Security Analysis of the Consumer Remote SIM Provisioning Protocol

11/28/2022
by   Abu Shohel Ahmed, et al.
0

Remote SIM provisioning (RSP) for consumer devices is the protocol specified by the GSM Association for downloading SIM profiles into a secure element in a mobile device. The process is commonly known as eSIM, and it is expected to replace removable SIM cards. The security of the protocol is critical because the profile includes the credentials with which the mobile device will authenticate to the mobile network. In this paper, we present a formal security analysis of the consumer RSP protocol. We model the multi-party protocol in applied pi calculus, define formal security goals, and verify them in ProVerif. The analysis shows that the consumer RSP protocol protects against a network adversary when all the intended participants are honest. However, we also model the protocol in realistic partial compromise scenarios where the adversary controls a legitimate participant or communication channel. The security failures in the partial compromise scenarios reveal weaknesses in the protocol design. The most important observation is that the security of RSP depends unnecessarily on it being encapsulated in a TLS tunnel. Also, the lack of pre-established identifiers means that a compromised download server anywhere in the world or a compromised secure element can be used for attacks against RSP between honest participants. Additionally, the lack of reliable methods for verifying user intent can lead to serious security failures. Based on the findings, we recommend practical improvements to RSP implementations, to future versions of the specification, and to mobile operator processes to increase the robustness of eSIM security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/27/2018

Formal Analysis of 5G Authentication

Mobile communication networks connect much of the world's population. Th...
research
03/15/2021

Formal Modelling and Security Analysis of Bitcoin's Payment Protocol

The Payment Protocol standard BIP70, specifying how payments in Bitcoin ...
research
10/04/2019

HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol

The High Definition Multimedia Interface (HDMI) is the de-facto standard...
research
09/21/2020

Adversary Models for Mobile Device Authentication

Mobile device authentication has been a highly active research topic for...
research
05/31/2019

Secure Memory Erasure in the Presence of Man-in-the-Middle Attackers

Memory erasure protocols serve to clean up a device's memory before the ...
research
06/27/2019

Flexible Anonymous Network

Internet technologies have been designed from guidelines like the robust...
research
04/22/2023

SimplyMime: A Control at Our Fingertips

The utilization of consumer electronics, such as televisions, set-top bo...

Please sign up or login with your details

Forgot password? Click here to reset