Table of Contents
Wireless communication, in its nature, is always at a risk of eavesdropping or manipulation because data originally sent from/to a user may be received and unlawfully used by an unintended user. Locations or traveling routes of a user can also be easily tracked by tracing to which cells the user is connected or through which cells the user is travelling. And this can result in privacy infringement. Mobile communication networks provide security features to ensure data transferred across radio links is not manipulated, prevent unauthorized access by an unintended user to the data received, and protect the privacy of users.
The LTE Security document describes basic security features offered by LTE networks, including LTE authentication, NAS (Non Access Stratum) security and AS (Access Stratum) security. LTE authentication is the process of determining whether a user is an authorized subscriber to the network that he/she is trying to access, while NAS security and AS security are features required to securely deliver user data that travels through LTE radio links at NAS and AS levels.
The LTE Security document consists of the following two companion documents: Part I, LTE Security I, and Part II, LTE Security II. Part I will explain the concept of LTE security and the detailed procedure of LTE authentication, and Part II will discusses NAS and AS security setup.
Part I is organized as follows:
In Chapter 2, the scope of these two companion documents will be defined and a conceptual overview will be given.
Chapter 3 will focus on the detailed procedure of LTE authentication and
Chapter 4 will summarize the LTE authentication and the LTE authentication-related keys.
Why in the picture 2 NW sent ATTACH ACCEPT before AS Security Mode Command, from our log i saw opposite result.
00:01:07.735 LTE RRC OTA Packet -- DL_DCCH / SecurityModeCommand /*AS SecurityModeCommand form NW */
00:01:08.241 LTE NAS EMM Plain OTA Incoming Message -- Attach accept Msg/*Attach accept form NW */
anybody can tell me whaich simulator i should use for security setup in LTE..............
Hi Would you know what happens in the case of IWF as in 3G Serving Network is not used thus how is KASAME going to be derived if there is no SN-ID ??
Thanks in advance
Very accessably written, focusing on the important matters, and beautifully depicted by sequence diagrams combined with algorithm box diagrams, together showing exactly the creation and flow of information.
By far the best description I have found - I am blown over backwards - just the information I needed - thank you.