Never Gonna Give You Up: Exploring Deprecated NULL Ciphers in Commercial VoWiFi Deployments

Veröffentlichungen: Beitrag in BuchBeitrag in KonferenzbandPeer Reviewed

Abstract

In today’s cellular network evolutions, such as 4G and 5G, the IMS
(IP Multimedia Subsystem) serves as a crucial component in manag-
ing voice calls and handling short messages. Besides accessing the
IMS over the traditional radio layer, many operators use Voice over
Wi-Fi (VoWiFi) allowing customers to dial into their core network
over the public Internet using an (insecure) Wi-Fi connection.
To protect against malicious actors on the WiFi or Internet do-
main, the traffic is sent over a series of IPsec tunnels, ensuring con-
fidentiality and integrity. Similar to other encrypted protocols (e.g.
TLS), the client and server use a handshake protocol (i.e., IKEv2) to
communicate their supported security configurations and to agree
upon the used parameters (e.g., keys or an encryption algorithm)
for the ongoing session. This however opens the door for security
vulnerabilities introduced by misconfiguration.
We want to analyze security configurations within commercial
VoWiFi deployments, both on the client and server side, spotting
deprecated configurations that undermine communication security.
OriginalspracheEnglisch
Titel17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2024)
PublikationsstatusVeröffentlicht - 1 Mai 2024

ÖFOS 2012

  • 102016 IT-Sicherheit

Zitationsweisen