SlideShare une entreprise Scribd logo
1  sur  12
Netmanias Technical Document: LTE Security I: LTE Security Concept and LTE Authentication 가
www.nmcgroups.com
About NMC Consulting Group
NMC Consulting Group was founded on year 2002 and is advanced, professional network consulting company which is specialized for IP Network area like FTTH, Metro
Ethernet and IP/MPLS, Service area like IPTV, IMS and CDN lastly, Wireless network area like Mobile WiMAX, LTE and Wi-Fi.
Copyright © 2002-2013 NMC Consulting Group. All rights reserved.
LTE Security I: LTE Security Concept and LTE Authentication
Table of Contents
I. Introduction
II. LTE Security Concept
III. LTE Authentication Procedure
IV. Closing
The LTE Security technical document consists of two companion documents: this first document
(Part I LTE Security I) and the second document (Part II LTE Security II) that follows. These
documents will cover the following three topics: LTE authentication (in Part I) and NAS security and
AS security (in Part II). In Part I, an overview of LTE security explaining the concept of the three
topics and the relationship among them will be given, followed by a detailed description of LTE
authentication procedure.
May 23, 2011
(Last Updated: July 31, 2013)
www.netmanias.com
NMC Consulting Group (tech@netmanias.com)
LTE Security I: LTE Security Concept and LTE Authentication
1
Netmanias LTE Technical Documents
Index Topic Document Title Area
1
Network
Architecture
LTE Network Architecture: Basic
2 Identification LTE Identification I: UE and ME Identifier
3 LTE Identification II: NE, Location and PDN Identifier
4 LTE Identification III: EPS Bearer Identifier
5 Security LTE Security I: LTE Security Concept and LTE Authentication O
6 LTE Security II: NAS and AS Security
7 QoS LTE QoS: SDF and EPS Bearer QoS
8 EMM LTE EMM and ECM State
9 LTE EMM: User Experience based EMM Scenario and Eleven EMM Cases
10 LTE EMM Procedure: 1. Initial Attach (Part 1) – Case of Initial Attach
11 LTE EMM Procedure: 1. Initial Attach (Part 2) – Call Flow of Initial Attach
12 LTE EMM Procedure: 2. Detach
13 LTE EMM Procedure: 3. S1 Release
14 LTE EMM Procedure: 4. Service Request
15 LTE EMM Procedure: 5. Periodic TAU
16
LTE EMM Procedure: 6. Handover without TAU (Part 1) – Overview of
LTE Handover
17 LTE EMM Procedure: 6. Handover without TAU (Part 2) – X2 Handover
18 LTE EMM Procedure: 6. Handover without TAU (Part 3) – S1 Handover
19 LTE EMM Procedure: 7. Cell Reselection without TAU
20 LTE EMM Procedure: 8/9. Handover/Cell Reselection with TAU
21 LTE EMM Procedure: 10/11. Toward Another City
22 PCC LTE Policy and Charging Control (PCC)
23 Charging LTE Charging I: Offline
24 LTE Charging II: Online (TBD)
25 IP Address
Allocation
LTE: IP Address Allocation Schemes I: Basic
26 LTE: IP Address Allocation Schemes II: A Case for Two Cities
LTE Security I: LTE Security Concept and LTE Authentication
2
Abbreviations
AES Advanced Encryption Standard
AKA Authentication and Key Agreement
AS Access Stratum
ASME Access Security Management Entity
AuC Authentication Center
AUTN Authentication Token
AV Authentication Vector
CK Cipher Key
eNB Evolved Node B
EPS Evolved Packet System
E-UTRAN Evolved Universal Terrestrial Radio Access Network
HSS Home Subscriber Server
IK Integrity Key
IMSI International Mobile Subscriber Identity
KDF Key Derivation Function
KSI Key Set Identifier
LTE Long Term Evolution
MAC-I Message Authentication Code for Integrity
MCC Mobile Country Code
MME Mobility Management Entity
MNC Mobile Network Code
NAS Non Access Stratum
NAS-MAC Message Authentication Code for NAS for Integrity
PDCP Packet Data Convergence Protocol
PLMN Public Land Mobile Network
RAND RANDom number
RES Response
RRC Radio Resource Control
SN ID Serving Network IDentity
SQN Sequence Number
UE User Equipment
UP User Plane
USIM Universal Subscriber Identity Module
XRES Expected Response
ZUC Zu Chongzhi
LTE Security I: LTE Security Concept and LTE Authentication
3
I. Introduction
Wireless communication, in its nature, is always at a risk of eavesdropping or manipulation because data
originally sent from/to a user may be received and unlawfully used by an unintended user. Locations or
traveling routes of a user can also be easily tracked by tracing to which cells the user is connected or
through which cells the user is travelling. And this can result in privacy infringement. Mobile
communication networks provide security features to ensure data transferred across radio links is not
manipulated, prevent unauthorized access by an unintended user to the data received, and protect the
privacy of users
The LTE Security document describes basic security features offered by LTE networks, including LTE
authentication, NAS (Non Access Stratum) security and AS (Access Stratum) security. LTE authentication
is the process of determining whether a user is an authorized subscriber to the network that he/she is trying
to access, while NAS security and AS security are features required to securely deliver user data that
travels through LTE radio links at NAS and AS levels.
The LTE Security document consists of the following two companion documents: Part I, LTE Security I,
and Part II, LTE Security II. Part I will explain the concept of LTE security and the detailed procedure of
LTE authentication, and Part II will discusses NAS and AS security setup.
Part I is organized as follows: In Chapter II, the scope of these two companion documents will be defined
and a conceptual overview will be given. Chapter III will focus on the detailed procedure of LTE
authentication and Chapter IV will summarize the LTE authentication and the LTE authentication-related
keys.
II. LTE Security Concept
2.1 Scope and Concept of LTE Security
Figure 1 below shows the scope and overall concept of the LTE Security documents. The scope of these
documents will include the following three areas:
❶ LTE Authentication: performs mutual authentication between UE and network
❷ NAS Security: performs integrity protection/validation and ciphering (encryption/decryption) of
NAS signaling between UE and MME
❸ AS Security
 performs integrity protection/validation and ciphering of RRC signaling between UE and eNB
 performs ciphering of user traffic between UE and eNB
LTE Security I: LTE Security Concept and LTE Authentication
4
Figure 1. Scope and Concept of LTE Security
LTE Authentication
In mobile communication networks, authentication refers to the process of determining whether a user is an
authorized subscriber to the network that he/she is trying to access. Among various authentication
procedures available in such networks, EPS AKA (Authentication and Key Agreement) procedure is used in
LTE networks for mutual authentication between users and networks.
The EPS AKA procedure consists of two steps. First, HSS (Home Subscriber Server) generates EPS
authentication vector(s) (RAND, AUTN, XRES, KASME) and delivers them to MME. Then in the second
step, MME selects one of the authentication vectors and uses it for mutual authentication with UE and
shares the same authentication key (KASME) each other. Mutual authentication is the process in which a
network and a user authenticate each other. In LTE networks, since the ID of the user's serving network is
required when generating authentication vectors, authentication of the network by the user is performed in
addition to authentication of the user by the network.
ASME (Access Security Management Entity) is an entity that receives top-level key(s), from HSS, to be
used in an access network. In EPS, MME serves as ASME and KASME is used as the top-level key to be used
in the access network. MME, on behalf of HSS, conducts mutual authentication with UE using KASME. Once
mutually authenticated, UE and MME get to share the same KASME as an authentication key.
To avoid any possible eavesdropping or manipulation of data across radio links, KASME is not delivered to UE
via E-UTRAN. Instead, MME delivers part of authentication vector to UE, which uses it to authenticate the
Mutual
Authentication
EPS Authentication Vectors
(RAND, AUTN, XRES, KASME)
KNASint/KNASenc
KNASint/KNASenc
KRRCint/KRRCenc KUPenc
KRRCint/KRRCenc KUPenc
RRC Signaling
§ Integrity
§ Ciphering
IMSI, LTE K
NAS Signaling
§ Integrity
§ Ciphering
KASME
KASME
KeNB
KeNBUE
eNB
MME
HSS
2
3
Mandatory
Optional
KeNB
1
IP Packet
§ Ciphering
IMSI, LTE K
NAS
Security
AS Security
LTE Security I: LTE Security Concept and LTE Authentication
5
network and generates KASME as HSS does.
NAS Security
NAS security, designed to securely deliver signaling messages between UE and MME over radio links,
performs integrity check (i.e., integrity protection/validation) and ciphering of NAS signaling messages.
Different keys are used for integrity check and for ciphering. While integrity check is a mandatory function,
ciphering is an optional function. NAS security keys, such as integrity key (KNASint) and ciphering key
(KNASenc), are derived by UE and MME from KASME.
AS Security
AS security is purposed to ensure secure delivery of data between UE and eNB over radio links. It conducts
both integrity check and ciphering of RRC signaling messages in control plane, and only ciphering of IP
packets in user plane. Different keys are used for integrity check/ciphering of RRC signaling messages and
ciphering of IP packets. Integrity check is mandatory, but ciphering is optional.
AS security keys, such as KRRCint, KRRCenc and KUPenc, are derived from KeNB by UE and eNB. KRRCint and
KRRCenc are used for integrity check and ciphering of control plane data (i.e., RRC signaling messages), and
KUPenc is used for ciphering of user plane data (i.e., IP packets). Integrity check and ciphering are
performed at PDCP (Packet Data Convergence Protocol) layer.
UE can derive KeNB from KASME. However, since KASME is not transferred to eNB, MME instead generates
KeNB from KASME and forwards it to eNB.
2.2 Overview of LTE Security Procedure
Figure 2 shows the overview of LTE security procedure. ❶ displays LTE authentication procedure while
❷ and ❸ demonstrate security setup procedures for NAS and AS respectively. A brief description of each
procedure will be given below first. Then, a detailed explanation on the LTE authentication procedures and
NAS and AS security setup procedures will be given in Chapter III hereof and again in Part II, LTE Security
II, that follows.
LTE Security I: LTE Security Concept and LTE Authentication
6
Figure 2. Overview of LTE Security Procedure
❶ LTE Authentication
When a user requests for access to a LTE network, mutual authentication between the user and the
network is conducted using EPS AKA procedure. MME, upon receipt of such request, identifies the user
using his/her IMSI and requests authentication vector(s) (AVs) from HSS1
. HSS then generates AV(s)
using EPS AKA algorithm, AV={RAND, XRES, AUTNHSS, KASME}, and forwards them to MME.
After storing the AVs, MME selects one of them and uses it to perform mutual authentication with UE2
.
MME forwards RAND and AUTNHSS to UE, which then computes RES, AUTNUE and KASME using EPS
AKA algorithm. UE now compares its own AUTNUE and AUTNHSS received from MME for network
authentication. Once authenticated, RES is forwarded to MME, which then compares XRES received
from HSS and RES received from UE for user authentication. If UE and network have authenticated each
other, they share the same key KASME (KASME is not transferred between UE and MME, though)
❷ NAS Security
Once UE and MME have authenticated each other and the same key KASME is shared, NAS security setup
1
MME may request for more than one authentication vectors.
2
In general, UE consists of USIM and ME. USIM handles mutual authentication and ME delivers authentication
information between MME and USIM. Once the network is successfully authenticated, USIM calculates CK and IK and
delivers them to ME, which then calculates KASME based on them. USIM and ME are collectively referred to as UE
herein for the sake of convenience unless it is required to refer to USIM specifically.
Attach Request (IMSI, UE Network Capability, KSIASME=7)
Authentication Data Request (IMSI, SN ID, Network Type)
Authentication Data Response (AVs (1...n))
Authentication Request (RAND, AUTNHSS, KSIASME=1)
[not ciphered; not integrity protected]
Authentication Response (RES) [not ciphered; not integrity protected]
AS Security Mode Complete (MAC-I)
[AS integrity protected]
AS Security Mode Command
(Ciphering Algorithm=EEA1, Integrity
Algorithm=EIA1, MAC-I)
[AS integrity protected]
Attach Accept
<Initial Context Setup Request>
(UE Network Capability, KeNB)
NAS Security Mode Command (KSIASME=1, Replayed UE Network Capability, NAS
Ciphering Algorithm=EEA1, NAS Integrity Algorithm=EIA1, NAS-MAC)
[NAS integrity protected]
NAS Security Mode Complete (NAS-MAC) [NAS ciphered and integrity protected]
Network(HSS) Authentication
( AUTNUE = AUTNHSS )
UE Authentication
( RES = XRES )
Authentication
NAS Security Setup
AS Security Setup
Ciphered and Integrity Protected NAS Signaling
Compute KeNB
Ciphered and Integrity Protected RRC Signaling
Ciphered User Plane (Data Plane)
KNASenc, KNASint
KRRCenc, KRRCint
KUPenc
KRRCenc, KRRCint
KUPenc
eNBUE MME HSS
1
2
3
LTE K RAND
EPS AKA Algorithm
AUTNUE RES KASME
SQN SN ID
LTE K RAND
EPS AKA Algorithm
AUTNHSS XRES KASME
SQN SN ID
Authentication Vector=
(RAND, XRES, AUTNHSS, KASME)
Select encryption/integrity algorithm
KNASenc
KASME
KDF
KNASint
Alg-ID, Alg Distinguisher
KNASenc, KNASint
NAS Uplink Count
KeNB
KASME
KDF
Alg-ID, Alg Distinguisher
KRRCenc
KeNB
KDF
KRRCint KUPenc
Select encryption/integrity algorithm
NAS Uplink Count
KeNB
KASME
KDF
KNASenc
KASME
KDF
KNASint
Alg-ID, Alg Distinguisher
Alg-ID, Alg Distinguisher
KRRCenc
KeNB
KDF
KRRCint KUPenc
UE Security Capability (Supported
encryption/integrity algorithm)
- EEA0=on, EEA1=on, EEA2=off,…
- EIA1=on, EIA2=on, …
UE Network Capability (24.301)
EPS encryption algorithm (EEA)
EEA0 NO encryption
128-EEA1 SNOW 3G
128-EEA2 128-bit AES
EEA3~EEA7 NOT Defined
EPS integrity algorithm (EIA)
128-EIA1 SNOW 3G
128-EIA2 128-bit AES
EEA3~EEA7 NOT Defined
Alg-ID
EEA0 00
EEA1 01
EEA2 02
EIA1 01
EIA2 02
Alg Distinguisher
NAS-enc-alg 01
NAS-int-alg 02
RRC-enc-alg 03
RRC-int-alg 04
UP-enc-alg 05
KASME
LTE Security I: LTE Security Concept and LTE Authentication
7
procedure begins. In this procedure, NAS security keys to be used when delivering NAS signaling
messages are derived from KASME for secure delivery of these messages. This procedure consists of a
round trip of NAS signaling messages (Security Mode Command message and Security Mode Complete
message), and begins when MME delivers Security Mode Command message to UE.
First, MME selects NAS security algorithms (Alg-ID: Algorithm ID) and uses them to create an
integrity key (KNASint ) and a ciphering key (KNASenc) from KASME. Then, it applies KNASint to the Security
Mode Command message to generate an NAS message authentication code (NAS-MAC, Message
Authentication Code for NAS for Integrity). MME then delivers the Security Mode Command message
including the selected NAS security algorithms and the NAS-MAC to UE. As UE does not know the
selected encryption algorithm yet, this message is integrity protected only but not ciphered.
Upon receiving the Security Mode Command message, UE verifies the integrity thereof by using the NAS
integrity algorithm selected by MME and uses NAS integrity/ciphering algorithm to generate NAS
security keys (KNASint and KNASenc) from KASME. Then it ciphers the Security Command Complete message
with KNASenc and generates a message authentication code, NAS-MAC with KNASint to the ciphered
message. Now it forwards the ciphered and integrity protected message to MME with the NAS-MAC
included.
Once MME successfully verifies the integrity of the received Security Mode Complete message and has
them decrypted using the NAS security keys (KNASint and KNASenc), the NAS security setup procedure is
completed.
Once the NAS security is set up, NAS signaling messages between UE and MME are ciphered and
integrity protected by the NAS security keys and then securely delivered over radio links.
❸ AS Security
After NAS security setup is finished, AS security setup procedure between UE and eNB begins. In this
procedure, AS security keys to be used when delivering RRC signaling messages and IP packets are
derived from KeNB for secure delivery of these data. This procedure consists of a round trip of RRC
signaling messages (Security Mode Command message and Security Mode Complete message), and begins
when eNB delivers Security Mode Command message to UE.
First, MME calculates KeNB from KASME and delivers it to eNB, which uses it to perform the AS security
setup procedure. eNB selects AS security algorithms (Alg-ID: Algorithm ID) and uses them to create an
integrity key (KRRCint) and a ciphering key (KRRCenc), from KeNB. to be used for RRC signaling messages,
and a ciphering key (KUPenc) to be used in the user plane. Then, it applies KRRCint to the Security Mode
Command message to generate a message authentication code (MAC-I, Message Authentication Code for
Integrity). eNB now delivers the Security Mode Command message including the selected AS security
algorithms and the MAC-I to UE.
Upon receiving the Security Mode Command message from eNB, UE verifies the integrity thereof by
using the AS integrity algorithm selected by eNB and uses AS integrity/ciphering algorithm to generate
AS security keys (KRRCint, KRRCenc and KUPenc). Then it generates a message authentication code, MAC-I,
with the RRC integrity key to the Security Command Complete message, and then forwards the message
including the MAC-I to eNB.
LTE Security I: LTE Security Concept and LTE Authentication
8
eNB successfully verifies the integrity of the received Security Mode Complete message by using the AS
integrity key, the AS security setup procedure is completed.
After the AS security is set up, RRC signaling messages between UE and eNB are ciphered and integrity
protected by the AS security keys, and user IP packets are encrypted and then securely delivered over
radio links.
III. LTE Authentication Procedure
The LTE authentication procedure briefly described in Chapter II will be further discussed below. Figure 3
shows the EPS AKA-based LTE authentication procedure that is performed when UE attaches to the LTE
network. On the USIM and in the HSS/AuC are stored a permanent key, LTE key (K), and IMSI3
. These
LTE key (K) and IMSI are stored on the USIM card when UE is being manufacturing, and provisioned in the
SS/AuC [Q4] when a user begins subscription to his/her operator’s network.
Figure 3. LTE Authentication Procedure
3.1 Authentication Request by UE
❶ [UE  MME] Request by UE for Network Registration
When UE attempts to access the network for initial attach, it delivers Attach Request (IMSI, UE Network
Capability, KSIASME=7) message to MME. And this triggers EPS AKA procedure. The following information
3
LTE key (K) is stored in AuC (Authentication Center) in operator's network and in USIM in UE. In Figures herein,
AuC and HSS are collectively referred to as HSS, and USIM and ME as UE for the sake of convenience.
MME HSSAttach Request (IMSI, UE
Network Capability, KSIASME=7)
SQN
Crypto function
LTE K RAND
XRES AUTN CK IK
KDF
SQN
SN ID
KASME
IMSI: Provisioned @AuC
RAND: HSS generates
LTE K: Provisioned @AuC
SQN: HSS generates (increase)
Select an AV (e.g., AV i)
KSIASME AV
1 XRES i, KASME i
Authentication Request
(RAND i, AUTN i, KSIASME i)
SQN
Crypto function
LTE K RAND i
RES AUTNUE CK IK
KDF
SQN
SN ID
KASME (KASME i)
IMSI: Factory Default
RAND: HSS generates
LTE K: Factory Default
SQN: HSS generates
Authentication Response
(RES)
UE uses KASME (KASME i) to
calculates additional keys
MME uses KASME (KASME i) to
calculates additional keys
IMSI
USIM
LTE K
Authentication Vector (AV)
AV = (RAND, AUTN, XRES, KASME)
Authentication Complete
HSS authenticated
if AUTN i = AUTNUE
UE authenticated
if RES = XRES i
KSIASME value is not used for
authentication itself, but used to
generate subsequent key values
(for Encryption & Integrity Check)
KSIASME AV
1 KASME i
1 2
3
4
5
UE MME HSSAuthentication Information Request
(IMSI, SN ID, n, Network Type)
Authentication Information
Answer (Authentication Vectors)
AV 1 = (RAND1, AUTN1, XRES1, KASME1)
…
AV i = (RANDi, AUTNi, XRESi, KASMEi)
…
AV n = (RANDn, AUTNn, XRESn, KASMEn)
LTE Security I: LTE Security Concept and LTE Authentication
9
elements are included in the Attach Request message:
 IMSI: International Mobile Subscriber Identity, a unique identifier associated with the user
 UE Network Capability: security algorithms available to UE
 KSIASME=7: indicates UE has no authentication key
UE network capability informs MME of what kinds of capability UE has related to EPS, and indicates which
NAS and AS security algorithms, i.e., EPS Encryption Algorithms (EEA) and EPS Integrity Algorithms
(EIA) are supported by the UE. Each of them has a value of 1 bit that is presented as on (supported) or off
(not supported) (e.g. EEA0=on, EEA1=on, EEA2=off, …, EIA1=on, EIA2=on, …). Table 1 lists some
of UE network capability information, specifically ciphering and integrity protection algorithms defined in
[3].
Table 1. UE Network Capability Information – EEA and EIA [3]
EEA EIA
EEA0 Null ciphering algorithm EIA0
4
Null integrity protection algorithm
128-EEA1 SNOW 3G 128-EIA1 SNOW 3G
128-EEA2 AES 128-EIA2 AES
128-EEA3 ZUC 128-EIA3 ZUC
KSIASME identifies KSIASME for UE and MME. It is 3 bits and has values ranging from 0 ('000') to 7 ('111'),
where 7 ('111') indicates UE has no KASME available.
3.2 Authentication Data Exchange between MME and HSS
❷ [MME  HSS] Request by MME for Authentication Data
MME recognizing UE has no KASME available initiates LTE authentication procedure to get new authentication
data by sending Authentication Information Request (IMSI, SN ID, n, Network Type) message to HSS.
Message parameters used for this purpose are as follows:
 IMSI: a unique identifier associated with the user
 SN ID (Serving Network ID): refers to the network accessed by the user. Consists of PLMN ID
(MCC+MNC).
 n (number of Authentication Vectors): No. of authentication vectors that MME requests
 Network Type: type of the network accessed by UE (E-UTRAN herein)
Upon receipt of the Authentication Information Request message from MME, HSS generates RAND and SQN,
and creates XRES, AUTN, CK and IK using EPS AKA algorithm with LTE key (K), SQN and RAND.
Thereafter, using CK, IK, SQN and SN ID, it derives a top-level key (KASME) of the access network, from
Key Derivation Function (KDF), to be delivered to MME. KDF is a one-way has function. Since SN ID is
required when deriving KASME, KASME is derived again if the serving network is changed. After KASME is
derived, HSS forms authentication vectors AVi=(RANDi, AUTNi, XRESi, KASMEi), i=0..n.
4
EIA0 is allowed in an unauthorized emergency call only.
LTE Security I: LTE Security Concept and LTE Authentication
10
❸ [MME  HSS] Response by HSS to the Authentication Data Request
HSS forms as many AVs as requested by MME and then delivers Authentication Information Answer (AVs)
message to MME.
3.3 Mutual Authentication by UE and MME
MME stores the AVs received from HSS, and selects one of them to use in LTE authentication of UE. In
Figure 3, MME selected ith AV (AVi). KASME is a base key of MME and serves as a top-level key in the
access network. It stays within EPC only and is not delivered to UE through E-UTRAN, which is not
secure. MME allocates KSIASME, an index for KASME, and delivers it instead of KASME to UE so that UE and
MME use it as a substitute for KASME (in Fig. 3, KSIASME=1).
❹ [UE  MME] Request by MME for User Authentication
MME keeps KASMEi and XRESi in AVi but delivers KSIASMEi, in substitution for KASMEi, RANDi and AUTNi as
included in Authentication Request (KSIASMEi, RANDi, AUTNi) message to UE. XRESi is used later in ❺ when
authenticating the user.
UE, upon receiving Authentication Request message from MME, delivers RANDi and AUTNi to USIM. USIM,
using the same EPS AKA algorithm that HSS used, derives RES, AUTNUE, CK and IK with the stored LTE
key (K) and RANDi and SQN generated from HSS5
. UE then compares AUTNUE generated using EPS AKA
algorithm and AUTN received from MME (AUTNi in Fig. 3) to authenticate the LTE network (the serving
network).
❺ [UE  MME] Response by UE to User Authentication
Once UE completes the network authentication, it delivers Authentication Response (RES) including RES
generated using EPS AKA algorithm to MME. If the network authentication using AUTN fails in ❹, UE
sends Authentication Failure (CAUSE) message that contains a CAUSE field stating reasons for such failure.
When MME receives Authentication Response message from UE, it compares RES generated by UE and
XRESi of the AV received from HSS to authenticate the user.
USIM delivers CK and IK to UE after its network authentication is completed. UE derives KASME using Key
Derivation Function (KDF) with CK, IK, SQN and SN ID and stores it using KSIASME received from MME as
its index. Thereafter, KSIASME is used instead of KASME during the NAS security setup between UE and MME.
5
SQN is concealed in AUTNi.
LTE Security I: LTE Security Concept and LTE Authentication
About NMC Consulting Group
NMC Consulting Group was founded on year 2002 and is advanced, professional network consulting company which is specialized for IP Network area like FTTH, Metro
Ethernet and IP/MPLS, Service area like IPTV, IMS and CDN lastly, Wireless network area like Mobile WiMAX, LTE and Wi-Fi.
Copyright © 2002-2013 NMC Consulting Group. All rights reserved.
11
IV. Closing
We have discussed the LTE authentication, one of the LTE security topics. As seen so far, LTE
authentication is mutual authentication performed by and between a user and a network based on EPS AKA
procedure. MME in the serving network performs mutual authentication with UE on behalf of HSS, and as a
result, KASME is shared by UE and MME. Table 2 summarizes the LTE authentication-related keys covered
herein. In Part II, LTE Security II, that follows, NAS and AS security setup procedures based on KASME
discussed herein will be further explained.
Table 2. LTE Security Keys: Authentication
Key Length Location Derived from Description
K 128 bits USIM, HSS/AuC - LTE key
CK 128 bits USIM, HSS/AuC K Cipher key
IK 128 bits USIM, HSS/AuC K Integrity key
KASME 256 bits UE, HSS, MME CK, IK MME base key
References
[1] Netmanias Technical Document, “LTE Security II”, August 2012,
http://www.netmanias.com/bbs/view.php?id=techdocs&no=66
[2] 3GPP TS 24.301, “Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS); Stage
3”.
[3] 3GPP TS 33.401, “3GPP System Architecture Evolution (SAE); Security Architecture”.
[4] NMC Consulting Group Internal Report, “E2E LTE Network Design”, August 2010.

Contenu connexe

Tendances

IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET Journal
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
WiMAX Network Security
WiMAX Network SecurityWiMAX Network Security
WiMAX Network Securitysashar86
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingVuz Dở Hơi
 
ZigBee energy manager Keletron presales
ZigBee  energy manager Keletron presalesZigBee  energy manager Keletron presales
ZigBee energy manager Keletron presalesYiannis Hatzopoulos
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkVuz Dở Hơi
 
Design of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformDesign of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformIRJET Journal
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 

Tendances (16)

IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Y36146148
Y36146148Y36146148
Y36146148
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
WiMAX Network Security
WiMAX Network SecurityWiMAX Network Security
WiMAX Network Security
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
ZigBee energy manager Keletron presales
ZigBee  energy manager Keletron presalesZigBee  energy manager Keletron presales
ZigBee energy manager Keletron presales
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj
Kastriot Blakaj
 
Design of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformDesign of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android Platform
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
Ip sec
Ip secIp sec
Ip sec
 

Similaire à Netmanias.2013.08.05 lte security i-concept and authentication.eng

4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdf4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdfssuser989b18
 
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdf
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdfNetmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdf
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdfmanasa718411
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMIJNSA Journal
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Ericsson
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...CSCJournals
 
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...CSCJournals
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLIJNSA Journal
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAXEditor IJMTER
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network SecuritySatish Chavan
 
3g security analysis
3g security analysis3g security analysis
3g security analysisashrawi92
 
A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...
A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...
A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...IJECEIAES
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSIJNSA Journal
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
 
Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secureIJNSA Journal
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 
Seps aka a secure evolved packet system authentication and key agreement sch...
Seps aka  a secure evolved packet system authentication and key agreement sch...Seps aka  a secure evolved packet system authentication and key agreement sch...
Seps aka a secure evolved packet system authentication and key agreement sch...csandit
 

Similaire à Netmanias.2013.08.05 lte security i-concept and authentication.eng (20)

4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdf4G and 5G network security techniques and algorithms.pdf
4G and 5G network security techniques and algorithms.pdf
 
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdf
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdfNetmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdf
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdf
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
 
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
15-105 v6
15-105 v615-105 v6
15-105 v6
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAX
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
3g security analysis
3g security analysis3g security analysis
3g security analysis
 
A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...
A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...
A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
 
Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secure
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
Seps aka a secure evolved packet system authentication and key agreement sch...
Seps aka  a secure evolved packet system authentication and key agreement sch...Seps aka  a secure evolved packet system authentication and key agreement sch...
Seps aka a secure evolved packet system authentication and key agreement sch...
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Netmanias.2013.08.05 lte security i-concept and authentication.eng

  • 1. Netmanias Technical Document: LTE Security I: LTE Security Concept and LTE Authentication 가 www.nmcgroups.com About NMC Consulting Group NMC Consulting Group was founded on year 2002 and is advanced, professional network consulting company which is specialized for IP Network area like FTTH, Metro Ethernet and IP/MPLS, Service area like IPTV, IMS and CDN lastly, Wireless network area like Mobile WiMAX, LTE and Wi-Fi. Copyright © 2002-2013 NMC Consulting Group. All rights reserved. LTE Security I: LTE Security Concept and LTE Authentication Table of Contents I. Introduction II. LTE Security Concept III. LTE Authentication Procedure IV. Closing The LTE Security technical document consists of two companion documents: this first document (Part I LTE Security I) and the second document (Part II LTE Security II) that follows. These documents will cover the following three topics: LTE authentication (in Part I) and NAS security and AS security (in Part II). In Part I, an overview of LTE security explaining the concept of the three topics and the relationship among them will be given, followed by a detailed description of LTE authentication procedure. May 23, 2011 (Last Updated: July 31, 2013) www.netmanias.com NMC Consulting Group (tech@netmanias.com)
  • 2. LTE Security I: LTE Security Concept and LTE Authentication 1 Netmanias LTE Technical Documents Index Topic Document Title Area 1 Network Architecture LTE Network Architecture: Basic 2 Identification LTE Identification I: UE and ME Identifier 3 LTE Identification II: NE, Location and PDN Identifier 4 LTE Identification III: EPS Bearer Identifier 5 Security LTE Security I: LTE Security Concept and LTE Authentication O 6 LTE Security II: NAS and AS Security 7 QoS LTE QoS: SDF and EPS Bearer QoS 8 EMM LTE EMM and ECM State 9 LTE EMM: User Experience based EMM Scenario and Eleven EMM Cases 10 LTE EMM Procedure: 1. Initial Attach (Part 1) – Case of Initial Attach 11 LTE EMM Procedure: 1. Initial Attach (Part 2) – Call Flow of Initial Attach 12 LTE EMM Procedure: 2. Detach 13 LTE EMM Procedure: 3. S1 Release 14 LTE EMM Procedure: 4. Service Request 15 LTE EMM Procedure: 5. Periodic TAU 16 LTE EMM Procedure: 6. Handover without TAU (Part 1) – Overview of LTE Handover 17 LTE EMM Procedure: 6. Handover without TAU (Part 2) – X2 Handover 18 LTE EMM Procedure: 6. Handover without TAU (Part 3) – S1 Handover 19 LTE EMM Procedure: 7. Cell Reselection without TAU 20 LTE EMM Procedure: 8/9. Handover/Cell Reselection with TAU 21 LTE EMM Procedure: 10/11. Toward Another City 22 PCC LTE Policy and Charging Control (PCC) 23 Charging LTE Charging I: Offline 24 LTE Charging II: Online (TBD) 25 IP Address Allocation LTE: IP Address Allocation Schemes I: Basic 26 LTE: IP Address Allocation Schemes II: A Case for Two Cities
  • 3. LTE Security I: LTE Security Concept and LTE Authentication 2 Abbreviations AES Advanced Encryption Standard AKA Authentication and Key Agreement AS Access Stratum ASME Access Security Management Entity AuC Authentication Center AUTN Authentication Token AV Authentication Vector CK Cipher Key eNB Evolved Node B EPS Evolved Packet System E-UTRAN Evolved Universal Terrestrial Radio Access Network HSS Home Subscriber Server IK Integrity Key IMSI International Mobile Subscriber Identity KDF Key Derivation Function KSI Key Set Identifier LTE Long Term Evolution MAC-I Message Authentication Code for Integrity MCC Mobile Country Code MME Mobility Management Entity MNC Mobile Network Code NAS Non Access Stratum NAS-MAC Message Authentication Code for NAS for Integrity PDCP Packet Data Convergence Protocol PLMN Public Land Mobile Network RAND RANDom number RES Response RRC Radio Resource Control SN ID Serving Network IDentity SQN Sequence Number UE User Equipment UP User Plane USIM Universal Subscriber Identity Module XRES Expected Response ZUC Zu Chongzhi
  • 4. LTE Security I: LTE Security Concept and LTE Authentication 3 I. Introduction Wireless communication, in its nature, is always at a risk of eavesdropping or manipulation because data originally sent from/to a user may be received and unlawfully used by an unintended user. Locations or traveling routes of a user can also be easily tracked by tracing to which cells the user is connected or through which cells the user is travelling. And this can result in privacy infringement. Mobile communication networks provide security features to ensure data transferred across radio links is not manipulated, prevent unauthorized access by an unintended user to the data received, and protect the privacy of users The LTE Security document describes basic security features offered by LTE networks, including LTE authentication, NAS (Non Access Stratum) security and AS (Access Stratum) security. LTE authentication is the process of determining whether a user is an authorized subscriber to the network that he/she is trying to access, while NAS security and AS security are features required to securely deliver user data that travels through LTE radio links at NAS and AS levels. The LTE Security document consists of the following two companion documents: Part I, LTE Security I, and Part II, LTE Security II. Part I will explain the concept of LTE security and the detailed procedure of LTE authentication, and Part II will discusses NAS and AS security setup. Part I is organized as follows: In Chapter II, the scope of these two companion documents will be defined and a conceptual overview will be given. Chapter III will focus on the detailed procedure of LTE authentication and Chapter IV will summarize the LTE authentication and the LTE authentication-related keys. II. LTE Security Concept 2.1 Scope and Concept of LTE Security Figure 1 below shows the scope and overall concept of the LTE Security documents. The scope of these documents will include the following three areas: ❶ LTE Authentication: performs mutual authentication between UE and network ❷ NAS Security: performs integrity protection/validation and ciphering (encryption/decryption) of NAS signaling between UE and MME ❸ AS Security  performs integrity protection/validation and ciphering of RRC signaling between UE and eNB  performs ciphering of user traffic between UE and eNB
  • 5. LTE Security I: LTE Security Concept and LTE Authentication 4 Figure 1. Scope and Concept of LTE Security LTE Authentication In mobile communication networks, authentication refers to the process of determining whether a user is an authorized subscriber to the network that he/she is trying to access. Among various authentication procedures available in such networks, EPS AKA (Authentication and Key Agreement) procedure is used in LTE networks for mutual authentication between users and networks. The EPS AKA procedure consists of two steps. First, HSS (Home Subscriber Server) generates EPS authentication vector(s) (RAND, AUTN, XRES, KASME) and delivers them to MME. Then in the second step, MME selects one of the authentication vectors and uses it for mutual authentication with UE and shares the same authentication key (KASME) each other. Mutual authentication is the process in which a network and a user authenticate each other. In LTE networks, since the ID of the user's serving network is required when generating authentication vectors, authentication of the network by the user is performed in addition to authentication of the user by the network. ASME (Access Security Management Entity) is an entity that receives top-level key(s), from HSS, to be used in an access network. In EPS, MME serves as ASME and KASME is used as the top-level key to be used in the access network. MME, on behalf of HSS, conducts mutual authentication with UE using KASME. Once mutually authenticated, UE and MME get to share the same KASME as an authentication key. To avoid any possible eavesdropping or manipulation of data across radio links, KASME is not delivered to UE via E-UTRAN. Instead, MME delivers part of authentication vector to UE, which uses it to authenticate the Mutual Authentication EPS Authentication Vectors (RAND, AUTN, XRES, KASME) KNASint/KNASenc KNASint/KNASenc KRRCint/KRRCenc KUPenc KRRCint/KRRCenc KUPenc RRC Signaling § Integrity § Ciphering IMSI, LTE K NAS Signaling § Integrity § Ciphering KASME KASME KeNB KeNBUE eNB MME HSS 2 3 Mandatory Optional KeNB 1 IP Packet § Ciphering IMSI, LTE K NAS Security AS Security
  • 6. LTE Security I: LTE Security Concept and LTE Authentication 5 network and generates KASME as HSS does. NAS Security NAS security, designed to securely deliver signaling messages between UE and MME over radio links, performs integrity check (i.e., integrity protection/validation) and ciphering of NAS signaling messages. Different keys are used for integrity check and for ciphering. While integrity check is a mandatory function, ciphering is an optional function. NAS security keys, such as integrity key (KNASint) and ciphering key (KNASenc), are derived by UE and MME from KASME. AS Security AS security is purposed to ensure secure delivery of data between UE and eNB over radio links. It conducts both integrity check and ciphering of RRC signaling messages in control plane, and only ciphering of IP packets in user plane. Different keys are used for integrity check/ciphering of RRC signaling messages and ciphering of IP packets. Integrity check is mandatory, but ciphering is optional. AS security keys, such as KRRCint, KRRCenc and KUPenc, are derived from KeNB by UE and eNB. KRRCint and KRRCenc are used for integrity check and ciphering of control plane data (i.e., RRC signaling messages), and KUPenc is used for ciphering of user plane data (i.e., IP packets). Integrity check and ciphering are performed at PDCP (Packet Data Convergence Protocol) layer. UE can derive KeNB from KASME. However, since KASME is not transferred to eNB, MME instead generates KeNB from KASME and forwards it to eNB. 2.2 Overview of LTE Security Procedure Figure 2 shows the overview of LTE security procedure. ❶ displays LTE authentication procedure while ❷ and ❸ demonstrate security setup procedures for NAS and AS respectively. A brief description of each procedure will be given below first. Then, a detailed explanation on the LTE authentication procedures and NAS and AS security setup procedures will be given in Chapter III hereof and again in Part II, LTE Security II, that follows.
  • 7. LTE Security I: LTE Security Concept and LTE Authentication 6 Figure 2. Overview of LTE Security Procedure ❶ LTE Authentication When a user requests for access to a LTE network, mutual authentication between the user and the network is conducted using EPS AKA procedure. MME, upon receipt of such request, identifies the user using his/her IMSI and requests authentication vector(s) (AVs) from HSS1 . HSS then generates AV(s) using EPS AKA algorithm, AV={RAND, XRES, AUTNHSS, KASME}, and forwards them to MME. After storing the AVs, MME selects one of them and uses it to perform mutual authentication with UE2 . MME forwards RAND and AUTNHSS to UE, which then computes RES, AUTNUE and KASME using EPS AKA algorithm. UE now compares its own AUTNUE and AUTNHSS received from MME for network authentication. Once authenticated, RES is forwarded to MME, which then compares XRES received from HSS and RES received from UE for user authentication. If UE and network have authenticated each other, they share the same key KASME (KASME is not transferred between UE and MME, though) ❷ NAS Security Once UE and MME have authenticated each other and the same key KASME is shared, NAS security setup 1 MME may request for more than one authentication vectors. 2 In general, UE consists of USIM and ME. USIM handles mutual authentication and ME delivers authentication information between MME and USIM. Once the network is successfully authenticated, USIM calculates CK and IK and delivers them to ME, which then calculates KASME based on them. USIM and ME are collectively referred to as UE herein for the sake of convenience unless it is required to refer to USIM specifically. Attach Request (IMSI, UE Network Capability, KSIASME=7) Authentication Data Request (IMSI, SN ID, Network Type) Authentication Data Response (AVs (1...n)) Authentication Request (RAND, AUTNHSS, KSIASME=1) [not ciphered; not integrity protected] Authentication Response (RES) [not ciphered; not integrity protected] AS Security Mode Complete (MAC-I) [AS integrity protected] AS Security Mode Command (Ciphering Algorithm=EEA1, Integrity Algorithm=EIA1, MAC-I) [AS integrity protected] Attach Accept <Initial Context Setup Request> (UE Network Capability, KeNB) NAS Security Mode Command (KSIASME=1, Replayed UE Network Capability, NAS Ciphering Algorithm=EEA1, NAS Integrity Algorithm=EIA1, NAS-MAC) [NAS integrity protected] NAS Security Mode Complete (NAS-MAC) [NAS ciphered and integrity protected] Network(HSS) Authentication ( AUTNUE = AUTNHSS ) UE Authentication ( RES = XRES ) Authentication NAS Security Setup AS Security Setup Ciphered and Integrity Protected NAS Signaling Compute KeNB Ciphered and Integrity Protected RRC Signaling Ciphered User Plane (Data Plane) KNASenc, KNASint KRRCenc, KRRCint KUPenc KRRCenc, KRRCint KUPenc eNBUE MME HSS 1 2 3 LTE K RAND EPS AKA Algorithm AUTNUE RES KASME SQN SN ID LTE K RAND EPS AKA Algorithm AUTNHSS XRES KASME SQN SN ID Authentication Vector= (RAND, XRES, AUTNHSS, KASME) Select encryption/integrity algorithm KNASenc KASME KDF KNASint Alg-ID, Alg Distinguisher KNASenc, KNASint NAS Uplink Count KeNB KASME KDF Alg-ID, Alg Distinguisher KRRCenc KeNB KDF KRRCint KUPenc Select encryption/integrity algorithm NAS Uplink Count KeNB KASME KDF KNASenc KASME KDF KNASint Alg-ID, Alg Distinguisher Alg-ID, Alg Distinguisher KRRCenc KeNB KDF KRRCint KUPenc UE Security Capability (Supported encryption/integrity algorithm) - EEA0=on, EEA1=on, EEA2=off,… - EIA1=on, EIA2=on, … UE Network Capability (24.301) EPS encryption algorithm (EEA) EEA0 NO encryption 128-EEA1 SNOW 3G 128-EEA2 128-bit AES EEA3~EEA7 NOT Defined EPS integrity algorithm (EIA) 128-EIA1 SNOW 3G 128-EIA2 128-bit AES EEA3~EEA7 NOT Defined Alg-ID EEA0 00 EEA1 01 EEA2 02 EIA1 01 EIA2 02 Alg Distinguisher NAS-enc-alg 01 NAS-int-alg 02 RRC-enc-alg 03 RRC-int-alg 04 UP-enc-alg 05 KASME
  • 8. LTE Security I: LTE Security Concept and LTE Authentication 7 procedure begins. In this procedure, NAS security keys to be used when delivering NAS signaling messages are derived from KASME for secure delivery of these messages. This procedure consists of a round trip of NAS signaling messages (Security Mode Command message and Security Mode Complete message), and begins when MME delivers Security Mode Command message to UE. First, MME selects NAS security algorithms (Alg-ID: Algorithm ID) and uses them to create an integrity key (KNASint ) and a ciphering key (KNASenc) from KASME. Then, it applies KNASint to the Security Mode Command message to generate an NAS message authentication code (NAS-MAC, Message Authentication Code for NAS for Integrity). MME then delivers the Security Mode Command message including the selected NAS security algorithms and the NAS-MAC to UE. As UE does not know the selected encryption algorithm yet, this message is integrity protected only but not ciphered. Upon receiving the Security Mode Command message, UE verifies the integrity thereof by using the NAS integrity algorithm selected by MME and uses NAS integrity/ciphering algorithm to generate NAS security keys (KNASint and KNASenc) from KASME. Then it ciphers the Security Command Complete message with KNASenc and generates a message authentication code, NAS-MAC with KNASint to the ciphered message. Now it forwards the ciphered and integrity protected message to MME with the NAS-MAC included. Once MME successfully verifies the integrity of the received Security Mode Complete message and has them decrypted using the NAS security keys (KNASint and KNASenc), the NAS security setup procedure is completed. Once the NAS security is set up, NAS signaling messages between UE and MME are ciphered and integrity protected by the NAS security keys and then securely delivered over radio links. ❸ AS Security After NAS security setup is finished, AS security setup procedure between UE and eNB begins. In this procedure, AS security keys to be used when delivering RRC signaling messages and IP packets are derived from KeNB for secure delivery of these data. This procedure consists of a round trip of RRC signaling messages (Security Mode Command message and Security Mode Complete message), and begins when eNB delivers Security Mode Command message to UE. First, MME calculates KeNB from KASME and delivers it to eNB, which uses it to perform the AS security setup procedure. eNB selects AS security algorithms (Alg-ID: Algorithm ID) and uses them to create an integrity key (KRRCint) and a ciphering key (KRRCenc), from KeNB. to be used for RRC signaling messages, and a ciphering key (KUPenc) to be used in the user plane. Then, it applies KRRCint to the Security Mode Command message to generate a message authentication code (MAC-I, Message Authentication Code for Integrity). eNB now delivers the Security Mode Command message including the selected AS security algorithms and the MAC-I to UE. Upon receiving the Security Mode Command message from eNB, UE verifies the integrity thereof by using the AS integrity algorithm selected by eNB and uses AS integrity/ciphering algorithm to generate AS security keys (KRRCint, KRRCenc and KUPenc). Then it generates a message authentication code, MAC-I, with the RRC integrity key to the Security Command Complete message, and then forwards the message including the MAC-I to eNB.
  • 9. LTE Security I: LTE Security Concept and LTE Authentication 8 eNB successfully verifies the integrity of the received Security Mode Complete message by using the AS integrity key, the AS security setup procedure is completed. After the AS security is set up, RRC signaling messages between UE and eNB are ciphered and integrity protected by the AS security keys, and user IP packets are encrypted and then securely delivered over radio links. III. LTE Authentication Procedure The LTE authentication procedure briefly described in Chapter II will be further discussed below. Figure 3 shows the EPS AKA-based LTE authentication procedure that is performed when UE attaches to the LTE network. On the USIM and in the HSS/AuC are stored a permanent key, LTE key (K), and IMSI3 . These LTE key (K) and IMSI are stored on the USIM card when UE is being manufacturing, and provisioned in the SS/AuC [Q4] when a user begins subscription to his/her operator’s network. Figure 3. LTE Authentication Procedure 3.1 Authentication Request by UE ❶ [UE  MME] Request by UE for Network Registration When UE attempts to access the network for initial attach, it delivers Attach Request (IMSI, UE Network Capability, KSIASME=7) message to MME. And this triggers EPS AKA procedure. The following information 3 LTE key (K) is stored in AuC (Authentication Center) in operator's network and in USIM in UE. In Figures herein, AuC and HSS are collectively referred to as HSS, and USIM and ME as UE for the sake of convenience. MME HSSAttach Request (IMSI, UE Network Capability, KSIASME=7) SQN Crypto function LTE K RAND XRES AUTN CK IK KDF SQN SN ID KASME IMSI: Provisioned @AuC RAND: HSS generates LTE K: Provisioned @AuC SQN: HSS generates (increase) Select an AV (e.g., AV i) KSIASME AV 1 XRES i, KASME i Authentication Request (RAND i, AUTN i, KSIASME i) SQN Crypto function LTE K RAND i RES AUTNUE CK IK KDF SQN SN ID KASME (KASME i) IMSI: Factory Default RAND: HSS generates LTE K: Factory Default SQN: HSS generates Authentication Response (RES) UE uses KASME (KASME i) to calculates additional keys MME uses KASME (KASME i) to calculates additional keys IMSI USIM LTE K Authentication Vector (AV) AV = (RAND, AUTN, XRES, KASME) Authentication Complete HSS authenticated if AUTN i = AUTNUE UE authenticated if RES = XRES i KSIASME value is not used for authentication itself, but used to generate subsequent key values (for Encryption & Integrity Check) KSIASME AV 1 KASME i 1 2 3 4 5 UE MME HSSAuthentication Information Request (IMSI, SN ID, n, Network Type) Authentication Information Answer (Authentication Vectors) AV 1 = (RAND1, AUTN1, XRES1, KASME1) … AV i = (RANDi, AUTNi, XRESi, KASMEi) … AV n = (RANDn, AUTNn, XRESn, KASMEn)
  • 10. LTE Security I: LTE Security Concept and LTE Authentication 9 elements are included in the Attach Request message:  IMSI: International Mobile Subscriber Identity, a unique identifier associated with the user  UE Network Capability: security algorithms available to UE  KSIASME=7: indicates UE has no authentication key UE network capability informs MME of what kinds of capability UE has related to EPS, and indicates which NAS and AS security algorithms, i.e., EPS Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) are supported by the UE. Each of them has a value of 1 bit that is presented as on (supported) or off (not supported) (e.g. EEA0=on, EEA1=on, EEA2=off, …, EIA1=on, EIA2=on, …). Table 1 lists some of UE network capability information, specifically ciphering and integrity protection algorithms defined in [3]. Table 1. UE Network Capability Information – EEA and EIA [3] EEA EIA EEA0 Null ciphering algorithm EIA0 4 Null integrity protection algorithm 128-EEA1 SNOW 3G 128-EIA1 SNOW 3G 128-EEA2 AES 128-EIA2 AES 128-EEA3 ZUC 128-EIA3 ZUC KSIASME identifies KSIASME for UE and MME. It is 3 bits and has values ranging from 0 ('000') to 7 ('111'), where 7 ('111') indicates UE has no KASME available. 3.2 Authentication Data Exchange between MME and HSS ❷ [MME  HSS] Request by MME for Authentication Data MME recognizing UE has no KASME available initiates LTE authentication procedure to get new authentication data by sending Authentication Information Request (IMSI, SN ID, n, Network Type) message to HSS. Message parameters used for this purpose are as follows:  IMSI: a unique identifier associated with the user  SN ID (Serving Network ID): refers to the network accessed by the user. Consists of PLMN ID (MCC+MNC).  n (number of Authentication Vectors): No. of authentication vectors that MME requests  Network Type: type of the network accessed by UE (E-UTRAN herein) Upon receipt of the Authentication Information Request message from MME, HSS generates RAND and SQN, and creates XRES, AUTN, CK and IK using EPS AKA algorithm with LTE key (K), SQN and RAND. Thereafter, using CK, IK, SQN and SN ID, it derives a top-level key (KASME) of the access network, from Key Derivation Function (KDF), to be delivered to MME. KDF is a one-way has function. Since SN ID is required when deriving KASME, KASME is derived again if the serving network is changed. After KASME is derived, HSS forms authentication vectors AVi=(RANDi, AUTNi, XRESi, KASMEi), i=0..n. 4 EIA0 is allowed in an unauthorized emergency call only.
  • 11. LTE Security I: LTE Security Concept and LTE Authentication 10 ❸ [MME  HSS] Response by HSS to the Authentication Data Request HSS forms as many AVs as requested by MME and then delivers Authentication Information Answer (AVs) message to MME. 3.3 Mutual Authentication by UE and MME MME stores the AVs received from HSS, and selects one of them to use in LTE authentication of UE. In Figure 3, MME selected ith AV (AVi). KASME is a base key of MME and serves as a top-level key in the access network. It stays within EPC only and is not delivered to UE through E-UTRAN, which is not secure. MME allocates KSIASME, an index for KASME, and delivers it instead of KASME to UE so that UE and MME use it as a substitute for KASME (in Fig. 3, KSIASME=1). ❹ [UE  MME] Request by MME for User Authentication MME keeps KASMEi and XRESi in AVi but delivers KSIASMEi, in substitution for KASMEi, RANDi and AUTNi as included in Authentication Request (KSIASMEi, RANDi, AUTNi) message to UE. XRESi is used later in ❺ when authenticating the user. UE, upon receiving Authentication Request message from MME, delivers RANDi and AUTNi to USIM. USIM, using the same EPS AKA algorithm that HSS used, derives RES, AUTNUE, CK and IK with the stored LTE key (K) and RANDi and SQN generated from HSS5 . UE then compares AUTNUE generated using EPS AKA algorithm and AUTN received from MME (AUTNi in Fig. 3) to authenticate the LTE network (the serving network). ❺ [UE  MME] Response by UE to User Authentication Once UE completes the network authentication, it delivers Authentication Response (RES) including RES generated using EPS AKA algorithm to MME. If the network authentication using AUTN fails in ❹, UE sends Authentication Failure (CAUSE) message that contains a CAUSE field stating reasons for such failure. When MME receives Authentication Response message from UE, it compares RES generated by UE and XRESi of the AV received from HSS to authenticate the user. USIM delivers CK and IK to UE after its network authentication is completed. UE derives KASME using Key Derivation Function (KDF) with CK, IK, SQN and SN ID and stores it using KSIASME received from MME as its index. Thereafter, KSIASME is used instead of KASME during the NAS security setup between UE and MME. 5 SQN is concealed in AUTNi.
  • 12. LTE Security I: LTE Security Concept and LTE Authentication About NMC Consulting Group NMC Consulting Group was founded on year 2002 and is advanced, professional network consulting company which is specialized for IP Network area like FTTH, Metro Ethernet and IP/MPLS, Service area like IPTV, IMS and CDN lastly, Wireless network area like Mobile WiMAX, LTE and Wi-Fi. Copyright © 2002-2013 NMC Consulting Group. All rights reserved. 11 IV. Closing We have discussed the LTE authentication, one of the LTE security topics. As seen so far, LTE authentication is mutual authentication performed by and between a user and a network based on EPS AKA procedure. MME in the serving network performs mutual authentication with UE on behalf of HSS, and as a result, KASME is shared by UE and MME. Table 2 summarizes the LTE authentication-related keys covered herein. In Part II, LTE Security II, that follows, NAS and AS security setup procedures based on KASME discussed herein will be further explained. Table 2. LTE Security Keys: Authentication Key Length Location Derived from Description K 128 bits USIM, HSS/AuC - LTE key CK 128 bits USIM, HSS/AuC K Cipher key IK 128 bits USIM, HSS/AuC K Integrity key KASME 256 bits UE, HSS, MME CK, IK MME base key References [1] Netmanias Technical Document, “LTE Security II”, August 2012, http://www.netmanias.com/bbs/view.php?id=techdocs&no=66 [2] 3GPP TS 24.301, “Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS); Stage 3”. [3] 3GPP TS 33.401, “3GPP System Architecture Evolution (SAE); Security Architecture”. [4] NMC Consulting Group Internal Report, “E2E LTE Network Design”, August 2010.