GSM and GPRS performance of IPSEC data communication

Cellular Internet services must grapple with the added security threats posed by the radio transmission, open to eavesdropping. Furthermore, the combination of always-on connectivity and an interface to the public Internet means high speed data services has to cope with the same security issues that can be found in the wired environment.Confidentiality of GSM/GPRS communications has been provided only in BSME/GGSN-ME by COMP128/GEA+algorithms, whose strength is often not believed adequate for corporate/governmental requirements. Furthermore, A5/1 and A5/2 algorithms have been recently attacked with real time ciphertext only cryptanalysis by Barkan, Biham and Keller. To provide an adequate level of security, it is often argued to employ IPSec over the GSM/GPRS framework. We provide experimental evidences that IPSec is a viable solution to provide the desired level of security. In particular, the overhead generated is tolerable where high sensitive/critical communications take place. We expect that our findings could help better understanding how securing a deployed GSM/GPRS network which corporate/governmental infrastructures can rely on and what performances can be expected by using IPsec over these media.

[1]  Michael Meyer TCP performance over GPRS , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[2]  Vijay K. Garg,et al.  Principles and applications of GSM , 1999 .

[3]  Reiner Ludwig,et al.  Link layer enhancements for TCP/IP over GSM , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[4]  Naganand Doraswamy,et al.  Ipsec: the new security standard for the internet , 1999 .

[5]  N Levine GSM and UMTS: the creation of global mobile communication , 2002 .

[6]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[7]  Alex Biryukov,et al.  Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.

[8]  Thomas Johansson,et al.  Another attack on A5/1 , 2003, IEEE Trans. Inf. Theory.

[9]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .