anti-cloning - western michigan university · pdf fileestablishes an anti-cloning scheme which...

30
1 Anti-Cloning: Towards a Fraud-Prevention Framework for Software Defined Radio Mobile Devices by Alessandro Brawerman & John A. Copeland School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30318, USA Presented by: Ravi Yellepeddy CS6910-ACIS Department of Computer Science Department of Computer Science Western Michigan University Western Michigan University Instructor: Instructor: Dr. Dr. Leszek Leszek T. T. Lilien Lilien , Fall 2006 , Fall 2006

Upload: duongxuyen

Post on 05-Feb-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

1

Anti-Cloning:Towards a Fraud-Prevention Framework for Software Defined Radio Mobile Devices

byAlessandro Brawerman & John A. Copeland

School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30318, USA

Presented by: Ravi Yellepeddy

CS6910-ACIS

Department of Computer ScienceDepartment of Computer Science

Western Michigan UniversityWestern Michigan University

Instructor: Instructor: Dr. Dr. LeszekLeszek T. T. LilienLilien, Fall 2006, Fall 2006

Page 2: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

2

Introduction

� A software defined radio mobile device (SDR-MD) is capable of having its operation changed by dynamically loading radio reconfiguration data (R-CFG files) over the air.

� One of the key issues in SDR wireless communication involves security.

Page 3: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

3

Introduction (contd….)

� This paper presents a fraud-prevention framework for software defined radio mobile devices

� The framework offers

-security monitoring against malicious attacks and

viruses.

-protects sensitive information

-creates and protects an identity for the system

- employs a secure protocol for radio configuration download.

-and finally, establishes an anti-cloning scheme

Page 4: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

4

Some Security Concerns

� R-CFG Download, Storage and Installation

� User’s Privacy

� SDR-MD Cloning

Page 5: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

5

Background

� R-CFG Download, Storage and Installation

-All security operations take place within tamper-proof hardware.

� User’s Privacy

-Using Secure Protocol

� SDR-MD Cloning

-Cloning of the SIM Card

-Clone the mobile device

Page 6: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

6

Fraud Prevention Framework

� The SDR device manager (SDR-DM) is responsible for managing all the communication with the outside world and for requesting the services of each module when needed.

� The environment discoverer module is responsible for detecting which wireless communication technologies are available in the current SDR-MD’s environment.

� The R-CFG manager is responsible for managing the R-CFG files currently stored in the device and the R-CFG currently installed. It also informs the SDR-DM when a different R-CFG is needed.

� The CFG manager is responsible for managing the configuration (CFG) file. The CFG file is provided by the wireless operator (WO) and is used to set the device’s phone number.

Page 7: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

7

Fraud-Prevention Framework

Page 8: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

8

Anti-Cloning Scheme

� One of the most dangerous threats in SDR is cloning.

� Fraud Prevention Framework is designed to provide a core set of hardware and software technologies that provide the basis for a wireless network environment free of cloned units.

� The proposed anti cloning scheme not only detects cloned units, but also elevates the level of difficulty to clone a valid unit.

Page 9: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

9

Entering a Valid State

Invalid state

Temporarystate

Valid state

Temporarystate

Needs CFG

Gets CFG

GeTs

RCFG

Needs

RCFG

Gets AC

�AC-Attestation Credential

�CFG- Configuration Data

Page 10: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

10

Entering a valid state (Steps)

1. SDR-MD comes from the manufacturer in an invalid state

2. SDR-MD enters a temporary state after obtaining AC.

3. SDR-MD finally reaches a valid state after obtaining CFG.

Page 11: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

11

Attestation Credential Protocol

Invalid state

Temporarystate

Valid state

Temporarystate

Needs CFG

Gets CFG

GeTs

R CFG

Needs

RCFG

Gets AC

Attestation Credential Protocol

Page 12: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

12

Attestation Credential Protocol (Steps)

� The SDR-MD contacts the Privacy CA for AC.

� Privacy CA generates an AK pair and SDR-MD authenticates the privacy CA.

� SDR-MD obtains the AK pair and acknowledges the privacy CA.

Page 13: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

13

Attestation Credential Protocol (ACP)

Page 14: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

14

Keywords used in ACP

� C -A 48-bit random number (nonce)

� Attestation-It is used to check integrity status of a certain component. It is defined as the function Att(X), which results in the hash of component X.

� Endorsement key (EK)-It is used to uniquely identify the SDR-MD. It is never disclosed by the device. Its size is also 2048 bits.

� Attestation credential (AC)-It is used to identify the SDR-MD. It is signed by the privacy credential authority (Privacy CA) and it is presented whenever the user tries to use the network services. AC = [AKpub] Privacy CA

Page 15: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

15

CFG Update Protocol

Invalid state

Temporarystate

Valid state

Temporarystate

Needs CFG

Gets CFG

GeTs

R CFG

Needs

RCFG

Gets AC

CFG Update Protocol

Page 16: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

16

CFG Update Protocol

Page 17: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

17

CFG Update Protocol (steps)

1. The SDR-MD sends its AC and the value of R2 = Att(CFG).

2. WO (Wireless Operator) checks for the AC

-terminates the connection for cloned units whose AC is Null.

- if it is a valid unit, The WO then obtains C and generates a nonce C to authenticate the unit.

contd….

Page 18: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

18

CFG Update Protocol (steps)

3. Upon receiving KAKpub{C//C’} from the WO, the unit authenticates the WO if the received C is equal to the one previously generated.

Attestation key pair (AK)-It is used to obtain the attestation credential. Composed by the 2048-bit attestation private key (AKpriv) and public key (AKpub).

4. The WO authenticates the unit by verifying C ‘ . the WO generates a new CFG and stores the MD(CFG) value in the DB

Page 19: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

19

CFG Update Protocol (steps)

5. the AM Eng measures Att(CFG) and writes the value in R2. The unit then sends this value encrypted by the WO’s public key to the WO.

6. The WO verifies the value and acknowledges the unit if the comparison is positive.

Page 20: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

20

Cloning Aware Procedure

� Cloning aware procedure is detecting whether the SDR-MD is a cloned unit or not.

It is implemented:

-in SDR-MD side

-in WO side

Page 21: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

21

Cloning Aware Procedure: ON SDR-MD side

Page 22: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

22

Cloning Aware Procedure: ON SDR-MD side

� After the unit has connected to the WO and requested a service, the cloning-aware procedure starts in the SDR-MD side.

� The AC Eng compares the values and signalizes 1 for a valid unit, if Att(EK) = R0 and Att(CFG) = R2.

� 0 for a cloned unit, if Att(EK) != R0 or Att(CFG) != R2.

Page 23: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

23

Cloning Aware Procedure: ON WO side

Page 24: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

24

Cloning Aware Procedure: ON WO side

� The procedure works basically as an authentication module.

� The WO obtains the AC and verifies if it is valid or null. If the AC is null, the WO terminates the connection, since the unit is a clone.

Page 25: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

25

Conclusions : 3 Lemmas

� Lemma 1. The Privacy CA only attests the identity of SDR-MDs that have valid EKs.

� Lemma 2. No SDR-MD obtains a CFG file unless its identity is successfully proved.

� Lemma 3. Only valid CFG files are installed in each SDR-MD.

Page 26: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

26

CFG Update Protocol

Page 27: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

27

Conclusions :2 Theorems

� Theorem 1. It is guaranteed that there is no possibility to clone an SDR-MD over the air.

� Theorem 2. It is guaranteed that only a valid SDR-MD can use the wireless operator services.

Page 28: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

28

Summary

� To greatly enhance the overall security of SDR-MDs, a fraud prevention framework is proposed.

� The fraud-prevention framework is composed of new pieces of hardware, modules, and protocols.

� establishes an anti-cloning scheme which guarantees that no units can be cloned over the air.

� Even if cloned units exist, the anti-cloning scheme is able to identify and deny services to those units.

Page 29: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

29

References� Towards a Fraud-Prevention Framework for Software Defined RadioMobile Devices

� An Anti-Cloning Framework for Software Defined Radio Mobile Devices

Alessandro BrawermanSchool of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30318, USAEmail: [email protected]

John A. CopelandSchool of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30318, USAEmail: [email protected]

Received 29 September 2004; Revised 8 March 2005

� http://www.findarticles.com

� http://www.webopedia.com

� http://www.wikipedia.org

� http://SDRforum.org

Page 30: Anti-Cloning - Western Michigan University · PDF fileestablishes an anti-cloning scheme which guarantees that no units can be cloned over the air. Even if cloned units exist, the

30