You are on page 1of 18

WELCOME TO

WIRELESS AND MOBILE


NETWORK SECURITY
Chapter 11: Security in Next
Generation Mobile Networks

1. Introduction
2. The SIP
3. VoIP
4. IP Multimedia Subsystem (IMS)
5. 4G security

8/11/2022 503075 – Welcome 2


Introduction

8/11/2022 503075 – Welcome 3


The SIP

▪ SIP generalities
▪ User Agent (UA)
▪ Registar
▪ Proxy
▪ Redirect Server
▪ Session Border Controller (SBC)

8/11/2022 503075 – Welcome 4


The SIP

▪ SIP generalities

8/11/2022 503075 – Welcome 5


The SIP

▪ SIP security flaws


▪ Registration hijacking
▪ Impersonating a proxy
▪ Tearing down sessions
▪ Integrity
▪ Denial-of-Service (DoS)

8/11/2022 503075 – Welcome 6


The SIP

▪ Making SIP secure

8/11/2022 503075 – Welcome 7


VoIP

▪ Media gateway (MG)


▪ Media Gateway Controller (MGC)
▪ Signaling Gateway (SG)
▪ IP-enabled Service Control Point (IP-SCP)

8/11/2022 503075 – Welcome 8


VoIP

▪ Stream Control Transport Protocol (SCTP)


▪ Session Initiation Protocol (SIP) Media Gateway
Controller (MGC)

8/11/2022 503075 – Welcome 9


VoIP

▪ VoIP security flaws


▪ Confidentiality
▪ Eavesdropping
▪ Man-in-the-Middle
▪ DoS
▪ Non-repudiation
▪ VoIP servers and terminals

8/11/2022 503075 – Welcome 10


IP Multimedia Subsystem (IMS)

▪ IMS architecture
▪ Home Subscriber Server (HSS)
▪ Media Resource Function (MRF)
▪ Application Server Function (AS)
▪ Serving Call Session Control Function (S-CSCF)
▪ Interrogating Call Session Control Function (I-
CSCF)
▪ Proxy Call Sessions Control Function (P-CSCF)
▪ Breakout Gateway Control Function (BGCF)

8/11/2022 503075 – Welcome 11


IP Multimedia Subsystem (IMS)

▪ IMS architecture

8/11/2022 503075 – Welcome 12


IP Multimedia Subsystem (IMS)

▪ IMS security
▪ IMS core network security
▪ Confidentiality and integrity
▪ Authentication
▪ Re-authentication
▪ Confidentiality
▪ Integrity

8/11/2022 503075 – Welcome 13


IP Multimedia Subsystem (IMS)

▪ IMS security flaws


▪ Early IMS
▪ Unauthenticated re-registration
▪ P-CSCF bypass

8/11/2022 503075 – Welcome 14


4G security

8/11/2022 503075 – Welcome 15


Confidentiality

▪ Terminology
▪ Network interception
▪ User interception
▪ Local interception

8/11/2022 503075 – Welcome 16


Confidentiality
▪ Protection of interception mechanisms
▪ Flexible interception
▪ Centralized administration
▪ Confidentiality, integrity and authentication

8/11/2022 503075 – Welcome 17


Q&A

8/11/2022 502047 – Welcome 18

You might also like