GSM and GPRS performance of IPSEC data communication

Me, Gianluigi and Italiano, Giuseppe and Spagnoletti, Paolo (2006) GSM and GPRS performance of IPSEC data communication. In: e-Business and Telecommunication Networks. Springer, NLD, p. 134-142.

Corporate Creators: Dipartimento di Informatica, Sistemi e Produzione, Dipartimento di Informatica, Sistemi e Produzione, CeRSI - LUISS Guido Carli

[img]
Preview
PDF (post-print) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
514Kb

Official URL: http://www.springerlink.com/content/v45l1137566587...

Abstract/Index

Cellular Internet services must grapple with the added security threats posed by the radio transmission, open to eavesdropping. Furthermore, the combination of always-on connectivity and an interface to the public Internet means high speed data services has to cope with the same security issues that can be found in the wired environment.Confidentiality of GSM/GPRS communications has been provided only in BSME/GGSN-ME by COMP128/GEA+algorithms, whose strength is often not believed adequate for corporate/governmental requirements. Furthermore, A5/1 and A5/2 algorithms have been recently attacked with real time ciphertext only cryptanalysis by Barkan, Biham and Keller. To provide an adequate level of security, it is often argued to employ IPSec over the GSM/GPRS framework. We provide experimental evidences that IPSec is a viable solution to provide the desired level of security. In particular, the overhead generated is tolerable where high sensitive/critical communications take place. We expect that our findings could help better understanding how securing a deployed GSM/GPRS network which corporate/governmental infrastructures can rely on and what performances can be expected by using IPsec over these media.

References

[1]. Barkan, Biham and Keller, "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication", Proceedings Crypto 2003" http://www.cs.technion.ac.il/users/wwwb/cgi-bin/trget. cgi/2003/CS/CS-2003-05.ps.gz, 2003. [2]. Biryukov A, Shamir A, Wagner D., “Real time cryptanalysis of A5/1 on a PC”, Fast Software Encryption. 7th International Workshop, FSE 2000. Proceedings (LNCSVol.1978). Springer-Verlag. 2001, pp.1-18. Berlin, Germany [3]. Briceno, Goldberg, Wagner, “GSM Cloning”, http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html, 1998 [4]. Ekdahl, P. Johansson, T. “Another attack on A5/1”, IEEE International Symposium on Information Theory - Proceedings 2001. p 160 (IEEE cat. n 01CH37252) [5]. Brookson , GSM (and PCN) Security and Encryption, 1994, http://www.brookson.com/gsm/gsmdoc.htm. [6]. M. Walker and T. Wright, Security. In F. Hillebrand, editor, GSM and UMTS: The Creation of Global Mobile Communication, pp. 385-406, John Wiley & Sons, New York, 2002. [7]. R. J. “Bud” Bates, GPRS, McGraw Hill TELECOM, 2002. [8]. Jörg Eberspächer and Hans-Jörg Vögel. GSM switching, services and Protocols. John Wiley and Sons, 1999. [9]. Garg, Vijay K. Principles and applications of GSM. Upper Saddle River (NJ) Prentice Hall PTR, 1999 [10]. ETS 300 534. Digital Cellular Telecommunication System (Phase 2); Security Related Network Functions. ETSI, August 1997. [11]. ETSI TS 100 929. Digital Cellular Telecommunication System (Phase 2); Security related network functions. ETSI, November 1999. [12]. Lauri Pesonen, GSM Interception, http://www.dia.unisa.it/ads.dir/corsosecurity/www/CO RSO-9900/a5/Netsec/netsec.html#chap1, Nov1999, [13]. Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, Wiley, 1995 [14]. N. Doraswamy and D. Harkins, “IPSec: The New Security Standard for the Internet, Intranets, and VPN”, PH PTR, 1999. [15]. O. Shaham, S. Aviran, E. Simony, Y. Shapira, “Rate Control for Advanced Wireless Networks” , http://www.wisdom.weizmann.ac.il/~odedsh/ [16]. M.Meyer, TCP Performance over GPRS, In Proc. of IEEE WCNC, 1999, http://www.cs.helsinki.fi/u/gurtov/reiner/wcnc99.pdf [17]. RFC 2406 [18]. R. Ludwig and B. Rathonyi, Link Layer Enhancement for TCP/IP over GSM, Proceedings of the IEEE INFOCOM ’99, April, pp. 415-422.

Item Type:Monograph Section
Research documents and activity classification:Book Sections > Monograph's chapters
Divisions:Department of Business and Management > CeRSI (Information Systems Research Centre)
Uncontrolled Keywords:Mobile application, Security
MIUR Scientific Area:Area 13 - Economics and Statistics > SECS-P/10 Business Organisation
Area 09 - Industrial and Information Engineering > ING-INF/05 Data Processing Systems
DOI:10.1007/1-4020-4761-4_9
Deposited By:Paolo Spagnoletti
Deposited On:31 Aug 2011 19:52
Last Modified:31 Aug 2011 19:52

Repository Staff Only: item control page