| 研究生: |
張耿豪 Chang, Keng-Hao |
|---|---|
| 論文名稱: |
基於無線網路的語音通話攻擊與防護研究 VoWiFi Attack and Protection |
| 指導教授: |
李忠憲
Li, Jung-Shian |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2019 |
| 畢業學年度: | 107 |
| 語文別: | 中文 |
| 論文頁數: | 53 |
| 中文關鍵詞: | 基於無線網路的語音通訊 、長期演進語音承載 、中間人攻擊 、位址解析協定欺騙 、偵測演算法 |
| 外文關鍵詞: | VoWiFi, VoLTE, MITM, ARP Spoofing, Detection Algorithm |
| 相關次數: | 點閱:54 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來語音通訊的技術越來越成熟,隨著訊息傳播越來越頻繁,資訊安全已成為非常重要的議題。在現代化的社會中,手機已經成為了人人都有的通訊裝置,不管是在通訊、購物、休閒娛樂,都離不開手機的使用,所以手機通訊時的安全與否將是人們值得關注的議題。本研究將會以Voice over Wi-Fi通訊技術為背景(以下簡稱VoWiFi),研究VoWiFi在通訊中的協定以及驗證潛在的風險,並設定四種不同的環境,針對是否連接電信網路、使用VoWiFi通訊技術的一方為發話方或受話方,丟棄通訊時的語音方包和重要的SIP訊息封包,詳細的說明各個封包遺失時對發話方、受話方所造成的影響,並提出演算法供未來開發APP或設備來偵測通話環境是否安全、建議電信商加入偵測機制來保障使用者權益。
In recent years, the technology of voice service has become more and more mature. With the increasing frequency of information dissemination, information security becomes a very important issue. In modern society, mobile phones have become communication devices for everyone. No matter for communication, shopping, or entertainment, mobile phones are inseparable. Therefore, the safety of mobile communication is a topic worthy of attention. This study discusses the security issue about Voice over Wi-Fi communication technology (hereinafter referred to as VoWiFi) to examine the protocol of VoWiFi in communication identifying the potential risks. This study sets four different scenarios for whether the Caller or the Callee connects to the telecommunications network or VoWiFi. We discard voice content packets or critical SIP message packets when the user uses VoWiFi communication. Then, we observe the outcome and find the variations of message sequence in detail affecting on the Caller and Callee at each lost packet. We design an algorithm for the future development of APP or device to detect whether the calling environment is secure or under attack. With our experience, we recommended that the telecommunication service provider should employ the similar detection mechanism for security.
[1] S. Hussain, O. Chowdhury, S. Mehnaz and E. Bertino, "LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE," Network and Distributed Systems Security (NDSS) Symposium 2018, 18 February 2018.
[2] "Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015–2020," 03 February 2016. [Online]. Available: http://www.cs.tut.fi/kurssit/ELT-43406/SupplementaryL7/2016%20-%20CISCO%20-%20global%20mobile%20data%20traffic%20forecast%20update,%202015-2020%20-%20white%20paper.pdf. [Accessed 03 May 2019].
[3] "Session Initiation Protocol," [Online]. Available: https://en.wikipedia.org/wiki/Session_Initiation_Protocol. [Accessed 04 May 2019].
[4] J. Rosenberg and H. Schulzrinne, "SIP: Session Initiation Protocol,IETF RFC 3261," June 2002. [Online]. Available: https://tools.ietf.org/html/rfc3261. [Accessed 4 May 2019].
[5] "SIP: The Protocol and the Application," [Online]. Available: http://www.cs.nccu.edu.tw/~lien/Writing/NGN/sip.htm. [Accessed 04 May 2019].
[6] L. Z. Pedrini, "Part-3: What happens when a user performs a voice call from an LTE/4G network? - VoLTE," 28 November 2016. [Online]. Available: https://www.netmanias.com/en/post/blog/10907/lte-volte/part-3-what-happens-when-a-user-performs-a-voice-call-from-an-lte-4g-network-volte. [Accessed 05 May 2019].
[7] S. Technologies, "IMS is a Success – What’s next?," 25 June 2018. [Online]. Available: https://www.squire-technologies.co.uk/blog/ims-is-a-success-whats-next. [Accessed 05 05 2019].
[8] L. Z. Pedrini, "Part-1: What happens when a user performs a voice call from an LTE/4G network? - Overview," 23 November 2016. [Online]. Available: https://www.netmanias.com/en/post/blog/10905/lte-volte/part-1-what-happens-when-a-user-performs-a-voice-call-from-an-lte-4g-network-overview. [Accessed 05 May 2019].
[9] L. Z. Pedrini, "Part-2: What happens when a user performs a voice call from an LTE/4G network? - VoLGA & CSFB," 25 November 2016. [Online]. Available: https://www.netmanias.com/en/post/blog/10906/lte-volte/part-2-what-happens-when-a-user-performs-a-voice-call-from-an-lte-4g-network-volga-csfb. [Accessed 05 May 2019].
[10] L. Z. Pedrini, "Part-4: What happens when a user performs a voice call from an LTE/4G network? - SRVCC," 02 December 2016. [Online]. Available: https://www.netmanias.com/en/post/blog/10908/lte-volte/part-4-what-happens-when-a-user-performs-a-voice-call-from-an-lte-4g-network-srvcc. [Accessed 05 May 2019].
[11] M. Garcia-Martin, "Input 3rd-Generation Partnership Project (3GPP) Release 5 Requirements on the Session Initiation Protocol (SIP)," May 2005. [Online]. Available: https://tools.ietf.org/html/rfc4083. [Accessed 07 May 2019].
[12] R.Jesske, D.Telekom, K.Drage and C.Holmberg, "Private Header (P-Header) Extensions to the Session Initiation Protocol (SIP) for the 3GPP," July 2017. [Online]. Available: https://tools.ietf.org/html/rfc7315. [Accessed 07 May 2019].
[13] "www.3gpp.org - /ftp/Specs/archive/23_series/23.203/," 03 March 2019. [Online]. Available: https://www.3gpp.org/ftp/Specs/archive/23_series/23.203/. [Accessed 07 May 2019].
[14] "www.3gpp.org - /ftp/Information/WORK_PLAN/Description_Releases/," 07 February 2014. [Online]. Available: https://www.3gpp.org/ftp/Information/WORK_PLAN/Description_Releases/. [Accessed 08 May 2019].
[15] "www.3gpp.org - /ftp/specs/archive/23_series/23.402/," 27 March 2018. [Online]. Available: https://www.3gpp.org/ftp/specs/archive/23_series/23.402/. [Accessed 08 May 2019].
[16] Z. Ghadialy, "Voice over WiFi (VoWiFi) technical details," 21 January 2015. [Online]. Available: https://blog.3g4g.co.uk/2015/01/voice-over-wifi-vowifi-technical-details.html. [Accessed 08 May 2019].
[17] "www.3gpp.org - /ftp/Specs/archive/33_series/33.401/," 28 March 2019. [Online]. Available: https://www.3gpp.org/ftp/Specs/archive/33_series/33.401/. [Accessed 08 May 2019].
[18] T. Xie, G.-H. Tu, C.-Y. Li, C. Peng, J. Li and M. Zhang, "The Dark Side of Operational Wi-Fi Calling Services," in 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 2018.
[19] "www.3gpp.org - /ftp/Specs/archive/38_series/38.300/," 09 April 2019. [Online]. Available: https://www.3gpp.org/ftp/Specs/archive/38_series/38.300/. [Accessed 24 May 2019].
[20] "Vo5G Technical White Paper," July 2018. [Online]. Available: https://www-file.huawei.com/-/media/CORPORATE/PDF/white%20paper/vo5g-technical-white-paper-en.pdf. [Accessed 24 May 2019].
[21] "Wi-Fi Calling Overview Opportunities and challenges towards 5G," 2016. [Online]. Available: https://telecomwebinar.com/wp-content/uploads/2016/11/WBA-Wi-Fi-Calling-Webinar-Telesemana-BCT-v1.0.pdf. [Accessed 24 May 2019].
[22] "ARP spoofing," [Online]. Available: https://en.wikipedia.org/wiki/ARP_spoofing. [Accessed 06 June 2019].
[23] "Download VirtualBox (Old Builds): VirtualBox 5.2," 09 November 2018. [Online]. Available: https://www.virtualbox.org/wiki/Download_Old_Builds_5_2. [Accessed 10 May 2019].
[24] "Kali Linux Downloads," [Online]. Available: https://www.kali.org/downloads/. [Accessed 10 May 2019].
[25] "SDK Platform Tools release notes," Google, September 2018. [Online]. Available: https://developer.android.com/studio/releases/platform-tools.html. [Accessed 10 May 2019].
[26] "Android tcpdump Downloads," 03 September 2017. [Online]. Available: https://www.androidtcpdump.com/android-tcpdump/downloads. [Accessed 10 May 2019].