eSIM Security: Understanding Remote SIM Provisioning
A comprehensive look at eSIM technology, the GSMA specifications, and the security implications of remote SIM provisioning.
eSIM Security: Understanding Remote SIM Provisioning
Embedded SIMs (eSIMs) are revolutionizing how we connect devices to cellular networks. But with this convenience comes new security considerations.
What is eSIM?
Unlike traditional SIM cards, eSIMs are embedded directly into devices and can be programmed remotely. This enables:
The Security Model
GSMA defines two main provisioning architectures:
Consumer eSIM (SGP.22)
Designed for smartphones and consumer devices with user interaction.
M2M eSIM (SGP.02)
Designed for IoT devices with minimal or no user interaction.
Formal Verification
We used BAN Logic to formally verify the security properties of the Common Mutual Authentication protocol:
Message 1: A -> B : {Na, A}Kab
Message 2: B -> A : {Na, Nb}Kab
Message 3: A -> B : {Nb}Kab
Key Findings
Our analysis revealed several important security properties that must be maintained during remote provisioning, including proper key derivation and session binding.
Looking Forward
As eSIM adoption grows, ensuring robust security becomes ever more critical. Stay tuned for more research updates!
Jhury Kevin Lastre
Software Engineer & Cybersecurity Researcher
Currently pursuing a Masters in Cybersecurity at Kookmin University, researching 5G security and eSIM protocols. Leading OWASP Cebu.