skip to main content
10.1145/3416012.3424620acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Verification Schemes of Multi-SIM Devices in Mobile Communication Systems

Published:16 November 2020Publication History

ABSTRACT

Multi-SIM capable mobile phones have been gaining popularity. Due to the absence of standardized solution, there are implementation variations in the User Equipment (UE) from both hardware and software perspectives. Especially, coordination of call events on multiple SIMs requires standardization as it involves interaction between the Core Network (CN) and the UE to avoid negative user experience such as missed incoming call or interrupted data session. 3rd Generation Partnership Project (3GPP) has an ongoing work to addresses this area in Release 17. However, security aspects are outside the scope, including mechanisms to verify multiple SIMs in a device. In this paper, we address this gap by proposing variations of verification schemes using crypgographic operations to help mobile networks to identify the device capability of the UE and verify multiple SIMs in it. The proposed mechanisms are simple and effective to meet the goal. Based on our investigation, we believe this is the first proposal to address this aspect in the multi-SIM devices in the mobile system.

References

  1. 3GPP. 2019. Service requirements for the Evolved Packet System (EPS). Technical Specification (TS) 22.278. 3rd Generation Partnership Project (3GPP). https: //www.3gpp.org/DynaReport/22278.htm Version 17.1.0.Google ScholarGoogle Scholar
  2. 3GPP. 2020. Service aspects, service principles. Technical Specification (TS) 22.101. 3rd Generation Partnership Project (3GPP). https://www.3gpp.org/DynaReport/ 22101.htm Version 17.2.0.Google ScholarGoogle Scholar
  3. 3GPP. 2020. Service requirements for the 5G system; Stage 1. Technical Specification (TS) 22.261. 3rd Generation Partnership Project (3GPP). https://www.3gpp.org/ DynaReport/22261.htm Version 17.3.0.Google ScholarGoogle Scholar
  4. 3GPP. 2020. Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification. Technical Specification (TS) 35.206. 3rd Generation Partnership Project (3GPP). https://www.3gpp.org/DynaReport/ 35206.htm Version 16.0.0.Google ScholarGoogle Scholar
  5. 3GPP. 2020. Study on system enablers for devices having multiple Universal Subscriber Identity Modules (USIM). Technical Report (TR) 23.761. 3rd Generation Partnership Project (3GPP). https://www.3gpp.org/DynaReport/23761.htm Version 1.0.0.Google ScholarGoogle Scholar
  6. David Basin, Jannik Dreier, Lucca Hirschi, Saa Radomirovic, Ralf Sasse, and Vincent Stettler. 2018. A formal analysis of 5G authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1383--1396. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Rolf Blom, K Norrman, M Naslund, S Rommer, and B Sahlin. 2010. Security in the evolved packet system. Ericsson Review, Feb (2010).Google ScholarGoogle Scholar
  8. Jin Cao, Maode Ma, Hui Li, Yueyu Zhang, and Zhenxing Luo. 2013. A survey on security aspects for LTE and LTE-A networks. IEEE communications surveys & tutorials 16, 1 (2013), 283--302.Google ScholarGoogle Scholar
  9. Cas Cremers and Martin Dehnel-Wild. 2019. Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. (2019).Google ScholarGoogle Scholar
  10. Farshad Family. 2012. The Rise of Multi-SIM users: Customers shifting to dual SIM phones to have effective control over costs. Retrieved May 13, 2020 from https://www.nielsen.com/wp-content/uploads/sites/3/2019/04/ Featured20Insights20--20The20Rise20of20Multi-SIM20Users.pdfGoogle ScholarGoogle Scholar
  11. GSMA. 2018. Requirements for Multi SIM Devices. Technical Specification (TS) 37. GSM Association. Version 5.0.Google ScholarGoogle Scholar
  12. Syed Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino. 2018. LTEInspector: A systematic approach for adversarial testing of 4G LTE. In Network and Distributed Systems Security (NDSS) Symposium 2018.Google ScholarGoogle ScholarCross RefCross Ref
  13. Tore Jønvik, Ivar Jørstad, Feng Boning, et al. 2009. Strong authentication using dual SIM. In 2009 13th International Conference on Intelligence in Next Generation Networks. IEEE, 1--4.Google ScholarGoogle Scholar
  14. Roger Piqueras Jover. 2013. Security attacks against the availability of LTE mobility networks: Overview and research directions. In 2013 16th international symposium on wireless personal multimedia communications (WPMC). IEEE, 1--9.Google ScholarGoogle Scholar
  15. Mohsin Khan, Philip Ginzboorg, Kimmo Järvinen, and Valtteri Niemi. 2018. Defeating the downgrade attack on identity privacy in 5G. In International Conference on Research in Security Standardisation. Springer, 95--119.Google ScholarGoogle ScholarCross RefCross Ref
  16. Thomas Mundt, Alexander Gladisch, Simon Rietschel, Johann Bauer, Johannes Goltz, and Simeon Wiedenmann. 2018. General Security Considerations of Lo- RaWAN Version 1.1 Infrastructures. In Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access. 118--123. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Verification Schemes of Multi-SIM Devices in Mobile Communication Systems

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  MobiWac '20: Proceedings of the 18th ACM Symposium on Mobility Management and Wireless Access
                  November 2020
                  148 pages
                  ISBN:9781450381192
                  DOI:10.1145/3416012

                  Copyright © 2020 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 16 November 2020

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  Overall Acceptance Rate83of272submissions,31%
                • Article Metrics

                  • Downloads (Last 12 months)25
                  • Downloads (Last 6 weeks)1

                  Other Metrics

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader