小程序
传感搜
传感圈

Operator Lock-In for IoT Devices and How To Avoid It

2022-11-06
关注

Operator Lock-In for IoT Devices and How To Avoid It
Illustration: © IoT For All

If IoT is going to meet its potential and help power Industry 4.0, some aspects of IoT need to change. One major problem facing IoT solutions is SIM operator lock-in. When deploying a device with a SIM card, it’s standard to be locked into one connectivity provider.

Manually changing SIM cards is a way to avoid SIM operator lock-in. But IoT devices aren’t designed with replacing SIMs in mind. SIMs are often soldered onto devices and encased in plastic. Additionally, most IoT devices are in remote, hard-to-reach locales, making SIM swapping difficult.

To better future-proof your devices, it’s vital that you make sure SIM keys are your property when sourcing cellular IoT connectivity. When you control SIM keys for UICC SIMs, it’s possible to transfer operator credentials over the air (OTA).

Read on for information on how and why it’s important to eliminate vendor lock-in for cellular IoT devices.

What is SIM Operator Lock-In?

When you sign an agreement with an MNO or MVNO (mobile (virtual) network operator), a “vendor lock-in” clause is almost certainly included. A vendor lock-in in this case essentially means that the SIM cards you buy from the operator can only connect via their authority.

'One major problem facing IoT solutions is SIM operator lock-in.' -OnomondoClick To Tweet

If you decide to change connectivity providers for your deployed fleet of devices, you must remove all SIM cards and put in new ones. In other words, the SIM cards you purchase are not completely yours.

Such lock-ins exist primarily for two reasons: operator codes and commercial decisions.

Operator Codes

One reason operators choose not to transfer ownership of SIMs is that they don’t want to expose sensitive credentials.

To transfer ownership of a SIM, you need to change the IMSI (International Mobile Subscriber Identity) on the SIM with an OTA update and give the new operator the derived operator code (OPc) and the encryption key (Ki) for each SIM.

Most (if not all) operators use a single Operator Code (OP) across all SIMs on their network.

OPs and the encryption keys (Ki) are used to create unique derived operator codes (OPc’s) for each SIM.

If a bad actor could obtain enough Ki’s and OPc’s, they would be able to figure out the operator’s OP. This information can be used to hack into other SIMs on that operator’s network. If this occurs, the network becomes vulnerable to DDOS attacks.

This security weakness is a big part of the reason why many operators will not hand over SIM keys.

Commercial reasoning

Operators don’t want to hand over SIM keys because they want to keep their customers.

In this scenario, it’s a commercial decision to not enable freedom to leave. Operators simply want to reduce customer churn by making it harder for a company to leave their service.

Because it costs a lot to change SIM cards on IoT devices by hand, you are less likely to leave.

What is Freedom to Leave?

Freedom to Leave is a concept in IoT that means companies have full control over SIM cards and how they work with operators. This is easiest to achieve when you own all of your SIM cards, including sensitive authentication credentials.

Operators who support Freedom to Leave will transfer SIM credentials (IMSI, OPc, and Ki) to a new provider.

Some IoT connectivity operators generate random Operator Codes (OPs) for each SIM. Therefore, bad actors would not be able to calculate a network-sensitive OP from OPc’s and Ki’s as it doesn’t exist. That’s why a few modern operators can hand over SIM keys without making themselves vulnerable to attacks.

What might surprise some people is that it has been possible to OTA update SIMs since 2003. You can read the original 3GPP overview here: Over-The-Air (OTA) technology – 3GPP TSG SA WG3 Security (PDF download).

What About eSIM (eUICC)?

Some of you might be thinking that eSIM (eUICC) offers a solution to the problem of SIM operator lock-in.

eSIMs allow users to remotely provision carrier profiles on SIMs. This means that the networks/carriers available on a SIM card can be updated OTA and there’s no need to manually swap SIMs.

However, there are still lock-ins when using eSIMs.

eSIMs (eUICC SIMs) require a record (ECASD) on them that contains details like the eSIM platform’s IP address. The ECASD is hardcoded onto SIMs and cannot be altered once it has been put in place.

So, your eUICC SIM will be locked to its first eSIM management platform, and as long as you use the SIM, you are stuck with the features—or lack thereof—of that platform.

Why is Freedom to Leave important?

We think Freedom to Leave is important because it will make it easier for IoT to flourish.

The ability to change operators 2, 5, and 10+ years after deploying devices opens up new possibilities in a solution’s lifetime and doesn’t artificially constrain commercial options.

Here is a summary of the 4 benefits of Freedom to Leave:

1) Improved Business Adaptability

Future-proof your business by having the ability to switch SIMs to another network operator. If an opportunity arises that requires the features of another provider, you should be able to change.

2) Enhanced Security Benefits for Devices

Operate your fleet with increased levels of protection against bad actors due to better SIM isolation. If a bad actor accesses sensitive information from one SIM, it won’t affect the rest of your fleet.

3) Lower Total Costs from SIM Card Replacement

Save money in the long run by reusing SIM cards on multiple devices. Not only will there be no need to purchase new SIMs, but there will also be no reason to replace them manually.

4) Less Waste and A Lower Carbon Footprint

Minimize your business’s footprint by reusing perfectly-functioning technology. Rather than discarding or recycling deactivated SIM cards, use them as long as they can function.

Plan For An Uncertain Future

You want control of SIM cards because technology is rapidly changing and the best decision for your solution today may not be the same in 2, 5, or 10 years.

If you decide it makes sense to switch to a different network operator, modern operators should assist in transferring the SIM credentials to another GSMA-certified entity.

When SIM profiles are handed over, the new operator will update the credentials OTA on the SIM cards and devices so they can connect to their network.

Freedom to Leave, although simple, is a critical part of future-proofing your IoT solution.

Tweet

Share

Share

Email

  • Device Management
  • Cellular
  • Connectivity
  • Cybersecurity
  • Network and Protocols

  • Device Management
  • Cellular
  • Connectivity
  • Cybersecurity
  • Network and Protocols

参考译文
物联网设备的运营商锁定及其避免方法
如果物联网要发挥其潜力并帮助驱动工业4.0,物联网的某些方面需要改变。物联网解决方案面临的一个主要问题是SIM运营商锁定。当使用SIM卡部署设备时,锁定到一个连接提供商是标准的。手动更换SIM卡是避免SIM运营商锁定的一种方法。但物联网设备在设计时并没有考虑到取代sim卡。sim卡通常被焊接到设备上,用塑料包装起来。此外,大多数物联网设备位于偏远、难以到达的地区,使得SIM卡交换非常困难。为了更好地保护你的设备,在寻找蜂窝物联网连接时,确保SIM卡是你的财产是至关重要的。当您控制UICC SIM卡键时,可以通过空中传输运营商凭证(OTA)。请阅读以下信息,了解如何以及为什么消除蜂窝物联网设备的供应商锁定很重要。当您与MNO或MVNO(移动(虚拟)网络运营商)签署协议时,几乎肯定会包含“供应商锁定”条款。在这种情况下,供应商锁定本质上意味着你从运营商那里购买的SIM卡只能通过他们的权限连接。如果你决定为你部署的设备更换连接提供商,你必须取下所有的SIM卡,换上新的。换句话说,你购买的SIM卡并不完全是你的。这种锁定的存在主要有两个原因:运营商代码和商业决策。运营商选择不转让模拟人生所有权的一个原因是,他们不想暴露敏感的凭证。要转让SIM卡的所有权,您需要通过OTA更新更改SIM卡上的IMSI(国际移动用户身份),并为每个SIM卡提供派生的运营商代码(OPc)和加密密钥(Ki)。大多数(如果不是全部)运营商在其网络上的所有模拟人生中使用单一的运营商代码(OP)。OPs和加密密钥(Ki)用于为每个SIM卡创建惟一的派生操作码(OPc)。如果一个不良行为者能够获得足够多的Ki和OPc,他们就能够弄清楚运营商的op。这些信息可以用来入侵运营商网络上的其他模拟人生。如果出现这种情况,网络就容易受到DDOS攻击。这一安全弱点是许多运营商不愿交出SIM卡密钥的主要原因。运营商不想交出SIM卡密钥,因为他们想留住客户。在这种情况下,不允许自由离开是一个商业决策。运营商只是想通过让公司更难离开他们的服务来减少客户的流失。因为在物联网设备上手动更换SIM卡的成本很高,所以你不太可能离开。自由离开是物联网中的一个概念,这意味着公司可以完全控制SIM卡以及如何与运营商合作。当你拥有所有的SIM卡,包括敏感的身份验证凭证时,这是最容易实现的。支持自由离开的运营商将把SIM证书(IMSI、OPc和Ki)转移到新的提供商。一些物联网运营商为每个SIM卡生成随机的运营商代码(OPs)。因此,不良行为者将无法从OPc和Ki计算出网络敏感的OP,因为它并不存在。这就是为什么一些现代运营商可以在不受攻击的情况下交出SIM卡密钥。让一些人感到惊讶的是,从2003年开始OTA就可以更新模拟人生了。你可以在这里阅读原版3GPP概述:over - air (OTA)技术- 3GPP TSG SA WG3 Security (PDF下载)。有些人可能会认为eSIM (eUICC)为SIM运营商锁定问题提供了解决方案。esim支持用户在sim机上远程发放运营商配置文件。这意味着SIM卡上可用的网络/运营商可以更新OTA,不需要手动交换SIM卡。然而,在使用esim时仍然存在锁定。 eSIM (eUICC SIMs)需要一个记录(ECASD),其中包含eSIM平台的IP地址等详细信息。ECASD是硬编码到SIMs上的,一旦它被放置到位,就不能被更改。因此,您的eUICC SIM卡将被锁定在它的第一个eSIM管理平台上,只要您使用该SIM卡,您就会被该平台的功能(或缺乏)所困。我们认为“自由离开”很重要,因为它将使物联网更容易蓬勃发展。在设备部署后2年、5年甚至10年以上更换操作人员的能力为解决方案的生命周期提供了新的可能性,并且不会人为地限制商业选择。以下是自由离开的4个好处的总结:通过能够将模拟人生切换到另一个网络运营商来保障你的业务的未来。如果出现需要其他提供者特性的机会,您应该能够进行更改。由于更好的SIM隔离,使用更高级别的保护来操作您的舰队,以防止不良行为。如果一个坏人从一个SIM卡上访问敏感信息,它不会影响到您的其他舰队。从长远来看,多台设备重复使用SIM卡可以省钱。不仅不需要购买新的模拟人生,而且也没有理由手动更换它们。通过重用功能完美的技术来最小化您的业务足迹。不要丢弃或回收停用的SIM卡,只要它们能正常使用就可以。你想要控制SIM卡,因为技术在快速变化,今天对你的解决方案的最佳决策可能在2年、5年或10年后就不一样了。如果您决定切换到不同的网络运营商是有意义的,现代运营商应该协助将SIM证书转移到另一个gsma认证的实体。当SIM配置文件提交时,新运营商将更新SIM卡和设备上的凭证OTA,以便他们可以连接到网络。“自由离开”虽然简单,但却是防未来物联网解决方案的关键部分。
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

提取码
复制提取码
点击跳转至百度网盘