Abstract
Distributed denial of service (DDoS) attacks from a large number of compromised mobile devices are a major threat to mobile networks. In this paper, we present a concept, an architecture, and a protocol for a hardware-based attestation which enables mobile devices to efficiently prove that their baseband stack is still trustworthy. Our attestation mechanism enables verification of the baseband stack without using expensive asymmetric cryptographic operations, maintains the ability to update (or recover) the baseband binary, and allows the network to enforce a certain version, state, or configuration of the baseband at network connect. Our approach represents an efficient method to block devices with a compromised baseband stack and thus prevents distributed denial of service attacks to mobile networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
3rd Generation Partnership Project (3GPP): TS 23.002, Network Architecture. Technical Specification (1999-2012)
3rd Generation Partnership Project (3GPP): TS 33.102, 3G security; Security architecture. Technical Specification (1999-2012)
3rd Generation Partnership Project (3GPP): TS 33.401, System Architecture Evolution (SAE); Security architecture. Technical Specification (1999-2012)
Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A.R., Stüble, C.: A Protocol for Property-Based Attestation. In: STC, pp. 7–16. ACM (2006)
Forsberg, D., Horn, G., Moeller, W.D., Niemi, V.: LTE Security. Wiley (2010)
grugq: Base Jumping: Attacking the GSM baseband and base station
Krauß, C., Stumpf, F., Eckert, C.: Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007)
Mulliner, C., Golde, N., Seifert, J.P.: SMS of death: from analyzing to attacking mobile phones on a large scale. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 24. USENIX Association, Berkeley (2011)
Nauman, M., Khan, S., Zhang, X., Seifert, J.-P.: Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 1–15. Springer, Heidelberg (2010)
Niemi, A., Arkko, J., Torvinen, V.: Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA). RFC 3310
Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW, pp. 67–77. ACM (2004)
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: USENIX Security Symposium, SSYM 2004. USENIX Association, Berkeley (2004)
Traynor, P., et al.: On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009. ACM, New York (2009)
Trusted Computing Group (TCG): Mobile Trusted Module (MTM) Specification
Trusted Computing Group (TCG): Trusted Platform Module (TPM) Specification
Wen, Y., Peng, X., Chen, S., Zhao, H.: A Secure Access Approach of UMTS Terminal Based on Trusted Computing. In: Proceedings of the Second International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010, USA, 5 pages (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wagner, S., Wessel, S., Stumpf, F. (2012). Attestation of Mobile Baseband Stacks. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-34601-9_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34600-2
Online ISBN: 978-3-642-34601-9
eBook Packages: Computer ScienceComputer Science (R0)