SlideShare a Scribd company logo
1 of 20
Download to read offline
LTE Security Overview




            Irfan Ali

            Version: 2 (October 2012)



Irfan Ali                    1
Overview


 • Security in LTE
     Security Architecture for 3GPP
     During Attach
              •   Key Derivation
              •   Mutual Authentication
              •   NAS Security
              •   AS Security
         Handovers
              • Key derivation at target eNB




Irfan Ali
  Irfan Ali                               2    2
Key Cryptographic Methods


       • Two cryptographic Methods:
                 Symmetric key: uses same key at both ends (shared key)
                   • Encryption algos: Data Encryption Standard (DES), 3DES,
                     International Data Encryption Algorithm (IDEA)
                   • Used in UMTS and LTE
                 Asymmetric key: uses two different keys (private and public
                  keys)
       • Another tool used with the above is:
                 Hash function: One way transformation, used for digital
                  signature generation.



                     LTE uses Symmetric Key Cryptography


Irfan Ali
  Irfan Ali                                 3   3
Symmetric Key Cryptography: Encryption and Message
     Authentication

  Alice                                                                               Bob
           m                              c                                     m
                       A                                        A
                                 Communication
                                 Medium


                           Ke
                                                                    Kd
                                                                                A    Algorithm
                                  A (Ke, m) = c                                 Ke   Encryption key
                                  A (Kd, c) = m                                 Kd   Decryption key
                                                                                m    message
                                                                                C    encrypted message
                                              Ke := Kd


                                                                    Alice                          Bob
 Alice                          Bob
                                                                                                     Secret Key
               Hello
                                                         DATA



                                                                         DATA




                R1                                                                          DATA
                                                                                                          MAC
                                                                                                          Algorithm
          R2, Kab( R1 | R2)           Secret Key

                                                                         MAC                MAC      =?
          Kab( R2 | R1)                                                                                       MAC

                                                   MAC
                                                   Algorithm
  Mutual Authentication with                    Message Authentication or Integrity Protection with
  Secret Key                                                      Secret Key
Irfan Ali
  Irfan Ali                                                                            4       4
3GPP Overall Security Architecture
                                                                                              Network Domain
                                                                       HPLMN                         Security
                                                                  Security Domain B

       HPLMN                                     Internet                                                IMS           Internet
                              IMS

                                                                  HSS
 HSS                                                                                                                  P-GW
                                                P-GW                           SEG



                                                                               SEG
                                                                                                           S-GW
                                S-GW

                                                                                                                             S-GW
                                                       S-GW
       MME
                                                                        MME




               eNB
                                                                                                                eNB    eNB
                                    eNB          eNB                   VPLMN            eNB
             RRC Connection                                                                     Security Domain A
User Domain
    Security                            Network Access
                                               Security
                               NAS Connection



Irfan Ali
  Irfan Ali                                                   5    5
                                                                    SEG               Security Gateway
3GPP Overall Security Architecture
   •   Network Access Security
             Primarily radio link security
                • Encryption and Integrity protection of RRC
                • Encryption and Integrity protection of NAS
                • Encryption of Data Radio bearers (optional)
   •   Network Domain Security
                                                                                        PLMN-A                              PLMN-B
             Security of the wireline network between                                                   IKE/ISAKMP
              PLMNs
                • Key negoation using IKE
                                                                                                        IPSec/ESP
                • Use of ISAKMP for setting up the security
                  association between the SEG
                • Tunnel-mode ESP to be used
                      •   Encryption triple DES
                      •   Data Integrity and Authentication: MD5 and SHA-1
   •   User Domain Security
             User – USIM authentication:                                     •   NOTE: Maintaining Security on wired
                • Access to the USIM is restricted until the                      links within a security domain (i.e PLMN
                  USIM has authenticated the user. Use of                         ,eg between eNB and MME) is
                  PIN. If user does not know PIN, user is not                     responsibility of operator. Only
                  allowed to use SIM.
                                                                                  recommendations in 3GPP
             USIM – Terminal authentication                                      Specifications.
                • Used only for SIM-Locked Mobiles. When an
                  ME is SIM-locked (SIM/USIM personalisation             In general, links should be either
                  indicator in the ME to "on“), the ME stores               physically secured or through IPSec
                  the IMSI of the USIM. If the inserted USIM                (NDS/IP)
                  has a different IMSI, the ME goes into a
                  emergency call only mode. Ref TS 22.022
                  Section 8.                         IKE      Internet Key Exchange
                                                              ISAKMP         Internet Security Association and Key Management Protocol

Irfan Ali
  Irfan Ali
                                                              ESP            Encapsulation Security Protocol
                                                                 6
                                                              IPSec    6     IP Security
Key Heirarchy for LTE
                                                                                                                          HSS


                                                                                    MME
                    K                                                                                                        K
                                                                                                            S6a

              Kasme                                                                                                       Kasme
                                                                                        Kasme
     KeNB           SRB-0
                                                   KeNB                            KeNB
                    SRB-1                                   S1-MME

                    SRB-2                   NAS




                                                                                               GTPC-1
                                                                                  CK, IK
                 CK, IK               CK, IK
   CK, IK


                                                                                                        GTPC-1
                    Data Radio Bearer-10
                                                          GTP-U-10                                      GTP-U-10



                  CK                       CK
            UE                                  eNB                                  SGW                           PGW


                                                                                                                   Encrypted Info
                                                ASME         Access Security Management Entity (MME)
                                                CK, IK       Ciphering Key, Integrity Protection Key
                                                                                                                   Integrity Protected

Irfan Ali
  Irfan Ali
                                                                                                                   Info
                                                                7     7
LTE Key Hierarchy

                        USIM / AuC                 K

                                                 CK, IK
                        UE / HSS
                                                  KASME
                        UE / MME
  • ASME = Access
    Security              KNASenc    KNASint
    Management                                                 KeNB / NH
    Entity, located
    at the MME                                 UE / eNB

                                                KUPenc    KRRCint      KRRCenc




Irfan Ali
  Irfan Ali                          8   8
Identity Protection


 • The two permanent identities of UE are:
     IMSI (subscriber identity)
              • Seldom send over the air (only during attach, if no other valid
                temporary ID is present in the UE).
              • Temporary identities used instead (S-TMSI, GUTI)
         IMEI (hardware identity)
              • Only sent to MME (in NAS), not to eNB.
              • Sent only after NAS security is setup (i.e encrypted and
                integrity protected).




Irfan Ali
  Irfan Ali
                                S-TMSI
                                GUTI
                                         System architecture evolution Temporary Mobile Subscriber Identity
                                            9      9
                                         Globally Unique Temporary Identity
General Security Characteristics
   •   Use of UMTS AKA (Authentication and Key Agreement) procedure
   •   Use of 128-bit keys truncated from generated 256-bit keys
   •   Ciphering Algorithms (AS and NAS):
             0 = Null;
             1= SNOW 3G;
             2 = AES                                                      Rel-8 UE is required to
   •   Integrity Algorithms (AS, NAS):                                     support these algorithms
             1= SNOW 3G;
             2 = AES
   •   Access Stratum (AS), between eNB and UE:
             Ciphering applicable to both user traffic and RRC-level signaling traffic.
             Integrity protection applicable only to RRC-level signaling traffic. Integrity information is ciphered.
             Located at the PDCP sublayer in both eNB and UE
   •   Non-Access Stratum (NAS), between MME and UE:
             Ciphering and Integrity of NAS messages, independent of the AS security
   •   Keys change at every intra-E-UTRAN handover, including intra-eNB handovers.




Irfan Ali
  Irfan Ali                                                10 10     AES          Advanced Encryption Standard
LTE AKA
      SQN     AUTN      RAND     UE                       MME                              HSS
                                                                                                                      SQN          K     RAND
                                                                    Authentication data request
                                                                    (IMSI, VPLMN, Network
              USIM K
                                                                    Type = E-UTRAN)
                                                                                                                             Function
                                                                                      Generate authentication
                CK                                                                       vectors AV(1..n)
      RES
                                                                                                                      XRES
                       IK                                                                                                          CK
                               RAND
SQN   VPLMN                                                             Authentication data                                 AUTN        IK
                                                                           response AV                                                          RAND
                                                                                                                SQN   VPLMN
  IMSI
                                              Store authentication vectors AV(1..n)
                                                                                                                  IMSI
            KDF
                                                 Select authentication vector AV                                              KDF

              Kasme                   User authentication request
                                         RAND || AUTN
                                                                                                                              Kasme
                                Verify AUTN
                               Compute RES                                                                      AV    AUTN, RAND, XRES, Kasme

                                      User authentication response
                                                  RES

                                                 Compre RES and XRES
                                                                                                   AKA           Authentication and Key Agreement
                                                                                                   AUTN          Authentication TokeN
                                             Security Mode
                                                                                                   GUTI          Globally Unique Temporary Identity
                                          Command Used to
                                                                                                   KSI           Key Set Identifier
                                         Derive NAS keys from
                                                Kasme



Irfan Ali
  Irfan Ali                                                              11   11
User authentication function in the USIM

                   RAND                            AUTN


                  f5            SQN  AK            AMF                  MAC


                  AK                


                                  SQN
              K




                                        f1            f2            f3         f4



                                    XMAC            RES             CK         IK


                                 Verify MAC = XMAC                                  • USIM keeps track of last SQN received, SQNms
                                                                                    • USIM only accepts a sequence number from HSS if
                                                                                      |SQN – SQNms | < ∆
                          Verify that SQN is in the correct range



                                                                                      AUTN          Authentication TokeN
                                                                                      AMF           Authentication management field
                                                                                      SQN           Sequence Number
                                                                                      AK            Anonymity Key
                                                                                      MAC           Message Authentication Code




Irfan Ali
  Irfan Ali                                                          12 12
Overview of NAS and AS Security negotiations
   UE                                  eNB                              MME-1                                 HSS

                                     EPS-AKA                                              EPS-AKA


   Partial EPS                                                        Partial EPS
  native Context.                                                       native
                                                                       Context




                       NAS- Security Mode Command (SMC)
                       NAS Security Algorithms decided here

    Full EPS                                                               Full EPS
     native                                                                 native
    Context                                                                Context
                                  Current
Kasme, KSImme                                   eKSI                    Kasme            Current




                                                UE’s security Capability
                     AS-SMC
        AS Security Algorithms decided here

   AS Keys                            AS Keys


                                                                                  ASME         Access Security Management Entity (MME)
Irfan Ali
  Irfan Ali                                                     13 13             KSI          Key Set Identifier
Negotiation of NAS/AS Enc & Inc Algorithm

         ME provides support of different EPS encryption (EEA) and integrity
          protection (EIA) algorithm support as part of “UE Network Capability”
          IE.
              • The same set of ciphering and integrity algorithms shall be supported by
                the UE both for AS and NAS level
         The eNB and MME are configured with a prioritized list of EEA and
          EIA algorithms to use. Eg
              • Priority-0 EIA2
              • Priority-1: EIA1
         eNB/MME selects first intersection of configured algorithm with UE’s
          capability.
         NAS and AS security algorithms can be different.




Irfan Ali
  Irfan Ali                                   14 14
Power-off/Power-on issue


 • Power-off
     The objective is to store a fully valid native EPS security
      context, preferably in USIM otherwise in non-volatile
      memory of the ME.
 • Power-on
     Retrieve a “valid” EPS security context either from (a)
      USIM, or (b) if-not from ME non-volatile memory. This
      becomes the current EPS security context.
     If no valid EPS security context can be retrieved, UE
      signals to MME in attach that it has “no valid keys”.




Irfan Ali
  Irfan Ali                      15 15
UE Performs attach – Part 1 of 3
                                                                          Internet
  UE                                                                PGW
                                eNB                   MME     SGW




                  RACH
       1. Random Access Preamble      Random Access
                                      Procedure
           DL-SCH: Common CC
         2. Random Access
         Preamble




            UL-SCH: SRB0

         3. RRC Connection
         Request



                                      RRC Setup
           DL-SCH: Common CC
                                      Procedure
         4. RRC Connection Setup


            UL-SCH: SRB1

       5. RRC Connection Complete
              NAS Msg: Attach
              Request IMSI
               NAS Msg PDN
               Connect Req

Irfan Ali
  Irfan Ali                                           16 16
UE Performs Attach – Part 2 of 3
                                                                                                                HSS
  UE                            eNB                                  MME                       SGW
                                                                           Encryption                                     PGW
                                                                           + Integrity
                                                                                                                                        Interne
                                eNB selects
                                  MME                                      Protection Algorithm
                                                                           support
         NAS MSG: Attach                            S1-MME
         Request, IMSI, UE                                                                   S6a
         Network Capability               6. Initial UE Message                  7. Auth Info Request
                                      NAS MSG: Attach                            IMSI, VPLMN,Net=EUTRAN
                                      Request, IMSI, UE
                                      Network Capability                         8. Auth Info Answer
                                                       NAS Msg PDN               Kasme, AUTN, RAND,XRES
         DL-SCH:CCH SRB1                               Connect Req                                                     User
                                                                                                                       Authentication
        10. DL Info Xfer                  9. DL NAS Xport                                                              Procedure
            Authn Request:                     Authn Request                         MME Compares
            AUTN, RAND, eKSI                                                         RES with XRES.
                                                                                     If same, AKA
       11. UL Info Transport                                                         successful
                                          12. UL NAS Xport
              Authn Response
                                              Authn Response:
                                              RES
           UL-SCH: SRB1


         DL-SCH:CCH SRB1
                                          13. DL NAS Xport
        14. DL Info Transport            SMC: eKSI, NAS Algo,                      NAS Security Setup
           Security Mode Command         UE Security Capability                    Procedure


       15. UL Info Transport
                                          16. UL NAS Xport
           Security Mode
                                                SMC Complete
           Complete                                                              17. Location Update Request
           UL-SCH: SRB1                                                          IMSI, …                              Authorization
                    NAS Security
                                                                                 18. Location Update Response
                                                                                 Subscription Data
                                                                  MME
Irfan Ali
  Irfan Ali                                                            17 UE
                                                                  authorizes17
UE Performs Attach – Part 3 of 3
                                                                                                              HSS               PGW
  UE                          eNB                                    MME                       SGW                                    Interne
                      NAS Security                                                 GTPC
                                                                           19. Create Session              GTPC-2
                                                                           Request ((IMSI, TEIDs,     20. Create Session
                                                                           PGW IP,…)                  Request (IMSI, TEIDs, )
                                                   S1-MME                                             21. Create Session
          DL-SCH:CCH SRB1                                                  22. Create Session
                                     23. Initial Context Setup Request                                Response
         24. RRC Security Mode                                             Response(IMSI, TEIDs)
                                     (UE Context Info: UE Security                                    (IMSI, TEIDs)
         Command, AS Algorithm
                                     Capability, KeNB
           UL-SCH: SRB1               NAS: Attach Accept
                                           NAS: Activate
        25. RRC Security Mode              default bearer req                    AS Security Setup
        Complete                                                                 Procedure

       SRB-2
          AS Security
         26. Obtain UE’s Radio
         Capability
          DL-SCH:CCH SRB2
        27. RRC Connection
        Reconfiguration NAS1
                           NAS2
           UL-SCH: SRB2
       28. RRC Reconfig Complete         29. Initial Context Setup
                                         Complete (S1U TEIDs)
       30. UL Information Transfer                                                 GTPC
                                         31. UL NAS Xport
         NAS1       NAS2                                                   32. Modify Bearer
                                          NAS: Attach Complete
                                                                           Req. (IMSI, TEIDs…)
                                               NAS: Activate
       SRB-0                                   default bearer acpt         33. Modify Bearer Resp
                                                                           (IMSI, S1U TEID)
       SRB-1
       SRB-2                         S1-MME                                GTPC Tunnel               GTPC-1 Tunnel
       Data Radio Bearer-10          GTPU-10 Tunnel                                                  GTP-U-10 Tunnel

Irfan Ali
  Irfan Ali                                                              18 18
Kenb Key Derivation at S1 Handover
                                                                     1 MME creates NH_2 and NCC=2
                                                                                                          NH_1 NCC++
                                                     MME                                                 Kasme

                     NH_1, NCC=1                                     NH_2, NCC=2                                 f2
                                      Kasme                                              Kasme
                                                                                                               {NH_2, NCC=2}

                                        KeNB_1
                                                                      2
                                                                    NH_2, NCC=2


                                                 0
                                                 Handover Required




                                                                                   3 eNB computes Kenb_2 using funciton f1
                              eNB_1                           eNB_2
                                                                                           PCI     NH_2 NCC=2
                                                                                   K eNB_2 EARFCN-DL
                                              KeNB_1                                                      f1
                                                                4
                                                                    NCC=2
                                                                                                        Kenb_2

                     Kasme            KeNB_1                                           KeNB_2
              NH_1, NCC=1
                                            UE checks NCC value to be correct
                                                                                                     Kasme
                                        5   UE computes NH_2 using function f2.
                                                                                                NH_2, NCC=2
                                            UE computes Kenb_2 using funciton f1

                                                                            PCI:          Physical Cell Identity
                                                                            EARFCN-DL:    E-UTRAN Absolute Frequency Channel –DL

Irfan Ali
  Irfan Ali                                                19 19
                                                                            NH
                                                                            NCC
                                                                                          Next Hop Parameter
                                                                                          NH Chaining Counter
Specifications


         TS 33.401 – LTE Security
         TS 33.102 – 3G Security




Irfan Ali
  Irfan Ali                          20 20

More Related Content

What's hot

Beginners: 5G Terminology
Beginners: 5G TerminologyBeginners: 5G Terminology
Beginners: 5G Terminology3G4G
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityP1Security
 
GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)Netwax Lab
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Hamidreza Bolhasani
 
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...ProcExpl
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksNaveen Kumar
 
Introduction to Nokia RNC
Introduction to Nokia RNCIntroduction to Nokia RNC
Introduction to Nokia RNCAhmed Nabeeh
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVikas Shokeen
 
AIRCOM LTE Webinar 4 - LTE Coverage
AIRCOM LTE Webinar 4 - LTE CoverageAIRCOM LTE Webinar 4 - LTE Coverage
AIRCOM LTE Webinar 4 - LTE CoverageAIRCOM International
 
Lte(long term evolution) 4G LTE
Lte(long term evolution) 4G LTELte(long term evolution) 4G LTE
Lte(long term evolution) 4G LTEkaishik gundu
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sipVikas Shokeen
 
Mobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSMobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSCisco Canada
 

What's hot (20)

Beginners: 5G Terminology
Beginners: 5G TerminologyBeginners: 5G Terminology
Beginners: 5G Terminology
 
Security In LTE Access Network
Security In LTE Access NetworkSecurity In LTE Access Network
Security In LTE Access Network
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
 
GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
Introduction to Nokia RNC
Introduction to Nokia RNCIntroduction to Nokia RNC
Introduction to Nokia RNC
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
5 g core overview
5 g core overview5 g core overview
5 g core overview
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
LTE Air Interface
LTE Air InterfaceLTE Air Interface
LTE Air Interface
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Huawei ipran solution
Huawei ipran solutionHuawei ipran solution
Huawei ipran solution
 
AIRCOM LTE Webinar 4 - LTE Coverage
AIRCOM LTE Webinar 4 - LTE CoverageAIRCOM LTE Webinar 4 - LTE Coverage
AIRCOM LTE Webinar 4 - LTE Coverage
 
Lte(long term evolution) 4G LTE
Lte(long term evolution) 4G LTELte(long term evolution) 4G LTE
Lte(long term evolution) 4G LTE
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 
Mobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSMobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLS
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 

Viewers also liked

Andy sutton - Multi-RAT mobile backhaul for Het-Nets
Andy sutton - Multi-RAT mobile backhaul for Het-NetsAndy sutton - Multi-RAT mobile backhaul for Het-Nets
Andy sutton - Multi-RAT mobile backhaul for Het-Netshmatthews1
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network SecuritySatish Chavan
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Mohamed Tharwat Waheed
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 
How to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the PlanetHow to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the PlanetPositive Hack Days
 
SS7: Locate. Track. Manipulate.
SS7: Locate. Track. Manipulate.SS7: Locate. Track. Manipulate.
SS7: Locate. Track. Manipulate.3G4G
 
Quick Summary of LTE Voice Summit 2015 #LTEVoice
Quick Summary of LTE Voice Summit 2015 #LTEVoiceQuick Summary of LTE Voice Summit 2015 #LTEVoice
Quick Summary of LTE Voice Summit 2015 #LTEVoice3G4G
 
Critical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technologyCritical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technology3G4G
 
Narrowband Internet of Things - R&S Whitepaper
Narrowband Internet of Things - R&S WhitepaperNarrowband Internet of Things - R&S Whitepaper
Narrowband Internet of Things - R&S Whitepaper3G4G
 
VoWLAN: Call Quality
VoWLAN: Call QualityVoWLAN: Call Quality
VoWLAN: Call Quality3G4G
 
Mobile Network Sharing
Mobile Network SharingMobile Network Sharing
Mobile Network Sharing3G4G
 
Radio Frequency, Band and Spectrum
Radio Frequency, Band and SpectrumRadio Frequency, Band and Spectrum
Radio Frequency, Band and Spectrum3G4G
 
2G/3G Switch off Dates
2G/3G Switch off Dates2G/3G Switch off Dates
2G/3G Switch off Dates3G4G
 

Viewers also liked (16)

Andy sutton - Multi-RAT mobile backhaul for Het-Nets
Andy sutton - Multi-RAT mobile backhaul for Het-NetsAndy sutton - Multi-RAT mobile backhaul for Het-Nets
Andy sutton - Multi-RAT mobile backhaul for Het-Nets
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
Gsm basics
Gsm basicsGsm basics
Gsm basics
 
How to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the PlanetHow to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the Planet
 
SS7: Locate. Track. Manipulate.
SS7: Locate. Track. Manipulate.SS7: Locate. Track. Manipulate.
SS7: Locate. Track. Manipulate.
 
Quick Summary of LTE Voice Summit 2015 #LTEVoice
Quick Summary of LTE Voice Summit 2015 #LTEVoiceQuick Summary of LTE Voice Summit 2015 #LTEVoice
Quick Summary of LTE Voice Summit 2015 #LTEVoice
 
Critical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technologyCritical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technology
 
Narrowband Internet of Things - R&S Whitepaper
Narrowband Internet of Things - R&S WhitepaperNarrowband Internet of Things - R&S Whitepaper
Narrowband Internet of Things - R&S Whitepaper
 
VoWLAN: Call Quality
VoWLAN: Call QualityVoWLAN: Call Quality
VoWLAN: Call Quality
 
Mobile Network Sharing
Mobile Network SharingMobile Network Sharing
Mobile Network Sharing
 
Radio Frequency, Band and Spectrum
Radio Frequency, Band and SpectrumRadio Frequency, Band and Spectrum
Radio Frequency, Band and Spectrum
 
2G/3G Switch off Dates
2G/3G Switch off Dates2G/3G Switch off Dates
2G/3G Switch off Dates
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Lte security overview

  • 1. LTE Security Overview Irfan Ali Version: 2 (October 2012) Irfan Ali 1
  • 2. Overview • Security in LTE  Security Architecture for 3GPP  During Attach • Key Derivation • Mutual Authentication • NAS Security • AS Security  Handovers • Key derivation at target eNB Irfan Ali Irfan Ali 2 2
  • 3. Key Cryptographic Methods • Two cryptographic Methods:  Symmetric key: uses same key at both ends (shared key) • Encryption algos: Data Encryption Standard (DES), 3DES, International Data Encryption Algorithm (IDEA) • Used in UMTS and LTE  Asymmetric key: uses two different keys (private and public keys) • Another tool used with the above is:  Hash function: One way transformation, used for digital signature generation. LTE uses Symmetric Key Cryptography Irfan Ali Irfan Ali 3 3
  • 4. Symmetric Key Cryptography: Encryption and Message Authentication Alice Bob m c m A A Communication Medium Ke Kd A Algorithm A (Ke, m) = c Ke Encryption key A (Kd, c) = m Kd Decryption key m message C encrypted message Ke := Kd Alice Bob Alice Bob Secret Key Hello DATA DATA R1 DATA MAC Algorithm R2, Kab( R1 | R2) Secret Key MAC MAC =? Kab( R2 | R1) MAC MAC Algorithm Mutual Authentication with Message Authentication or Integrity Protection with Secret Key Secret Key Irfan Ali Irfan Ali 4 4
  • 5. 3GPP Overall Security Architecture Network Domain HPLMN Security Security Domain B HPLMN Internet IMS Internet IMS HSS HSS P-GW P-GW SEG SEG S-GW S-GW S-GW S-GW MME MME eNB eNB eNB eNB eNB VPLMN eNB RRC Connection Security Domain A User Domain Security Network Access Security NAS Connection Irfan Ali Irfan Ali 5 5 SEG Security Gateway
  • 6. 3GPP Overall Security Architecture • Network Access Security  Primarily radio link security • Encryption and Integrity protection of RRC • Encryption and Integrity protection of NAS • Encryption of Data Radio bearers (optional) • Network Domain Security PLMN-A PLMN-B  Security of the wireline network between IKE/ISAKMP PLMNs • Key negoation using IKE IPSec/ESP • Use of ISAKMP for setting up the security association between the SEG • Tunnel-mode ESP to be used • Encryption triple DES • Data Integrity and Authentication: MD5 and SHA-1 • User Domain Security  User – USIM authentication: • NOTE: Maintaining Security on wired • Access to the USIM is restricted until the links within a security domain (i.e PLMN USIM has authenticated the user. Use of ,eg between eNB and MME) is PIN. If user does not know PIN, user is not responsibility of operator. Only allowed to use SIM. recommendations in 3GPP  USIM – Terminal authentication Specifications. • Used only for SIM-Locked Mobiles. When an ME is SIM-locked (SIM/USIM personalisation  In general, links should be either indicator in the ME to "on“), the ME stores physically secured or through IPSec the IMSI of the USIM. If the inserted USIM (NDS/IP) has a different IMSI, the ME goes into a emergency call only mode. Ref TS 22.022 Section 8. IKE Internet Key Exchange ISAKMP Internet Security Association and Key Management Protocol Irfan Ali Irfan Ali ESP Encapsulation Security Protocol 6 IPSec 6 IP Security
  • 7. Key Heirarchy for LTE HSS MME K K S6a Kasme Kasme Kasme KeNB SRB-0 KeNB KeNB SRB-1 S1-MME SRB-2 NAS GTPC-1 CK, IK CK, IK CK, IK CK, IK GTPC-1 Data Radio Bearer-10 GTP-U-10 GTP-U-10 CK CK UE eNB SGW PGW Encrypted Info ASME Access Security Management Entity (MME) CK, IK Ciphering Key, Integrity Protection Key Integrity Protected Irfan Ali Irfan Ali Info 7 7
  • 8. LTE Key Hierarchy USIM / AuC K CK, IK UE / HSS KASME UE / MME • ASME = Access Security KNASenc KNASint Management KeNB / NH Entity, located at the MME UE / eNB KUPenc KRRCint KRRCenc Irfan Ali Irfan Ali 8 8
  • 9. Identity Protection • The two permanent identities of UE are:  IMSI (subscriber identity) • Seldom send over the air (only during attach, if no other valid temporary ID is present in the UE). • Temporary identities used instead (S-TMSI, GUTI)  IMEI (hardware identity) • Only sent to MME (in NAS), not to eNB. • Sent only after NAS security is setup (i.e encrypted and integrity protected). Irfan Ali Irfan Ali S-TMSI GUTI System architecture evolution Temporary Mobile Subscriber Identity 9 9 Globally Unique Temporary Identity
  • 10. General Security Characteristics • Use of UMTS AKA (Authentication and Key Agreement) procedure • Use of 128-bit keys truncated from generated 256-bit keys • Ciphering Algorithms (AS and NAS):  0 = Null;  1= SNOW 3G;  2 = AES Rel-8 UE is required to • Integrity Algorithms (AS, NAS): support these algorithms  1= SNOW 3G;  2 = AES • Access Stratum (AS), between eNB and UE:  Ciphering applicable to both user traffic and RRC-level signaling traffic.  Integrity protection applicable only to RRC-level signaling traffic. Integrity information is ciphered.  Located at the PDCP sublayer in both eNB and UE • Non-Access Stratum (NAS), between MME and UE:  Ciphering and Integrity of NAS messages, independent of the AS security • Keys change at every intra-E-UTRAN handover, including intra-eNB handovers. Irfan Ali Irfan Ali 10 10 AES Advanced Encryption Standard
  • 11. LTE AKA SQN AUTN RAND UE MME HSS SQN K RAND Authentication data request (IMSI, VPLMN, Network USIM K Type = E-UTRAN) Function Generate authentication CK vectors AV(1..n) RES XRES IK CK RAND SQN VPLMN Authentication data AUTN IK response AV RAND SQN VPLMN IMSI Store authentication vectors AV(1..n) IMSI KDF Select authentication vector AV KDF Kasme User authentication request RAND || AUTN Kasme Verify AUTN Compute RES AV AUTN, RAND, XRES, Kasme User authentication response RES Compre RES and XRES AKA Authentication and Key Agreement AUTN Authentication TokeN Security Mode GUTI Globally Unique Temporary Identity Command Used to KSI Key Set Identifier Derive NAS keys from Kasme Irfan Ali Irfan Ali 11 11
  • 12. User authentication function in the USIM RAND AUTN f5 SQN  AK AMF MAC AK  SQN K f1 f2 f3 f4 XMAC RES CK IK Verify MAC = XMAC • USIM keeps track of last SQN received, SQNms • USIM only accepts a sequence number from HSS if |SQN – SQNms | < ∆ Verify that SQN is in the correct range AUTN Authentication TokeN AMF Authentication management field SQN Sequence Number AK Anonymity Key MAC Message Authentication Code Irfan Ali Irfan Ali 12 12
  • 13. Overview of NAS and AS Security negotiations UE eNB MME-1 HSS EPS-AKA EPS-AKA Partial EPS Partial EPS native Context. native Context NAS- Security Mode Command (SMC) NAS Security Algorithms decided here Full EPS Full EPS native native Context Context Current Kasme, KSImme eKSI Kasme Current UE’s security Capability AS-SMC AS Security Algorithms decided here AS Keys AS Keys ASME Access Security Management Entity (MME) Irfan Ali Irfan Ali 13 13 KSI Key Set Identifier
  • 14. Negotiation of NAS/AS Enc & Inc Algorithm  ME provides support of different EPS encryption (EEA) and integrity protection (EIA) algorithm support as part of “UE Network Capability” IE. • The same set of ciphering and integrity algorithms shall be supported by the UE both for AS and NAS level  The eNB and MME are configured with a prioritized list of EEA and EIA algorithms to use. Eg • Priority-0 EIA2 • Priority-1: EIA1  eNB/MME selects first intersection of configured algorithm with UE’s capability.  NAS and AS security algorithms can be different. Irfan Ali Irfan Ali 14 14
  • 15. Power-off/Power-on issue • Power-off  The objective is to store a fully valid native EPS security context, preferably in USIM otherwise in non-volatile memory of the ME. • Power-on  Retrieve a “valid” EPS security context either from (a) USIM, or (b) if-not from ME non-volatile memory. This becomes the current EPS security context.  If no valid EPS security context can be retrieved, UE signals to MME in attach that it has “no valid keys”. Irfan Ali Irfan Ali 15 15
  • 16. UE Performs attach – Part 1 of 3 Internet UE PGW eNB MME SGW RACH 1. Random Access Preamble Random Access Procedure DL-SCH: Common CC 2. Random Access Preamble UL-SCH: SRB0 3. RRC Connection Request RRC Setup DL-SCH: Common CC Procedure 4. RRC Connection Setup UL-SCH: SRB1 5. RRC Connection Complete NAS Msg: Attach Request IMSI NAS Msg PDN Connect Req Irfan Ali Irfan Ali 16 16
  • 17. UE Performs Attach – Part 2 of 3 HSS UE eNB MME SGW Encryption PGW + Integrity Interne eNB selects MME Protection Algorithm support NAS MSG: Attach S1-MME Request, IMSI, UE S6a Network Capability 6. Initial UE Message 7. Auth Info Request NAS MSG: Attach IMSI, VPLMN,Net=EUTRAN Request, IMSI, UE Network Capability 8. Auth Info Answer NAS Msg PDN Kasme, AUTN, RAND,XRES DL-SCH:CCH SRB1 Connect Req User Authentication 10. DL Info Xfer 9. DL NAS Xport Procedure Authn Request: Authn Request MME Compares AUTN, RAND, eKSI RES with XRES. If same, AKA 11. UL Info Transport successful 12. UL NAS Xport Authn Response Authn Response: RES UL-SCH: SRB1 DL-SCH:CCH SRB1 13. DL NAS Xport 14. DL Info Transport SMC: eKSI, NAS Algo, NAS Security Setup Security Mode Command UE Security Capability Procedure 15. UL Info Transport 16. UL NAS Xport Security Mode SMC Complete Complete 17. Location Update Request UL-SCH: SRB1 IMSI, … Authorization NAS Security 18. Location Update Response Subscription Data MME Irfan Ali Irfan Ali 17 UE authorizes17
  • 18. UE Performs Attach – Part 3 of 3 HSS PGW UE eNB MME SGW Interne NAS Security GTPC 19. Create Session GTPC-2 Request ((IMSI, TEIDs, 20. Create Session PGW IP,…) Request (IMSI, TEIDs, ) S1-MME 21. Create Session DL-SCH:CCH SRB1 22. Create Session 23. Initial Context Setup Request Response 24. RRC Security Mode Response(IMSI, TEIDs) (UE Context Info: UE Security (IMSI, TEIDs) Command, AS Algorithm Capability, KeNB UL-SCH: SRB1 NAS: Attach Accept NAS: Activate 25. RRC Security Mode default bearer req AS Security Setup Complete Procedure SRB-2 AS Security 26. Obtain UE’s Radio Capability DL-SCH:CCH SRB2 27. RRC Connection Reconfiguration NAS1 NAS2 UL-SCH: SRB2 28. RRC Reconfig Complete 29. Initial Context Setup Complete (S1U TEIDs) 30. UL Information Transfer GTPC 31. UL NAS Xport NAS1 NAS2 32. Modify Bearer NAS: Attach Complete Req. (IMSI, TEIDs…) NAS: Activate SRB-0 default bearer acpt 33. Modify Bearer Resp (IMSI, S1U TEID) SRB-1 SRB-2 S1-MME GTPC Tunnel GTPC-1 Tunnel Data Radio Bearer-10 GTPU-10 Tunnel GTP-U-10 Tunnel Irfan Ali Irfan Ali 18 18
  • 19. Kenb Key Derivation at S1 Handover 1 MME creates NH_2 and NCC=2 NH_1 NCC++ MME Kasme NH_1, NCC=1 NH_2, NCC=2 f2 Kasme Kasme {NH_2, NCC=2} KeNB_1 2 NH_2, NCC=2 0 Handover Required 3 eNB computes Kenb_2 using funciton f1 eNB_1 eNB_2 PCI NH_2 NCC=2 K eNB_2 EARFCN-DL KeNB_1 f1 4 NCC=2 Kenb_2 Kasme KeNB_1 KeNB_2 NH_1, NCC=1 UE checks NCC value to be correct Kasme 5 UE computes NH_2 using function f2. NH_2, NCC=2 UE computes Kenb_2 using funciton f1 PCI: Physical Cell Identity EARFCN-DL: E-UTRAN Absolute Frequency Channel –DL Irfan Ali Irfan Ali 19 19 NH NCC Next Hop Parameter NH Chaining Counter
  • 20. Specifications  TS 33.401 – LTE Security  TS 33.102 – 3G Security Irfan Ali Irfan Ali 20 20