Professional Documents
Culture Documents
Authentication
Encryption
*1
Alf Zugenmaier
Hiroshi Aono
1. Introduction
*2
encompasses
communication
handover.
*4
is used
*5
*6
*7
*3
UE.
*3 eNB: A base station for the LTE radio access
system.
*4 Compromised: A security relevant item
(such as a key) is compromised, if it is known
to or can be accessed by an unauthorized party.
27
international standards.
There are four main requirements
for security functions in LTE:
*13
3. Key Hierarchy
*8
(USIM) .
*11
Center (AuC)
on
OR (XOR)
*12
stream
*9
*10
*14
USIM
AuC
Network side
ME
CK, IK
CK, IK
KASME
KASME
KNASenc
KNASenc
KNASint
KNASint
HSS
MME
NAS
KeNB
KeNB
KUPenc
KUPenc
KRRCenc
KRRCenc
KRRCint
KRRCint
eNB
AS
Figure 1 Hierarchical keys and method for key generation between entities in LTE
28
*8 USIM: An application on an IC card to persistently store subscriber information such as configuration and authentication data as well as subscriber defined information such as phone numbers.
*9 3GPP AKA: A 3GPP protocol for mutually
authenticating network and USIM and for sharing temporary keys for encryption and integrity
protection.
*10 NDS: Security between the nodes within a network domain.
through encryption.
3G
dard (AES)
*18
*15
5. Handover Security
of the
Installation of an eNB in an
KASME.
*17
(GUTI)
broken.
4. Separation of AS and
NAS Security Functions
visiting information.
*14 AuC: A logical node in 3GPP for storing user
authentication data and other data related to
security.
*15 MME: A logical node for mobility management and control.
*16
*20
(hereinafter
29
PCI
EARFCN-DL
KASME
KeNB
KeNB
PCI
EARFCN-DL
KeNB
NCC=0
6. Conclusion
KeNB
KeNB
PCI
EARFCN-DL
KeNB
NH
eNB
PCI
EARFCN-DL
KeNB
eNB
eNB
PCI
EARFCN-DL
KeNB
NH
eNB
KeNB
eNB
PCI
EARFCN-DL
eNB
Computation
Output
*21
References
DL as additional parameters.
30
Release 9.