Symbolic analysis for security of roaming protocols in mobile networks [extended abstract]

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Both GSM (2G) and UMTS (3G) wireless standards are deployed worldwide. Like the 4G standard now appearing, these standards provide for mobile devices with differing capabilities to roam between providers or technologies. This poses serious challenges in ensuring authentication and other security properties. Automated analysis of security properties is needed to cope with the large number of possible scenarios. While some attacks exploit weaknesses in cryptographic functions, many attacks exploit flaws or other features of the protocol design. The latter attacks can be found using symbolic (Dolev-Yao) models. This paper demonstrates the use of a fully automatic tool to exhaustively analyze symbolic models of GSM, UMTS, and the respective roaming protocols. The results include the demonstration of known attacks as well as the confirmation of expected properties.

Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, Revised Selected Papers
Pages480-490
Number of pages11
DOIs
StatePublished - 2012
Event7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011 - London, United Kingdom
Duration: 7 Sep 20119 Sep 2011

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume96 LNICST
ISSN (Print)1867-8211

Conference

Conference7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011
Country/TerritoryUnited Kingdom
CityLondon
Period7/09/119/09/11

Keywords

  • GSM
  • Mobile networks
  • UMTS
  • authentication
  • automated analysis
  • roaming protocols
  • secrecy
  • security
  • symbolic modeling

Fingerprint

Dive into the research topics of 'Symbolic analysis for security of roaming protocols in mobile networks [extended abstract]'. Together they form a unique fingerprint.

Cite this