ABSTRACT
Multi-SIM capable mobile phones have been gaining popularity. Due to the absence of standardized solution, there are implementation variations in the User Equipment (UE) from both hardware and software perspectives. Especially, coordination of call events on multiple SIMs requires standardization as it involves interaction between the Core Network (CN) and the UE to avoid negative user experience such as missed incoming call or interrupted data session. 3rd Generation Partnership Project (3GPP) has an ongoing work to addresses this area in Release 17. However, security aspects are outside the scope, including mechanisms to verify multiple SIMs in a device. In this paper, we address this gap by proposing variations of verification schemes using crypgographic operations to help mobile networks to identify the device capability of the UE and verify multiple SIMs in it. The proposed mechanisms are simple and effective to meet the goal. Based on our investigation, we believe this is the first proposal to address this aspect in the multi-SIM devices in the mobile system.
- 3GPP. 2019. Service requirements for the Evolved Packet System (EPS). Technical Specification (TS) 22.278. 3rd Generation Partnership Project (3GPP). https: //www.3gpp.org/DynaReport/22278.htm Version 17.1.0.Google Scholar
- 3GPP. 2020. Service aspects, service principles. Technical Specification (TS) 22.101. 3rd Generation Partnership Project (3GPP). https://www.3gpp.org/DynaReport/ 22101.htm Version 17.2.0.Google Scholar
- 3GPP. 2020. Service requirements for the 5G system; Stage 1. Technical Specification (TS) 22.261. 3rd Generation Partnership Project (3GPP). https://www.3gpp.org/ DynaReport/22261.htm Version 17.3.0.Google Scholar
- 3GPP. 2020. Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification. Technical Specification (TS) 35.206. 3rd Generation Partnership Project (3GPP). https://www.3gpp.org/DynaReport/ 35206.htm Version 16.0.0.Google Scholar
- 3GPP. 2020. Study on system enablers for devices having multiple Universal Subscriber Identity Modules (USIM). Technical Report (TR) 23.761. 3rd Generation Partnership Project (3GPP). https://www.3gpp.org/DynaReport/23761.htm Version 1.0.0.Google Scholar
- David Basin, Jannik Dreier, Lucca Hirschi, Saa Radomirovic, Ralf Sasse, and Vincent Stettler. 2018. A formal analysis of 5G authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1383--1396. Google Scholar
Digital Library
- Rolf Blom, K Norrman, M Naslund, S Rommer, and B Sahlin. 2010. Security in the evolved packet system. Ericsson Review, Feb (2010).Google Scholar
- Jin Cao, Maode Ma, Hui Li, Yueyu Zhang, and Zhenxing Luo. 2013. A survey on security aspects for LTE and LTE-A networks. IEEE communications surveys & tutorials 16, 1 (2013), 283--302.Google Scholar
- Cas Cremers and Martin Dehnel-Wild. 2019. Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. (2019).Google Scholar
- Farshad Family. 2012. The Rise of Multi-SIM users: Customers shifting to dual SIM phones to have effective control over costs. Retrieved May 13, 2020 from https://www.nielsen.com/wp-content/uploads/sites/3/2019/04/ Featured20Insights20--20The20Rise20of20Multi-SIM20Users.pdfGoogle Scholar
- GSMA. 2018. Requirements for Multi SIM Devices. Technical Specification (TS) 37. GSM Association. Version 5.0.Google Scholar
- Syed Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino. 2018. LTEInspector: A systematic approach for adversarial testing of 4G LTE. In Network and Distributed Systems Security (NDSS) Symposium 2018.Google Scholar
Cross Ref
- Tore Jønvik, Ivar Jørstad, Feng Boning, et al. 2009. Strong authentication using dual SIM. In 2009 13th International Conference on Intelligence in Next Generation Networks. IEEE, 1--4.Google Scholar
- Roger Piqueras Jover. 2013. Security attacks against the availability of LTE mobility networks: Overview and research directions. In 2013 16th international symposium on wireless personal multimedia communications (WPMC). IEEE, 1--9.Google Scholar
- Mohsin Khan, Philip Ginzboorg, Kimmo Järvinen, and Valtteri Niemi. 2018. Defeating the downgrade attack on identity privacy in 5G. In International Conference on Research in Security Standardisation. Springer, 95--119.Google Scholar
Cross Ref
- Thomas Mundt, Alexander Gladisch, Simon Rietschel, Johann Bauer, Johannes Goltz, and Simeon Wiedenmann. 2018. General Security Considerations of Lo- RaWAN Version 1.1 Infrastructures. In Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access. 118--123. Google Scholar
Digital Library
Index Terms
Verification Schemes of Multi-SIM Devices in Mobile Communication Systems
Recommendations
Moving toward seamless mobility: state of the art and emerging aspects in standardization bodies
The challenge to provide seamless mobility in the near future emerges as a key topic in various standardization bodies. This includes first of all the support of seamless handover between homogeneous networks. Distinct technologies--such as IEEE ...
IMS Network Architecture
ICFCC '09: Proceedings of the 2009 International Conference on Future Computer and CommunicationThere is a rapid growth and evolution in the area of telecommunications and network operators are expected to provide seamless integration of all communication applications on a single system. In these circumstances IMS has emerged out as a key player. ...
An analytical evaluation of mobility management in integrated WLAN-UMTS networks
Ensuring uninterrupted service continuity for handoff calls in an all-IP inter-networked heterogeneous environment requires successful session management among participating access networks. As such, a mobility-aware novel interworking architecture is ...





Comments