130-0022-001 LTE Security Concepts Design Considerations WP

download 130-0022-001 LTE Security Concepts Design Considerations WP

of 15

Transcript of 130-0022-001 LTE Security Concepts Design Considerations WP

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    1/15

    WHITE PAPER

    LTE Security Concepts and

    Design Considerations

    August, 2013

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    2/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 2

    Table of Contents

    Introduction ...................................................................................................... 3

    LTE Security Defined in the Standards ............................................................ 3

    3GPP High Level Security Architecture .................................................................... 3

    3GPP Principals of Network Domain Security ........................................................... 4

    A Practical Technical Specification for Domain SecurityH(e)NB Architecture ........ 6

    Operationalizing LTE Network Security ........................................................... 6

    Primary Security Domains ........................................................................................ 6

    Identifying the Risks .................................................................................................. 7

    Comparison of Firewall types: S1 and Internet Firewalls ........................................... 8

    Choosing the Right Solution for the Mobile Access Border ....................................... 8

    Recommended Solutions .......................................................................................... 9

    Looking Forward: Demands are Evolving ...................................................... 10

    VoLTE Increases Capacity Requirements .............................................................. 10

    Small Cells Increase Tunnel Scale Requirements .................................................. 11

    Security eXchange - Stoke's LTE Security Gateway Solution .................... 11

    Purpose-built, Standalone Security Gateway .......................................................... 11

    VoLTE Ready ......................................................................................................... 11

    Small Cells Connectivity ......................................................................................... 12

    Added Protection for the Mobile Access Border ...................................................... 12

    Performance without Compromise .......................................................................... 13

    Conclusions ................................................................................................... 13

    Security Gateway Recommended for Mobile Access Border Protection ................. 13

    Stoke Security eXchange ....................................................................................... 14

    References .................................................................................................... 15

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    3/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 3

    Introduction

    As with any IP-based network, ensuring network security is of paramount importance. This is especially

    applicable to todays LTE wireless networks, which are an all-IP, end-to-end network architecture. Aside from the

    obvious security risk of intercepted wireless communications transmitted to and from user equipment (UE), thereare security risks traditionally associated with the fixed line Internet now pertinent to 4G mobile network

    operators. This is a significant departure for mobile operators because in prior generations of cellular networks,

    security was baked into standard network functions and integral to the whole system. LTE/SAE presents new

    challenges in this regard, requiring protection mechanisms at each of the three primary boundaries of the EPC.

    Additionally there is a new component in their traditional planning a security gateway on the RAN-to-Core

    boundary (S1), also referred to as the mobile access border.

    In the early days of LTE deployments this new security component was often considered late in the system

    design phase and suboptimal decisions were often the result. In her paper Radio-to-core protection in LTE -

    The widening role of the security gateway,Monica Paolini, analyst from Senza Fili Consulting, highlights the

    benefits of considering requirements from each of the three phases of LTE evolution when selecting the security

    gateway, Moreover, IT and Internet security players are jumping at the chance to reposition multi-purpose

    security appliances designed to protect the SGi ( Internet) interface to requirements at mobile access border

    (RAN-to-Core / S1 link). While there are some overlapping capabilities between the two, performance

    characteristics and lack of focus on requirements specific to the S1 interface can result in a suboptimal decision

    indeed if a multi-purpose security appliance is chosen rather than a standalone security gateway.

    The purpose of this paper is to clarify the standards around LTE network security, the different security borders

    of the mobile network, and delve deeper into the requirements of the Mobile Access Border - the border

    between the RAN and the core (S1). This paper also provides an overview of Security eXchange, Stokes LTE

    security gateway, and presents data points to demonstrate the value of this purpose-built LTE security gateway

    solution over multi-purpose security solutions.

    LTE Security Defined in the Standards

    3GPP High Level Security Architecture

    Security is addressed on many different levels by standard development organizations like 3GPP, ITU, ETSI, and

    even industry group NGMN. Stokes view on the security requirements for LTE networks are the result of

    comprehensive study of these standards and recommendations coupled with our companys focus on theMobile

    Access, Border. This section presents the relevant work from 3GPP and NGMN to define LTE security

    requirements which form the foundation for Stoke Security eXchange.

    Because security is dealt with on many levels by industry working groups and standards committees, casual

    observers can become confused about what requirements are needed and where they apply. In 3GPP EPS/EPC

    Security Architecture (3GPP TS 33.401) 3GPP segments the security architecture into five different functional

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    4/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 4

    domains. 3GPP TS 33.401 defines these domains as the following:

    1. Network access securityuse of USIM to provide secure access for a user to the EPS. Includes mutual

    authentication and privacy features.

    2. Network domain securityrefers to features that allow for secure communications between Evolved

    Packet System/Evolved Packet Core (EPS/EPC) nodes in order to protect against attacks on the network.

    3. User domain securitysecuring access to the terminal, e.g. screen lock password, or PIN to enable

    USIM usage.

    4. Application domain securitysecurity features used by applications, e.g. HTTP.

    5. Visibility and configurability of securityfeatures to allow a user to know whether a security feature

    is in operation or not, and user-configured control over whether use of a service depends on enabled

    security features.

    3GPP Principals of Network Domain Security

    With the migration from circuit-switched networks to packet-switched networks (GPRS) as well as the use of IP

    transport in general, there brings a need to provide enhanced protection to traffic running over these networks

    and associated interfaces. 3GPP has therefore developed specifications for how IP-based traffic is to be secured

    over the interfaces in the access/transport networks (E-UTRAN), in the core network (EPC), and/or between two

    or more core networks.

    Emphasizing interfaces in the core network (EPC), Network domain security for IP (NDS/IP) is defined in 3GPP TS

    33.210 and outlines the specifications for protecting the IP-based control-plane traffic. A special consideration is

    given to the S1-U (user-plane) interface between the E-UTRAN and EPC, an exception in that S1-U is a protected

    interface in 3GPP networks. NDS/IP introduces a slightly different concept of security domains, which are

    networks that are managed by a single administrative authority; an example being a single telecom network

    operator. In practice, an operators network is typically divided into multiple security domains, each domain

    being a subset of the network that is managed by a single administrative authority. This allows for greater

    network control and manageability, and implementation of defense-in-depth network security strategies.

    Figure 1 below illustrates the separation of security domains as defined in 3GPP TS 33.210:

    Figure 1. 3GPP TS 33.201 NDS/IP Architecture

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    5/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 5

    At the border of the security domain, TS 33.210 specifies the placement of a Security Gateway (SEG) which

    functions to concentrate and protect all traffic entering or leaving the security domain. The NE (Network Entity)

    represents any network nodes deployed and belonging to the E-UTRAN, EPC, and/or IMS domains, such as an

    eNodeB, MME, CSCF, etc.

    The NDS/IP framework provides for three types of protection:

    Data origin authentication protecting a node from receiving packet injection from an unknown or

    rogue entity

    Data integrity protecting data in transit from being modified (man-in-the-middle)

    Data confidentiality protecting against information theft (eavesdropping)

    The method by which the protection mechanisms are implemented is provided via IPsec, specifically IPsec ESP in

    tunnel mode, with IKE (Internet Key Exchange) used to setup IPsec security associations between SEGs or

    between SEG and NE. IPsec EPS provides for three levels of security protection each with a wide set of available

    security algorithms:

    Authentication provided initially via secure key exchange and mutual authentication between SEGs or

    SEG and NE using the IKE protocol, and via the Authentication Header (AH) of the IPsec packets to

    ensure per packet authenticity, using SHA-1 for example.

    Integrity provided via IPsec cryptographic packet hashing mechanisms, for example SHA-1.

    Confidentiality provided via IPsec cryptographic packet encapsulation, for example AES.

    The NDS/IP architecture in Figure 1 is represented in a practical deployment perspective in Figure 2 below:

    Figure 2. Practical view of Security Domains in LTE Mobile Network

    With this depiction it is easy to see how the conceptual 3GPP NDS/IP architecture is applied to a practical LTE

    deployment. In summary,

    Za interface aligns to S8 interface between Home- and Visited-PLMN, or between the Home PGW and

    Visited SGW, for example.

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    6/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 6

    Zb interface aligns with S1 and X2 within the individual operators LTE network. Zb applies between NEs

    or between NE and SEG in a single security domain that is under the control of a single operator.

    The Zb interface between SEG and EPC-based NE is optional since these nodes are likely collocated in

    the same data center or residing on the same private LAN network therefore IPsec and IKE are not

    required.

    The NE represents any network nodes deployed and belonging to the E-UTRAN, EPC, and/or IMS

    domains, such as an eNodeB, MME, CSCF, etc.

    Security for the EPC-to-Internet connection point (SGi interface) is not within the scope of NDS/IP.

    A Practical Technical Specification for Domain Security H(e)NB Architecture

    3GPP TS 32.320 specifies a security framework for the H(e)NB system architecture while implementing the

    principals outlined in the NDS/IP security domain specification featured in the previous section. H(e)NBs (3G or

    4G Femtocells) are typically located at the customers premises, i.e. in the end-users home, and the backhaul

    typically traverses an unsecured fixed-broadband Internet connection. Because of this, the H(e)NB accesses the

    operators security domain via the Security Gateway (SEG).

    Operationalizing LTE Network Security

    In the previous sections we reviewed the network security requirements defined by 3GPP for LTE/SAE networks.

    In this section we will examine the risks across the different LTE network interfaces and drill into the available

    solutions for securing the S1 Interface.

    Primary Security Domains

    The diagram in Figure 4 depicts a recognizable view of the Home and Visiting LTE/EPC network architecture and

    their key network interfaces. Highlighted are the critical areas where distinct network security requirements

    demand equally distinct solutions.

    Figure 3. Contemporary view of LTE network security domains

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    7/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 7

    Aside from the interface naming, the highlighted areas can be further described or classified as the following

    categories:

    Mobile Access Border (RAN-to-EPC / S1)

    Internet Border (EPC-to-Internet / SGi)

    Partner Border (EPC-to-EPC / S8)

    Identifying the Risks

    Industry and standards bodies, including 3GPP, ITU-T and NGMN have analyzed the threats and risks of each of

    the security domains described previously and recommended specific mitigation mechanisms for each domain.

    This analysis, including signaling load risks and mitigation identified by Stokesprimary research with University

    of Surrey, is summarized in the figure below.

    Security Domain Threats / Risks Mitigation Strategies

    Mobile Access

    Border

    (RAN-to-EPC/

    S1)

    Physical AP compromise (primarily for

    small cells)

    DDoS from compromised eNB / Small Cell

    User-plane packet injection

    Packet interception (eavesdropping)

    Packet modification (man-in-the-middle)

    Signaling overload

    3GPP SEG

    Strong authentication,

    authorization

    PKI

    IKEv2

    IPsec ESP

    LTE S1 Firewall(GTP, S1-AP)

    Internet Border

    (EPC-to-Internet/

    SGi)

    IP / Port scanning

    EPC IP address exposure Unauthorized EPC network access

    Malware / Virus implanted on UE(s)

    DDoS attacks on EPC via SGi

    Internet Firewall

    Stateful firewall

    NAT

    DDoS mitigation

    IDS/IPS

    Malware detection / blocking

    Anti-virus scanning / blocking

    Heuristics

    Partner Border

    (EPC-to-EPC/ S8)

    Home EPC IP address exposure

    IPX network compromise

    Border GW / Firewall

    GTP firewall for control- and

    user-plane

    NAT

    Figure 4. Network security domain risk and mitigation summary

    As outlined above, each of the described security domains possesses a unique array of threats or risks,

    necessitating an equally unique set of solutions and strategies to minimize or eliminate the persistence and

    impact of these threats. Notice that some overlap of solution characterization may occur, so it is important to

    understand the differences between them and why specific solutions are targeted at specific security domains.

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    8/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 8

    Comparison of Firewall types: S1 and Internet Firewalls

    For example, the term Firewall is used in the solution description for both the EPC-RAN security domain, and

    the EPC-to-Internet security domain. The LTE S1 Firewall, such as the feature set provided by Stokes Mobile

    Border Agent solution, which is described later, exemplifies a set of stateful packet filtering, or firewall-like

    features that are specifically required at the RAN-EPC edge. These features are targeted at the unique set ofprotocols that reside on the S1 and between RAN-EPC, such as SCTP, S1-AP, and GTP, and the procedures being

    executed, such as SCTP Initialization, UE Attach/Detach Requests, Service Requests, S1/X2 Handover, and others

    in order to provide multiple dimensions of protection for the EPC.

    Conversely, the Internet Firewall comprises set of solution functions which are designed to reside at the border

    between the EPC and other external IP networks, such as the Internet. It is here in the EPC-Internet security

    domain where features such as Stateful IP Firewall, Intrusion Detection/Prevention, and Network Address

    Translation (NAT) are required and can be most effective.

    For NAT specifically, the purpose of which is to conceal internal UE and EPC IP addressing from external IP

    networks like the Internet, it is wholly impractical to implement this function at the EPC-RAN security domain;since UE mobility and the fact that the UE IP anchor point (i.e. PDN-GW) resides within the EPC and behind the

    RAN-EPC edge, would inherently negate the NAT function and disrupt normal EPC functions.

    Choosing the Right Solution for the Mobile Access Border

    As described in earlier sections, 3GPP recommends the use of a Security Gateway enabled with IPsec to mitigate

    the threats faced on the interfaces between RAN and EPC. However, an operator can choose to enable IPsec

    functionality in a number of different network elements:

    Existing EPC node (such as an MME)

    Multi-Service Firewall or Multi-Service Edge Router, or

    Standalone security gateway

    IPsec adds overhead to all packets encrypted, but more importantly, places a large processing burden on any

    network node required to encrypt or decrypt the packets. The throughput of most multi-service firewall or

    routing systems will degrade at least 50% when IPsec is enabled. The performance degradation is even higher

    when that same equipment is required to process large volumes of smaller packets (such as with VoLTE.)

    Additional hardware can, of course, be added to boost throughput, but this adds equipment costs (CAPEX) as

    well as increasing recurring space and power (OPEX) expenses. Below are some details of the various solution

    options.

    EPC Nodes with SEGAdding the security function to EPC network nodes (such as the SGW or MME) may appear financially

    compelling short-term as it is re-using embedded equipment, but in the long term may greatly overload

    capacity on these nodes, reducing performance and available capacity. In particular, relying on the

    EPC's security functionality introduces significant processing requirements that can degrade overall EPC

    performance, and may not provide the highest possible level of protection. More importantly, expensive

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    9/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 9

    network core capacity may be better utilized for growth or as a hedge against an unexpected surge in

    traffic demand, rather than to provide security.

    Multi-Service Firewall Solution

    Vendors that offer multi-service equipment with a broad range of firewall and intrusion prevention

    features often include IPsec as a value-added feature. However, these platforms, designed to provide

    flexibility for multiple functions are not optimized for the significant challenges of IPsec encryption and

    may sacrifice performance to achieve that flexibility. The majority of stateful firewall and intrusion

    prevention features these solutions include provide no benefit to operators when applied at the RAN-

    EPC edge, because these are not functions that are needed, per 3GPP recommendations. Essentially

    operators will be paying for features they cannot use and sacrificing performance that is critically

    important.

    Multi-Service Router Solution

    Similar to multi-service firewalls, many multi-service router vendors provide IPsec as a value-added

    feature in their products. Typically this functionality is achieved through the addition of a services blade

    which is comprised of generic hardware processors and not optimized to execute heavy crypto-

    functions of IPsec. The trade-off operators must make for consolidated functionality are extensive

    hardware costs to achieve desired scale and performance, as well as limited growth capability for the

    actual IP routing and switching functions that the MSER is designed for, due to service blades occupying

    valuable slot real estate in the MSER chassis.

    Standalone Security Gateway

    A stand-alone gateway, optimized to handle the processing-intensive IPsec functions, can provide the

    needed security and aggregation functionality without overloading existing EPC elements or deploying

    sub-optimal equipment. From a total cost of ownership (TCO) perspective, the ability to provide

    scalability, end-to-end encryption, high power efficiency and better control over OPEX may increasingly

    weigh in favor of standalone solutions to address IPsec functions.

    Recommended Solutions

    Considering the information presented above, Stokes recommended deployment architecture and placement of

    solution specific network equipment appears as per the diagram below.

    Figure 5. Recommended equipment types for each security domain.

    HPLMN

    Internet

    Home

    Evolved

    Packet Core

    IPX

    Standalone

    SEG Border GW

    w/ FW

    Stateful

    Firewal l

    w/ NAT

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    10/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 10

    The solution specific recommendation is critical otherwise operators will be constantly dealing with compromise

    and trade-offs. The core design principles for the security network element on one interface will sacrifice

    performance, capabilities, and/or attention to details on another. For example, an Internet firewall is optimized

    for maximum flow capacity and high-rate transactions with perhaps a few VPNs using IPsec only as an add-on

    feature. This is the right design decision for the SGi interface, but is not for either S8 or S1. In addition,

    selecting one product that is a fit for two or even all three secure interfaces may be possible, but it offers only

    false promise. Ultimately the compromises will surface, requiring a disproportionate investment in that network

    element or worse, a potential security breach and a wholesale change out.

    The table below illustrates the security device and functions for which operators should seek best of breed

    performance for each interface requiring security.

    Security Domain Recommended Product Functions Provided

    Mobile Access

    Border

    (RAN-to-EPC/

    S1)

    Purpose-built, standaloneSecurity Gateway

    Strong authentication, authorization provided by

    IKEv1/v2 and PKI protocols such as CMPv2 and CRLv2

    Full data confidentiality, integrity, and authenticationprovided IPsec ESP protocols and crypto algorithms

    LTE S1 Firewall (GTP, S1-AP firewall) for signaling

    overload protection

    Internet Border

    (EPC-to-Internet/

    SGi)

    Multi-functional security

    platform

    Stateful Firewall

    Network Address Translation (NAT) to protect internal

    addressing

    IDS/IPS

    Content filtering

    Partner Border

    (EPC-to-EPC/ S8)

    Multi-functional Border

    Gateway

    GTP firewall for control- and user-plane

    NAT

    Figure 6. Recommended product and functions summary.

    Looking Forward: Demands are Evolving

    VoLTE Increases Capacity Requirements

    Best of breed performance in the S1 security gateway will become especially important as operators add VoLTE

    into their networks. This is due to the real-time, latency-sensitive nature of voice traffic and the fact that voice is

    transmitted in very small packet sizes (64 bytes), which taxes the processing capacity of most gateway

    equipment.

    Operator and industry data shows that average packet sizes are decreasing due to the growth of high volume /

    small packet size 4G applications such as VoLTE and M2M apps. As average packet size decreases, the number

    of packets per second at the same volume of traffic increases dramatically. This is important to network element

    dimensioning because network elements designed and optimized for a standard Internet traffic mix (IMIX) will

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    11/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 11

    underperform and have a major negative impact to users Quality of Experience (QoE).

    Small Cells Increase Tunnel Scale Requirements

    As we consider the evolution of LTE networks from todays macro deployments of several thousand or 10s of

    thousands of sites to potentially 10s or 100s of thousands more small cells (Pico/Femto) we must consider the

    impact to the EPC network architecture, and in the case of this document, the Security Gateway.

    The initial impact is obvious tunnel scale. Each and every access point will have an IPsec tunnel established

    with the SEG to provide RAN-EPC security. Even those operators who have initially opted not to deploy a SEG

    for their macro LTE RAN backhaul are planning to deploy a SEG to provide security for LTE small cells. The

    primary reason is due to the fact that small cells will in most cases leverage unknown backhaul across the

    Internet or some other unknown/untrusted backhaul provider network, which presents the same risks to the

    operator network as identified earlier in the document.

    Security eXchange - Stoke's LTE Security Gateway Solution

    Purpose-built, Standalone Security Gateway

    Stokes Security eXchange, provided via the SSX-3000 system, is designed specifically to fulfill the SEG

    requirements of the mobile access border. Stoke Security eXchange addresses all the threats identified by 3GPP

    and NGMN for the mobile access border (EPC-RAN / S1):

    Physical Attack

    User Plane packet injection

    Packet modification

    Eavesdropping

    DDOS attacks from network or UE

    Unauthorized access

    Compromise of eNodeB Credentials

    User data and user identity privacy attacks

    Attacks on Radio resources and management

    The solution recommended by industry organizations is IPsec, plus strong authentication and authorization

    mechanisms, namely IKE and PKI. To support this charter from standards, Stoke Security eXchange was built

    with a very extensible IPsec solution in both performance and functionality, delivering IPsec functionality at line-

    rate performance with high-rate throughput. The Stoke solution intentionally excludes features like stateful

    firewall, IDS/IPS, and NAT functions that are unneeded at the Mobile Access Border and would otherwise

    compromise IPsec performance.

    VoLTE Ready

    Stoke is prepared to meet the additional processing challenges of VoLTE. Figure 8 below compares a

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    12/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 12

    representative competitors performance to StokeSSX-3000, at different average packet sizes. With some

    competitor equipment, performance (capacity) drops from 80% line rate down to slightly above 40% - a loss of

    capacity of almost 50% - when average packet size changes from 512 bytes to 384 bytes.

    Figure 7. Impact of voice to IPsec throughput

    Small Cells Connectivity

    New hardware and software enhancements will allow the Security eXchange to address the demand for small cell

    connectivity. The same SSX-3000 plans support for new hardware modules, increasing IPsec tunnel scale to

    over 5x current capacity as well as increasing IPsec throughput by over 2x current performance.

    Added Protection for the Mobile Access Border

    IPsec tunnel scale and throughput are certainly not the only concerns. Stoke predicts that such a drasticincrease in the number LTE access points introduces a corresponding increase in the risk of having compromised

    small cells as well as increased network signaling and a greater risk for S1-borne signaling storms. LTE networks

    must support a higher degree of growth, change and unpredictability in user equipment (UE), applications,

    latency expectations, speed and accelerating signaling and traffic load, than ever previously anticipated. In

    response to this trend, Stoke Security eXchange now includes Mobile Border Agent protection.

    The Mobile Border Agent is a multi-dimensional software-based entity integrated with the Stoke Security

    eXchange. While the Security eXchange still performs the discrete tasks of IPsec tunnel termination, the Mobile

    Border Agent works toward protection and optimization goals at the dynamic LTE RAN-EPC border, on behalf of

    the operator. Key characteristics of the Mobile Border Agent are: Multi-Dimensional Awareness: Continually monitors S1 packets and correlates user plane, control

    plane, RAN and session volume, state, and other data to identify anomalies and support network goals.

    Reference Network Model: Maintains a reference model of connected eNodeBs and core elements,

    normal network conditions, and threshold parameters that define reporting and action triggers.

    Policy Based Enforcement Action:Enacts specific actions to protect service availability and network

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    13/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 13

    assets, interacting with other EPC elements and network management systems to deploy flood

    prevention and network protection policies.

    Data Collection/Reporting: Collects data and reports back to network operators, providing a

    comprehensive perspective of the network.

    Deeper integration with EPC network elements will allow the Mobile Border Agent to be further enhanced to

    dynamically respond to externally triggered events and in order to implement protective policies. Examples of

    protective security policies include:

    Message flood prevention

    Malicious endpoint detection

    Enhanced analytics

    Malicious subscriber traffic filtering

    Performance without Compromise

    Stoke Security eXchange consistently surpasses other LTE Security Gateway providers in all key performance

    measurements. Stoke performance has been validated through actual commercial deployments, multiple tier 1

    operator trials and tests, and internal QA analysis. Specifically, Stoke SSX-3000 has:

    Highest Throughput: 16 Gbps / RU Highest packets per second: 20.8 million PPS per RU = line rate of

    96 Byte packets

    Lowest Latency: 99.999% availability, 284 year MTBF

    Conclusions

    Security Gateway Recommended for Mobile Access Border Protection

    LTE/EPC network security covers several distinct domains, each faced with a unique set of security risks and

    corresponding solutions in order to mitigate or minimize the impact of those risks being exposed or exploited.

    For each of these distinct domains, several standards bodies and well-known industry groups have converged to

    make specific and unique recommendations to address each part of the network.

    For the Mobile Access Border (RAN-EPC) network security domain, these industry groups have recommended a

    purpose-built Security Gateway platform, using IPsec as the encryption protocol combined with strong

    authentication and authorization. Other network boundary areas also have been given distinct

    recommendations, such as intrusion prevention, network address translation, malware detection, and anti-virus

    protection for the EPC to Internet (SGi) interface

    While multi-functional platforms may provide similar feature sets, such as IPsec, their underlying design, built to

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    14/15

    LTE Security Concepts and Design Considerations

    Stoke, Stoke Session Exchange and the Stoke logo are trademarks of Stoke, Inc. Copyright 2013 Stoke, Inc. All rights reserved. Lit# 130-0022-001 14

    support a broad spectrum of functionality, forces operators to face trade-offs in terms of performance and cost.

    Poor performance increases equipment costs as well as operational costs for maintenance, space, and power. As

    operator networks continue to evolve with VoLTE and require even higher throughput, the economic impact of

    the initial decision is magnified over time. In addition, these multi-function platforms may not provide other

    valuable RAN-EPC functions such as signaling protection and policy based enforcement.

    Stoke Security eXchange

    The Stoke Security eXchange, including the Mobile Border Agent software is an evolved security gateway that

    extends the 3GPP definition to include expanded functionality to optimize and protect LTE core resources against

    signaling events and attacks that can impair or paralyze service. The solution includes several functions that add

    a layer of general security at the mobile border and enables enforcement action based on higher layer (S1-AP)

    analysis.

    The Stoke Security eXchange maintains line rate performance - even performing encryption/decryption functions

    at packet transmission rates experienced when average packet sizes drop when supporting key applications like

    Voice. This means that the capacity specified for each line card or system does not diminish as the operatornetwork and services mature and network average packet sizes change. This dramatically simplifies operator

    sizing estimates and reduces the requirement to add equipment as the network traffic profile changes over time.

    Next generation mobile networks will include a much more complex topology of overlapping LTE access types;

    including macro cells, indoor and outdoor small cells, and consumer femto cells, as well as Wi-Fi access points

    and shared networks. Stoke Security eXchange with Mobile Border Agent can provide much needed visibility

    and control in this fast growing, highly dynamic and critical area of the network.

  • 8/11/2019 130-0022-001 LTE Security Concepts Design Considerations WP

    15/15

    LTE Security Concepts and Design Considerations

    References

    (2012). Security in LTE backhauling.NGMN Alliance.

    Lescuyer, P. L. (2008). Evolved Packet System (EPS): The LTE and SAE Evolution of 3G UMTS.West Sussex,

    England: John Wiley & Sons Ltd.

    Olsson, M. S. (2013). EPC and 4G Packet Networks: Driving the Mobile Broadband Revolution (2nd ed).Oxford,

    England: Elsevier.

    Paolini, Monica. (2013). Radio-to-core protection in LTE.The widening role of the security gateway.Senza Fili.