Skip to main content

Attestation of Mobile Baseband Stacks

  • Conference paper
Network and System Security (NSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7645))

Included in the following conference series:

Abstract

Distributed denial of service (DDoS) attacks from a large number of compromised mobile devices are a major threat to mobile networks. In this paper, we present a concept, an architecture, and a protocol for a hardware-based attestation which enables mobile devices to efficiently prove that their baseband stack is still trustworthy. Our attestation mechanism enables verification of the baseband stack without using expensive asymmetric cryptographic operations, maintains the ability to update (or recover) the baseband binary, and allows the network to enforce a certain version, state, or configuration of the baseband at network connect. Our approach represents an efficient method to block devices with a compromised baseband stack and thus prevents distributed denial of service attacks to mobile networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3rd Generation Partnership Project (3GPP): TS 23.002, Network Architecture. Technical Specification (1999-2012)

    Google Scholar 

  2. 3rd Generation Partnership Project (3GPP): TS 33.102, 3G security; Security architecture. Technical Specification (1999-2012)

    Google Scholar 

  3. 3rd Generation Partnership Project (3GPP): TS 33.401, System Architecture Evolution (SAE); Security architecture. Technical Specification (1999-2012)

    Google Scholar 

  4. Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A.R., Stüble, C.: A Protocol for Property-Based Attestation. In: STC, pp. 7–16. ACM (2006)

    Google Scholar 

  5. Forsberg, D., Horn, G., Moeller, W.D., Niemi, V.: LTE Security. Wiley (2010)

    Google Scholar 

  6. grugq: Base Jumping: Attacking the GSM baseband and base station

    Google Scholar 

  7. Krauß, C., Stumpf, F., Eckert, C.: Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Mulliner, C., Golde, N., Seifert, J.P.: SMS of death: from analyzing to attacking mobile phones on a large scale. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 24. USENIX Association, Berkeley (2011)

    Google Scholar 

  9. Nauman, M., Khan, S., Zhang, X., Seifert, J.-P.: Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 1–15. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  10. Niemi, A., Arkko, J., Torvinen, V.: Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA). RFC 3310

    Google Scholar 

  11. Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW, pp. 67–77. ACM (2004)

    Google Scholar 

  12. Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: USENIX Security Symposium, SSYM 2004. USENIX Association, Berkeley (2004)

    Google Scholar 

  13. Traynor, P., et al.: On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009. ACM, New York (2009)

    Google Scholar 

  14. Trusted Computing Group (TCG): Mobile Trusted Module (MTM) Specification

    Google Scholar 

  15. Trusted Computing Group (TCG): Trusted Platform Module (TPM) Specification

    Google Scholar 

  16. Wen, Y., Peng, X., Chen, S., Zhao, H.: A Secure Access Approach of UMTS Terminal Based on Trusted Computing. In: Proceedings of the Second International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010, USA, 5 pages (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wagner, S., Wessel, S., Stumpf, F. (2012). Attestation of Mobile Baseband Stacks. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34601-9_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34600-2

  • Online ISBN: 978-3-642-34601-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics