Rogue femtocell owners: How Mallory can monitor my devices

Femtocells are small cellular telecommunication base stations that provide improved cellular coverage. These devices provide important improvements in coverage, battery life and throughput, they also present security challenges. We identify a problem which has not been identified in previous studies of femtocell security: rogue owners of femtocells can secretly monitor third-party mobile devices by using the femtocell's access control features. We present traffic analysis of real femtocell traces and demonstrate the ability to monitor mobile devices through classification of the femtocell's encrypted backhaul traffic. We also consider the femtocell's power usage and status LEDs as other side channels that provide information on the femtocell's operation. We conclude by presenting suitable solutions to overcome this problem.

[1]  Jean-Pierre Seifert,et al.  Security analysis of a femtocell device , 2011, SIN '11.

[2]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[3]  Fabrizio Granelli,et al.  Energino: A hardware and software solution for energy consumption monitoring , 2012, 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[4]  Steve Gold Cracking cellular networks via femtocells , 2011, Netw. Secur..

[5]  Charles V. Wright,et al.  Uncovering Spoken Phrases in Encrypted Voice over IP Conversations , 2010, TSEC.

[6]  Douglas N. Knisely,et al.  Standardization of femtocells in 3GPP2 , 2009, IEEE Communications Magazine.

[7]  Roberto Riggio,et al.  A measurement-based model of energy consumption in femtocells , 2012, 2012 IFIP Wireless Days.

[8]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[9]  Jean-Pierre Hubaux,et al.  Security Issues in Next Generation Mobile Networks: LTE and Femtocells , 2010 .

[10]  Douglas N. Knisely,et al.  Standardization of femtocells in 3GPP , 2009, IEEE Communications Magazine.

[11]  M. Al-Qutayri,et al.  Deployment challenges of femtocells in future indoor wireless networks , 2011, 2011 IEEE GCC Conference and Exhibition (GCC).

[12]  Kjell Jørgen Hole,et al.  Securing Wi-Fi Networks , 2005, Computer.

[13]  Hyoung-Kee Choi,et al.  Building Femtocell More Secure with Improved Proxy Signature , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[14]  Ravishankar Borgaonkar,et al.  Femtocells: a Poisonous Needle in the Operator's Hay Stack , 2011 .