMSI as device identi- station. The value of PF varies between 0 and 255 due fier in the paging records instead of the persistent IMSI. to the above mentioned constraints. The specific sub- Note that, one can aim at maintaining this guarantee as frame of the paging frame at which the UE wakes up is long as TMSIs are changed frequently and the protocol also computed using the above mentioned parameters does not leak any side-channel information. and a simple look-up table. The paging frame and the sub-frame together form a UE’s paging occasion. 3.2 Exploitable Design & Deployment Emergency notifications. Paging is also used to dis- Weaknesses seminate emergency information, such as tsunami warn- In this section, we discuss paging protocols’ design and ings or amber alerts, and to notify any changes in system deployment weaknesses that have been exploited by configuration to all the UEs in an area. prior attacks. Any robust defense mechanisms must mit- Response to a paging message. A single paging igate these weaknesses. message can contain up to 16 paging records addressed to multiple UEs. Each record contains the UE identi- 3.2.1 Design Weaknesses fier (TMSI/IMSI). If a UE notices its own identifier, it switches to an active state and initiates a connection This section discusses protocols’ design vulnerabilities. with the core network to get the service completed. Side-channel information due to fixed paging oc- casion. A closer inspection of the 4G paging proto- col reveals a critical and fundamental weakness. For a 3 Exploitation of Existing particular device in a specific cell, the time intervals Security and Privacy Policies when the device wakes up from the low-power state to check for paging messages (i.e., the paging occasions) In this section, we first discuss the existing security and are fixed [16]. This is because the paging occasion is privacy policies prescribed by the 3GPP standards for computed from the device’s persistent IMSI. This essen- cellular paging protocols. Existing attacks on paging tially exposes side-channel information which is shown protocols, however, have shown these policies to be inad- to be exploitable by the ToRPEDO (TRacking via Pag- equate. Based on the analysis of these attacks, we then ing mEssage DistributiOn) attack [16]. distill design and deployment weaknesses of the cellular To track the location of the victim, the adversary paging protocols that enable these attacks (see Table 1). first sniffs the paging messages broadcast by a legiti- mate base-station serving a particular target area and 3.1 Security and Privacy Policies of learns the distribution of paging message arrival (shown Paging Protocols in Fig. 4) at every paging occasion. The adversary then Unfortunately, the paging protocol neither provides con- continues making silent phone calls until a paging oc- fidentiality nor authentication guarantees. This lack of casion is found to receive a significantly higher num- guarantees and the fact that paging messages are broad- ber of paging messages than the others. By compar- cast imply that an adversary can not only sniff a paging ing the paging message distribution under attack (see message over-the-air, but also inject fabricated paging Fig. 4) with the benign paging message distribution (see messages. One can attribute the lack of confidentiality Fig. 3) one can identify the victim’s presence in the tar- guarantees to the paging protocol’s original goal of bal- get area and obtain the victim’s paging occasion, which ancing between the device’s battery consumption and is 21 as is evident from Fig. 4. The reason is that the quality-of-service. More precisely, providing confiden- probability of receiving paging messages in the victim’s tiality guarantees through the use of encryption would paging occasion under attack is substantially higher (a require the device to perform up to 16 expensive decryp- spike at paging occasion 21 in Fig. 4) than the rest tion operations—one for each paging record—per pag- of the paging occasions both under attack and benign ing occasion (i.e., ∼1.280 seconds in practice) to check conditions. The exposure of paging occasion, i.e., the whether there is a pending service for the device, thus UE_ID = IMSI mod 1024 reveals the trailing 7-10 bits of defeating the purpose of conserving battery power. the victim’s IMSI (when base-stations set their public The 3GPP, however, aims at providing some parameters T and nB both to 128). This can further en- anonymity guarantees for the paging protocol, that is, able the adversary to learn the victim’s IMSI through an attacker should not be able correlate two paging the IMSI-cracking attacks [16].
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 130 Design Weakness Deployment Weakness Gen. Vulnerability Attacks Vulnerability Attacks TMSI update frequency is TMSI exposure and location TMSI is updated TMSI exposure and location under-specified [1] tracking [18, 23] infrequently or predictably tracking [13, 18] 4G Paging occasion is based on ToRPEDO [16] and Paging contains IMSI as IMSI-Catching with IMSI [2] IMSI-Cracking [16] device identifier PIERCER [16] Paging-channel hijacking [15], panic attack by broadcasting fake — — Lack of authentication [2] emergency alerts [15], stealthy deregistration attack [15] TMSI update requires additional — — Potential location tracking [18, 23] interactions 5G Paging occasion is based on TMSI exposure and location — — TMSI, but requires additional tracking [13, 18] protocol interactions to change Paging-channel hijacking [15], Lack of authentication or panic attack by broadcasting fake — — integrity protection [1] emergency alerts [15], stealthy deregistration attack [15] Table 1. Security and privacy policies for the 4G/5G paging protocols and the corresponding attacks exploiting them. 0.175 core network to perform the configuration update procedure every time TMSI is updated. Number of paging messages 0.150 0.125 Lack of authentication. Another critical design weak- ness of the existing paging protocols is the lack of cryp- 0.100 tographic protections for paging message authentica- 0.075 tion. This makes it possible for an attacker to inject fake 0.050 paging messages including malicious emergency warn- 0.025 ings (e.g., tsunami, amber alerts) by simply installing 0.000 0 20 40 60 80 100 120 a base-station with a higher signal strength near the Paging Frames Fig. 3. Average number of paging message arrivals at different victim UE(s), and start flooding all the paging frames paging occasions within one paging cycle, where T=nB=128 and with the fake alerts [15]. This can be used to create a the adversary made no phone calls. widespread panic in a certain area. The attacker can also carry out a DoS attack by transmitting empty fake pag- ing messages [15] to prevent UEs in certain area from getting legitimate paging messages. This consequently prevents UEs from receiving any notifications (e.g., call, SMS) from the core network. The fact that UEs can- not differentiate between a fake and a legitimate paging message makes this attack very powerful. 3.2.2 Deployment Weaknesses Fig. 4. Average number of paging message arrivals in different This section presents deployment slip ups by carriers paging occasions within one paging cycle, where T=nB=128 that have been exploited by prior attacks. when the adversary makes multiple phone calls. Privacy loss due to the use of IMSI as the device To prevent such attacks, 5G specification has re- identifier. Certain network carriers have been shown to cently proposed using variable paging occasions com- be using IMSI in the paging records as the device iden- puted using the TMSI, i.e., UE_ID = TMSI mod 1024. tifier instead of the 3GPP prescribed TMSI. Hussain et The specification, however, requires the device and the al. proposed the PIERCER attack (Persistent Informa- tion ExposuRe by the CorE netwoRk) [16] which ex-
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 131 ploits this deployment weakness along with the design 4.1 Adversary Model weakness of using a fixed paging occasion and lack of For designing our defense mechanisms, we consider the confidentiality for the victim’s IMSI. Access to the vic- following adversarial capabilities. This adversary model tim’s IMSI can enable the attacker to launch further is consistent with prior work on this area. targeted attacks [15]. 1. We assume that the adversary knows the phone Side-channel information due to infrequent up- number (or, other soft identity) of the target UE dates of TMSI. Although the 3GPP standard for 4G and can trigger multiple paging messages from the networks [1] suggests changing the TMSI frequently to MME by placing calls or sending SMSes. prevent mapping (e.g., phone number to TMSI) attacks, 2. The adversary is able to eavesdrop on the paging it does not clearly outline the rate at which a UE’s broadcast channel as well as to create and inject TMSI should be changed. Due to under-specification, fake paging messages at the paging frames of his the practical deployments of the paging protocol have choice using a malicious base-station. shown to either not update the TMSI frequently [18, 23] 3. The attacker-controlled base-stations can broadcast to avoid having to carry out the additional protocol in- with a higher signal strength than the legitimate teractions, or choose the next TMSI predictably, even one forcing the UE to receive the fabricated paging when changed [13]. Operational networks’ reluctance to messages instead of legitimate ones. change TMSI frequently allows an attacker to identify and track a user’s presence in a target area [18]. For this, We aim to design defense mechanisms that can pro- the attacker makes multiple silent phone calls to the vic- vide the authentication and guarantees about the lack tim’s device for which the network triggers paging mes- of side-channel information for paging protocols in the sages. The adversary equipped with a low-cost software- presence of an adversary with the above capabilities. defined radio (SDR) can then sniff the paging messages We do not aim to provide confidentiality guarantees as in the target area. If the adversary observes a unique it can incur prohibitive overhead for the device. Finally, TMSI appearing in the paging messages, she infers that we consider denial-of-service attacks, such as, jamming the victim is present in the current base-station’s cov- at the physical layer to be outside the scope of this pa- erage area, and thus track the victim’s coarse-grained per. location. Tracking a victim UE over a large geographic area is also possible for a resourceful adversary by de- 4.2 Challenges ploying multiple such SDRs at different locations. The 5G specification [2], on the other hand, clearly To incorporate security and privacy mechanisms in the outlines that every service completion (triggered by ei- existing paging protocol without breaking backward ther the device or the network) calls for a change of compatibility, while being incentive compatible at the TMSI through the configuration update procedure. same time, one has to address the following challenges: Since the configuration update procedure requires ad- À Paging packet format: Modifying the packet format of ditional interactions between the device and the core the paging protocol to include additional cryptographic network, the upcoming 5G deployments may similarly information is an approach unlikely to be deployed in try to get away without introducing such additional in- practice because of its associated deployment cost and teractions and run into similar issues as 4G operational backward incompatibility. Á Protocol overhaul: Any de- networks – thus becoming susceptible to location track- fense requiring substantial changes in the current pro- ing attacks. tocol is also unlikely to be accepted following the above argument. Â Overhead: As a cellular device processes roughly one paging message per second, any sophis- 4 Overview of Proposed Defenses ticated cryptographic scheme might incur prohibitive In this section, we first present our adversary model and overhead with respect to packet processing time and then discuss the challenges in designing a secure paging energy consumption. protocol. Finally, we provide a high-level overview of our proposed defense mechanisms. 4.3 Overview This section provides a high-level overview of our pro- posed defenses.
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 132 4.3.1 Preventing Side-channel Information due to sion) calculation by using P-TMSI instead of IMSI, Infrequent TMSI Updates that is, UE_ID = P-TMSIcurrent mod 1024 instead of UE_ID = IMSI mod 1024. Such an approach prevents Ephemeral identifier P-TMSI. To prevent cellular any kind of leakage of IMSI, thus protecting against devices from being illegitimately tracked due to the in- the ToRPEDO and PIERCER attacks [16]. frequent update of TMSIs, we propose a new ephemeral Update frequency for the paging occasion. One UE identifier, P-TMSI (or pseudo-TMSI). The P-TMSI natural policy to randomize the paging occasion would of a device will be seamlessly refreshed by both the time- be to change the paging occasion after every paging cy- synchronized UE and core network simultaneously. We cle regardless of whether the UE actually received any propose to use P-TMSI as the device identifier in the paging message in that paging cycle. Since we compute paging records instead of TMSI. The transient nature paging occasion based on P-TMSI, this design choice of P-TMSI prevents an attacker from being able to cor- naturally forces us to change the P-TMSI after each relate two paging messages sent to the same UE. paging cycle. The main intuition for this is to enable the The motivation for using P-TMSI instead of TMSI device to evade a powerful adversary that keeps send- stems from the fact that a TMSI update in 4G ing empty paging messages to the UE, by knowing the is performed by executing the GUTI reallocation UE’s current P-TMSI, and thus tries to occupy victim’s procedure (resp., configuration update procedure paging channel. Such a paging-channel hijacking attack for 5G), which requires sending an encrypted becomes ineffective if the UE moves to a different pag- and integrity protected GUTI_reallocation_command ing occasion after every paging cycle. This approach, message from the network to the UE and a however, exhausts the list of P-TMSIs rapidly as it re- GUTI_reallocation_complete message from the UE to quires the UE to compute its next paging occasion at the network as an acknowledgement. On the other hand, every paging cycle. This also requires a strict time syn- with our proposed mechanism, updating P-TMSI will chronization between the UE and the base-station. not require any additional protocol steps to synchro- To address these challenges, we propose to update nize its values between the UE and MME. This design the P-TMSI and paging occasion only when there is an choice can encourage the network operators to adopt actual paging message for the UE and the UE success- this mechanism as updating P-TMSI does not incur any fully reconnects to the MME using a service_request communication overhead. message. This is computationally more efficient as it re- P-TMSI update mechanism. The core network will quires paging occasion updates at a much slower rate. share a random secret seed with the UE through the se- In this approach, an adversary, however, can hijack the cure and authenticated channel established after com- paging channel knowing the P-TMSI of a victim and pleting the attach procedure. Using this secret seed, never let any legitimate paging message reach the vic- the UE and the core network will both generate a list of tim and thus force the paging occasion to remain fixed. random numbers using a secure pseudo-random number To allow the victim to detect a paging channel hijacking generator (PRNG) and store this list in their respective attempt, we rely on the paging message authentication memories. The UE and the core network use this list which we discuss below. to sequentially select the next P-TMSI values. The fre- quency of the P-TMSI updates can be governed by two 4.3.3 Preventing Lack of Paging Message approaches as discussed in the next section. Authentication 4.3.2 Preventing Side-channel Information due to To prevent injections of fake paging messages and to Fixed Paging Occasion enable the UE to detect any paging channel hijacking attempts, we propose to use a broadcast authentica- Variable paging occasion. To prevent against the tion/integrity protection scheme that allows each re- attacks exploiting the fixed paging occasion [16], we ceiver to verify if the received message is intact and propose a mechanism to generate variable paging oc- originated from the claimed sender [20]. casions so that two consecutive paging messages do Choice of broadcast authentication scheme. not have the same paging occasion for a particular There are two possible design approaches one can con- UE. For this, we propose to use the frequently up- sider: one based on asymmetric-key cryptography and dated P-TMSI values instead of the static IMSI to another based on symmetric-key cryptography. Both compute the paging occasion of a device. We thus these approaches have their strengths and limitations. modify UE_ID (used for computing the paging occa-
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 133 Digital signatures based on asymmetric cryptogra- is very low and the size of the extra information sent phy can be a straightforward choice for broadcast au- for authentication is also small when compared to the thentication, since they are scalable and also provide asymmetric-key based techniques, which makes it a per- public verifiability without the need for setting up in- fect candidate for our purposes. dividual secret keys for every recipient. Digital signa- For PTESLA to work, the UE and the base-station ture schemes, like RSA [22] and ECDSA [8], however, establish the required bootstrapping parameters during incur significant performance overhead as they involve the initial attach procedure after mutual authentica- expensive cryptographic operations that may slow down tion. Afterwards, for every paging message, the base- the signing and verification process and thus affect the station calculates an authentication tag and attaches it timely delivery of service notifications and emergency to the paging message. Upon reception, the UE buffers warnings. Digital signatures also require Certification the paging message along with the authentication tag. Authorities (CAs) to generate and maintain the public The base-station releases the corresponding verification keys of different entities which is currently absent for key along with the paging messages in the next paging 4G and 5G cellular protocols. To make matters worse, cycle. The UE determines whether the verification key paging messages are only of a certain fixed maximum is valid and uses it to authenticate the previous paging length, and it is crucial to fit the extra information message. for digital signature and the certificate-chain within the current protocol packet format. There is just not enough 5 Protocol Design space for this extra information making such a solution infeasible. In this section, we provide details about our proposed Symmetric-key based authentication schemes, on solutions, including the rationale behind the design de- the other hand, generally rely on Message Authentica- cisions. tion Codes (MAC) [17]. These schemes are, however, not ideal for large-scale broadcast authentication as they re- 5.1 Refreshing P-TMSI and Paging quire pairwise secret keys for every signer and verifier. Occasion This adds a significant management and storage over- A straightforward approach to assign new P-TMSI val- head to maintain and distribute all these keys making ues would have been to generate them on-the-fly when it infeasible for practical deployments. Furthermore, if needed, but this might result in performance issues in pairwise secret-keys were used for paging message au- real deployments. We, therefore, introduce the concept thentication, the base-station would need to include a of a P-TMSI store, Ls , which stores a list of 32-bit ran- separate MAC for each paging record in the paging mes- dom numbers serving as future P-TMSI values. These sage. Since one paging message can contain a maximum values can be accessed and used in a sequential man- of 16 paging records, this would allow the network to ner at runtime. The P-TMSI store allows the UE and fit only a maximum of 8 paging records and their corre- the network to generate/regenerate P-TMSI values in sponding MACs in a paging message without breaking batches and store them in memory for quick access when backward compatibility. This would result in a severe required. In what follows, we discuss the specific de- degradation in the quality of service as the base-stations tails of the two approaches to periodically refresh the might have to wait multiple paging cycles to communi- P-TMSI values for the UEs. cate an incoming call or a service request to the UE. To address these challenges, we leverage the TESLA 5.1.1 Refreshing P-TMSI after each Paging Cycle broadcast authentication protocol [21] and instantiate Our first approach refreshes the P-TMSI and the paging it in the context of paging message authentication. Our occasion after each paging cycle. The three main steps instantiation, dubbed PTESLA, uses symmetric crypto- of this approach are as follows (see also Fig. 5): graphic functions (MAC) but provides asymmetric-key (1) Bootstrapping: When a UE initially wants to con- properties by delayed key disclosure, i.e., the verifica- nect/register to the core network, it initiates the attach tion key is disclosed after a fixed interval of time allow- procedure by sending the rrc_connection_request ing receivers to verify the messages sent in the previ- message to the base-station. The base-station gener- ous time-interval. TESLA addresses the scalability is- ates a 32-bit random secret seed K ←− {0, 1}32 for the sue of symmetric-key schemes by removing the need UE and shares it with the UE in the encrypted and for disseminating pairwise keys to the recipients. The signing and verification overhead incurred by TESLA
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 134 Fig. 5. Refreshing P-TMSI after each paging cycle. Fig. 6. Refreshing P-TMSI after every paging message. integrity protected rrc_connection_reconfiguration message sent at the end of the attach procedure. not updated its current P-TMSI value and is expecting a The base-station and the UE then use a cryp- paging message addressed to the stale P-TMSI, but the tographically secure pseudo-random number generator base-station sends the paging message containing the (CSPRNG) with seed K to generate a list Ls of n 32-bit new P-TMSI as the UE identifier. This situation can random numbers (value of n is configurable) and store arise because of UE crashes, execution errors, or some it in memory. In our instantiation, we use a Hash based other device malfunction. To prevent desynchronization, Message Authentication Code–Deterministic Random we rely on the in-built synchronization procedure of Bit Generator (HMAC_DRBG) [9] to generate this list. the cellular protocol with which the base-station and UE periodically synchronize their time and radio frames HMAC_DRBG(K) −→ {P-TMSI1 · · · P-TMSIn } leveraging master_info_block and system_info_block where, P-TMSIi ∈ {0, 1}32 messages. (2) Updating P-TMSIcurrent at runtime: When- Deployment limitations. Though this approach can ever the UE enters the idle mode, the base-station and prevent an adversary from hijacking the victim’s pag- the UE choose the first P-TMSI from the list Ls as ing channel, the UE in idle mode needs to spend its re- the P-TMSI for the current paging cycle and set the sources to compute new paging occasion after each pag- P-TMSI index i to 1. At every paging cycle, the base- ing cycle. This exhausts the list of P-TMSIs Ls rapidly station and the UE increment the index i and pick-up and forces the UE and the base-station to regenerate it the corresponding P-TMSI from Ls . frequently. P-TMSIcurrent = P-TMSIi Further enhancements. To make this approach more i = i + 1, where i ∈ {1 . . . n} efficient, one can update P-TMSIs after every N -th (3) Regenerating the P-TMSI store: The base- paging cycles instead of each paging cycle. The UE station and the UE store the current state of the and base-station can negotiate N (e.g., 10) during the CSPRNG in the context CTX. This context is used to attach procedure. This will significantly improve the generate the next batch of random numbers once the performance (by a factor of N ), while keeping the win- current list is depleted. dow for performing any attack fairly short (e.g., N =10 HMAC_DRBG(CTX) −→ {P-TMSIn+1 · · · P-TMSI2n } paging cycles or approximately ∼10 seconds). Synchronization challenge. Since the P-TMSI is be- 5.1.2 Refreshing P-TMSI after every Paging Message ing continuously refreshed after each paging cycle, it re- quires synchronization between the base-station and the Refreshing the P-TMSI after each paging message (Fig. UE to ensure they have same value for current P-TMSI. 6) instead of every paging cycle overcomes the draw- Otherwise, there can be a situation where the UE has backs of the previous approach and is computationally more efficient. It also obviates the responsibility of the
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 135 Base-station bootstrapping. The base-station re- Ki-1 Ki Ki+1 quires a one-way key-chain for PTESLA to work. To P-TMSI P-TMSI P-TMSI generate this key-chain, the base-station creates a ran- P-TMSI P-TMSI dom 32-bit seed S. It then applies the SHA-256 hash function to S to generate a 256-bit hash (K0n ) and trun- P-TMSI P-TMSI P-TMSI cates it to the first 32-bits (Kn ). This operation is MAC MAC MAC performed repeatedly to generate a one-way key-chain Ki-2 Ki-1 Ki t (Kn , Kn−1 , . . . , K0 ) of length n+1, where each key is a Paging cycle i - 1 Paging cycle i Paging cycle i + 1 32-bit value. This key-chain is used in the reverse order of generation (K0 , K1 , . . . , Kn ), to prevent an attacker Fig. 7. At each paging cycle, the base-station selects the current from inferring the next key by using the previous key. signing key from the one-way key-chain and calculates the MAC on the paging message using this key. It then attaches the MAC SHA-256(S) −→ Kn 0 −→ trunc(Kn 0 ) −→ Kn and the previous paging cycle’s key to the paging message. SHA-256(Kn ) −→ Kn-1 0 −→ trunc(Kn-1 0 ) −→ Kn-1 ··· ··· ··· ··· ··· ··· ··· ··· ··· ··· base-station to maintain the list of P-TMSIs, Ls . The SHA-256(K1 ) −→ K0 0 −→ trunc(K0 0 ) −→ K0 current approach has the following three steps: where{Kn , Kn-1 · · · K0 } ∈ {0, 1}32 (1) Bootstrapping: When a UE sends the initial attach_request message to connect to the core net- The base-station then divides the time into equal work, the corresponding MME generates a 32-bit ran- intervals of duration Tint , which is set to be equal to dom secret seed K for that UE and shares it using the the duration of the paging cycle (already defined by the encrypted and integrity protected attach_accept mes- cellular protocol). The base-station then assigns each sage at the end of the initial attach procedure. The interval a key from the one-way key-chain. Every paging UE and the MME then use a CSPRNG to generate a message in a paging cycle will use the key assigned to list Ls of n 32-bit random numbers. the current time interval. We choose the disclosure delay (2) Updating P-TMSIcurrent at runtime: Initially, (i.e., how many intervals must pass before a given key the UE and the MME choose the first P-TMSI from is disclosed) to be equal to one paging cycle. Ls as the P-TMSIcurrent . In the event of a paging mes- UE bootstrapping. When the UE initiates the attach sage being sent, the MME uses the P-TMSIcurrent to procedure, the base-station shares the key for the pre- address the UE. Upon receiving the paging message, vious interval Ki-1 with the encrypted and integrity the UE re-connects to the base-station and to the core protected rrc_connection_reconfiguration message. network, and sends a service_request message to the The UE stores it and uses it later (after reception of MME. The UE then updates its P-TMSIcurrent with the a paging message) to verify whether the disclosed key next P-TMSI value in Ls . Once the MME receives the belong to base-station’s legitimate key-chain. service_request message from the UE, it also updates Signing. In each paging cycle, the base-station selects its P-TMSIcurrent accordingly. the corresponding 32-bit key Ki from the one-way chain (3) Regenerating the P-TMSI store: The UE and and uses it to compute the MAC for any paging message the MME regenerate Ls after it gets depleted, using the m sent in that paging cycle. For this, the base-station saved context CTX. uses the HMAC-SHA256 algorithm with the chosen key Ki . Finally, base-station appends the truncated first 32- 5.2 TESLA-Based Authentication for bits of this MAC (MACm ∈ {0, 1}32 ) to the paging mes- Paging Messages (PTESLA) sage, along with the key for the previous paging cycle (Ki-1 ). The signing process is illustrated in the Figure 7. For PTESLA to work, the UE and the base-station need to be time-synchronized which is inherently provided by HMACKi (m) −→ MACm 0 the master_info_block message during the UE’s initial trunc(MACm 0 ) −→ MACm bootstrapping phase. The base-station also communi- Verification. The UE wakes up at its paging occasion cates the disclosure delay and the initial key to the sub- and checks for any paging message sent by the base- scribers though a secure channel which is established at station. If it receives a paging message, it buffers the the end of the initial attach procedure. In what fol- message along with the 32-bit MAC value for verifica- lows, we specify the details of our adaptation of the tion. The UE then waits for the next paging cycle to ob- TESLA authentication protocol. tain the key used for signing messages in the last paging
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 136 cycle. The UE first verifies if the disclosed key is valid by paging channel hijacking attack by flooding the paging checking if the previously disclosed key can be derived channel with fake/empty paging messages [15] to pre- from it. After verifying the key’s authenticity, the UE vent legitimate ones from being received. In this case, then verifies the MAC of the previously buffered paging the UE will not find its P-TMSI and thus discard the message using the currently disclosed key. messages. Embedding MAC and key in the paging message To prevent such paging channel hijacking attack, we and maintaining backward compatibility. In 4G extend the second approach by also requiring the UE and 5G cellular networks, a paging message contains to randomly authenticate paging messages even when it two sections: 16 UE-specific paging records; 1 shared does not contain any paging record for the UE. This hy- record. Each of the 16 paging records (of maximum 48 brid approach provides protection against paging chan- bit length) contain the identity of the UE for which nel hijacking attacks while minimizing the computa- there is a pending network service. The shared record tional overhead. essentially contains information for emergency notifica- Impact on quality of service(QoS). A drawback of tions for all the UEs who share the same paging oc- this approach for broadcast authentication is the intro- casion. Since the current paging packet-format does not duction of a slight delay in the verification of the paging have any provision for including MAC and key, the base- message. The UE has to buffer the paging message for station uses 2 paging records (out of 16) to accommo- one paging cycle (320 msec to 2.56 sec) till it receives date the 32-bit key (in 1 paging record) and the 32-bit the verification key and is able to verify the paging mes- MAC (in 1 paging record) in the paging message. Our sage. This will have a small impact on the QoS, as the proposed defense mechanisms, thereby, do not break any notification of a call or an SMS will be delayed by 320 existing functionality of the cellular devices and are thus msec to 2.56 sec, i.e., the length of a single paging cycle. backward-compatible with the legacy devices. If the cellular networks deploy our solution and a 5.3 Handling Exceptional Scenarios cellular device unable of handling the P-TMSI or the What if the RRC connection request is dropped? message authentication code (MAC) wants to connect, When refreshing P-TMSI and paging occasion after re- the UE and the network falls back to the existing paging ceiving a paging message, a case of de-synchronization protocol. The capability of the UE to handle P-TMSI could arise among the P-TMSI values at the UE and the and MAC in the paging message is notified to the core MME if the service request procedure is disrupted (due network with the UE initiated attach_request message to dropped/lost rrc_connection_request message) be- during the initial attach procedure. fore completion. This may create a situation where the Verification frequency. Our design requires empty MME updates its P-TMSI, but the UE does not. In paging messages (i.e., no paging records) to be signed this case, the UE will look for both its current P-TMSI too. When a UE receives a paging message on its paging as well as the next P-TMSI in the identifiers/paging occasion, there are three possible approaches to verify records in the paging messages and will maintain two the authenticity of the paging message. paging occasions per paging cycle until it receives a pag- The first approach is to authenticate a paging mes- ing message for a particular P-TMSI. sage first and then check if it contains the UE’s iden- What if the UE switches from one base-station tity (P-TMSI). This approach allows the UE to detect to another? The UE will set up the (RRC layer) con- any paging channel hijacking attempt because the MAC nection with the target base-station first and then per- contained in fake paging messages would fail the verifi- form the tracking area update (TAU) procedure to cation step. The UE may decide to connect to another reconnect to the core network. In the case of refreshing base-station once a certain number of paging message P-TMSI in each paging cycle, the target base-station verification checks fail. With this approach, however, will generate a new random secret seed and share it the UE has to authenticate every paging message, even with the UE to reestablish the P-TMSI lists. though the message does not contain UE’s P-TMSI. What would be the impact of broadcast authen- To address this, we propose the second approach by tication on emergency warnings? Our broadcast which the UE first checks if the paging message contains authentication approach requires the UE to buffer the the UE’s P-TMSI and then authenticates the message. paging message for one paging cycle until it receives the This approach removes the overhead of the UE having verification key in the next paging cycle. Thus, in or- to verify messages not addressed to itself. However, with der to verify the paging messages containing emergency this approach, the attacker might be able to perform a
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 137 warnings, the UE has to wait for anywhere between 320 ber to a unique paging occasion. Both these defenses ms and 2.56 seconds which is fairly insignificant and prevent location tracking attacks against a UE. will not affect the quick dissemination of the emergency • The adversary cannot learn any information about the alerts. IMSI of the target UE by observing the paging messages UE without SIM card. Typically, a UE without a or the paging occasions. Since our proposed approaches SIM card also listens to the paging broadcast channel [3] remove the dependency of the paging occasion on the to receive emergency notifications or emergency phone UE’s static IMSI and instead use the variable P-TMSI to calls, if there is any. In such cases, the UE and the net- compute paging occasion and address the UE in paging work do not perform any mutual authentication and records, there is no leakage of any information about thus they compute the paging occasion based on the the UE’s IMSI value. UE’s IMEI (International Mobile Equipment Identity) • The adversary cannot inject fake paging messages instead of IMSI/TMSI. We also comply with the stan- or emergency alerts without being detected. The UE, dard’s suggestion to use IMEI for computing the paging with our proposed broadcast authentication scheme occasion of a device without SIM card, because our pro- (PTESLA), always verifies the authenticity of a paging posed defenses are based on the assumption that a UE message addressed to itself and also randomly verifies with a valid SIM card will generate the list of P-TMSIs even when the paging message does not contain any pag- with a secret seed which is shared only after the mutual ing record for the UE. The UE, therefore, can detect the authentication with the core network. However, since fake paging messages and any suspicious paging channel emergency warnings and emergency phone calls cannot hijacking attempts when the MAC verification fails. be triggered by the adversary, we argue that paging oc- • The adversary cannot predict the value of next TMSI casion based on the IMEI for a UE without SIM card is by observing current value. With our proposed defenses not vulnerable to linkability (correlation) and location in place, the cellular device and the core network (or the tracking attacks. base-station) will use CSPRNG [14], a random number generator, which has been proven to be secure against crypt-analysis, to generate the list of P-TMSIs. An im- 6 Security Analysis portant property of a CSPRNG is that observing pre- In this section, we discuss how our proposed defense viously generated random numbers from the CSPRNG mechanisms provide the security and the privacy guar- gives no usable information about what the next ran- antees we set out to achieve in Section 4.1. As dis- dom numbers are going to be. This makes it impossible cussed earlier, our defenses do not aim to provide re- for the attacker to predict the next P-TMSI value by siliency against DoS attacks. We assume that the ini- observing the P-TMSIs, making the attacker unable to tialization/bootstrapping phases for the P-TMSI re- correlate two paging messages addressed to the same fresh scheme and PTESLA are performed in accor- UE. We use an HMAC_DRBG [9] for our purposes, dance with the protocol definitions provided in Sec- which uses HMAC to generate random numbers. It has tion 5. We also assume that the attacker is not able a formal proof of security and has been proven to be to tamper with or learn the information contained cryptographically secure [25]. in the encrypted and integrity protected messages • The adversary cannot perform a Man-in-the-Middle rrc_connection_reconfiguration and attach_accept (MitM) attack without being detected. Since PTESLA belonging to the attach procedure. sends the signing keys in plain-text, a MitM attacker • The adversary is not able to confirm whether the user may try to capture the key to sign a fake paging mes- is present in the target area: Our proposed schemes sage and send that to the UE. However, if the attacker achieve this by introducing a new ephemeral UE iden- observes key Ki , and uses it to generate and sign a fake tifier P-TMSI with policies to refresh the P-TMSI val- paging message in the current paging cycle i + 1, the ues, either at every paging cycle or after every paging authentication check will fail as the UE will use the key message reception, such that no two paging messages Ki+1 to authenticate that message instead of Ki . It is, addressed to a UE have the same UE identifier. This de- therefore, impossible for the attacker to sign and inject sign protects against identity correlation attack [18, 23]. a message in a paging cycle without being detected. We also propose to update the paging occasion based on the UE’s P-TMSI to protect against the ToRPEDO- type linkability attack [16] that exploits static paging occasions for the UE and maps the user’s phone num-
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks 138 Refreshing Refreshing after 7 Evaluation after each every paging The goal of this section is to evaluate the effective- paging cycle message ness and the overhead induced by our proposed defense Number of elements in Ls 100 10 mechanisms with respect to computational, memory, Time taken to 0.14 msec 0.017 msec generate/regenerate Ls and communication costs. Ls regeneration required after 128 seconds Depends on number of notifications 7.1 Testbed Setup Memory requirement for 0 bytes 40 bytes Cellular network setup. We implement and evaluate MME (per UE) Memory requirement for 400 bytes 0 bytes our proposed schemes on a testbed setup for 4G cellular base-station (per UE) networks. Since the paging procedures for 4G and 5G Memory requirement for UE 400 bytes 40 bytes cellular networks are fairly similar, the overhead and Table 2. Comparison between two P-TMSI refresh policies based security guarantees for 5G network can be seamlessly on computation and memory requirements. extrapolated from the results for the 4G cellular net- work. and paging occasion refresh policies and the PTESLA Hardware and software components. For our broadcast authentication scheme. testbed, we use a USRP B210 [6] software-defined-radio (SDR) board connected to a desktop PC with an In- 7.2.1 Results for P-TMSI Refresh Policies tel Core i7-6700K at 4.00 GHz and 32 GB DDR4 RAM Computational overhead: For the P-TMSI refresh to function as a legitimate cellular base-station. The policy in which the P-TMSI is updated after each paging PC runs Ubuntu 18.04 operating system. The base- cycle, we set up the list of P-TMSIs Ls to contain 100 station and the core network are set up on the same ma- random numbers. The UE and the base-station, there- chine using the open-source implementations, srsENB fore, regenerate the Ls periodically after every 100-th and srsEPC, respectively, provided by the srsLTE [5] li- paging cycle, i.e., 128 seconds (each paging cycle lasts brary. We modify these open-source libraries to evaluate 1.28 seconds). On the other hand, the policy of updat- our defense mechanisms. ing P-TMSI after a paging message reception requires a To mimic a UE, we use another USRP B210 [6] SDR smaller number of P-TMSI renewals since the number of board connected to a laptop. We modify the srsUE im- paging messages usually sent to a UE within a particu- plementation provided by srsLTE open-source library to lar time-interval is fairly low in practice [16, 18]. There- evaluate our solutions. We were, however, unable to use fore, in the second case, we set up the list Ls to contain commercial mobile devices to test our implementation, only 10 random numbers. To summarize, the policy of because the modems’ firmware for those devices are pro- refreshing TMSI after each paging cycle requires the prietary and closed-source. It is, therefore, important to base-station to generate 100 random numbers for every point out that the computational costs obtained from UE in its service area every 128 seconds whereas the the experimental analysis of our protocols will not be policy of refreshing P-TMSI after every paging message indicative of the computational costs for actual UEs. reception requires only 10 random numbers (assuming However, our results show that the resource costs of our 10 paging messages arrive for the UE in that period) and solutions are fairly negligible and we expect those costs thus significantly reduces the computation overhead. will also be negligible for the actual UEs. Updating P-TMSI after each paging cycle requires Cryptographic libraries used. We use the mbedTLS a 32-bit random seed to be generated by the base- crypto library [4] for generating cryptographically se- station and shared with the UE during the attach cure random numbers. We use HMAC_DRBG to gen- procedure. The base-station takes 0.03 msec to gener- erate the random numbers required for the updating the ate the random seed for a specific UE during the initial P-TMSI values. context setup request. This random seed is sent with Parameter setup. For our evaluations, we set up the the rrc_connection_reconfiguration message to the length of paging cycle T to 128 radio frames (1.28 sec- UE. Both the base-station and the UE initialize the ond) and nB to 128. HMAC_DRBG context using this seed and generate a list Ls consisting of one-hundred 32-bit random num- 7.2 Evaluation Results bers. This list Ls requires 0.14 msec to be generated (or In this subsection, we discuss the computational, mem- regenerated once depleted). The policy of updating P- ory, and communication costs incurred by our P-TMSI
You can also read