LTE security / Dan Forsberg [and others].
"The book will address the security architecture for SAE/LTE, which is based on elements of the security architectures for GSM and 3G, but needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems. T...
Saved in:
Online Access: |
Full Text (via Skillsoft) |
---|---|
Other Authors: | |
Other title: | Long term evolution security |
Format: | Electronic eBook |
Language: | English |
Published: |
Hoboken, N.J. :
Wiley,
2010.
|
Subjects: |
Table of Contents:
- Cover
- Contents
- Foreword
- Acknowledgements
- 1 Overview of the Book
- 2 Background
- 2.1 Evolution of Cellular Systems
- 2.1.1 Third-generation Network Architecture
- 2.1.2 Important Elements of the 3G Architecture
- 2.1.3 Functions and Protocols in the 3GPP System
- 2.1.4 The EPS System
- 2.2 Basic Security Concepts
- 2.2.1 Information Security
- 2.2.2 Design Principles
- 2.2.3 Communication Security Features
- 2.3 Basic Cryptographic Concepts
- 2.3.1 Cryptographic Functions
- 2.3.2 Securing Systems with Cryptographic Methods
- 2.3.3 Symmetric Encryption Methods
- 2.3.4 Hash Functions
- 2.3.5 Public-key Cryptography and PKI
- 2.3.6 Cryptanalysis
- 2.4 Introduction to LTE Standardization
- 2.4.1 Working Procedures in 3GPP
- 2.5 Notes on Terminology and Specification Language
- 2.5.1 Terminology
- 2.5.2 Specification Language
- 3 GSM Security
- 3.1 Principles of GSM Security
- 3.2 The Role of the SIM
- 3.3 Mechanisms of GSM Security
- 3.3.1 Subscriber Authentication in GSM
- 3.3.2 GSM Encryption
- 3.3.3 GPRS Encryption
- 3.3.4 Subscriber Identity Confidentiality
- 3.4 GSM Cryptographic Algorithms
- 4 Third-generation Security (UMTS)
- 4.1 Principles of Third-generation Security
- 4.1.1 Elements of GSM Security Carried Over to 3G
- 4.1.2 Weaknesses in GSM Security
- 4.1.3 Higher Level Objectives
- 4.2 Third-generation Security Mechanisms
- 4.2.1 Authentication and Key Agreement
- 4.2.2 Ciphering Mechanism
- 4.2.3 Integrity Protection Mechanism
- 4.2.4 Identity Confidentiality Mechanism
- 4.3 Third-generation Cryptographic Algorithms
- 4.3.1 KASUMI
- 4.3.2 UEA1 and UIA1
- 4.3.3 SNOW3G, UEA2 and UIA2
- 4.3.4 MILENAGE
- 4.3.5 Hash Functions
- 4.4 Interworking between GSM and 3G security
- 4.4.1 Interworking Scenarios
- 4.4.2 Cases with SIM
- 4.4.3 Cases with USIM.
- 4.4.4 Handovers between GSM and 3G
- 4.5 Network Domain Security
- 4.5.1 Generic Security Domain Framework
- 4.5.2 Security Mechanisms for NDS
- 4.5.3 Application of NDS
- 5 3G-WLAN Interworking
- 5.1 Principles of 3G-WLAN Interworking
- 5.1.1 The General Idea
- 5.1.2 The EAP Framework
- 5.1.3 Overview of EAP-AKA
- 5.2 Security Mechanisms of 3G-WLAN Interworking
- 5.2.1 Reference Model for 3G-WLAN Interworking
- 5.2.2 Security Mechanisms of WLAN Direct IP Access
- 5.2.3 Security Mechanisms of WLAN 3GPP IP Access
- 5.3 Cryptographic Algorithms for 3G-WLAN Interworking
- 6 EPS Security Architecture
- 6.1 Overview and Relevant Specifications
- 6.1.1 Need for Security Standardization
- 6.1.2 Relevant Non-security Specifications
- 6.1.3 Security Specifications for EPS
- 6.2 Requirements and Features of EPS Security
- 6.2.1 Threats against EPS
- 6.2.2 EPS Security Features
- 6.2.3 How the Features Meet the Requirements
- 6.3 Design Decisions for EPS Security
- 6.4 Platform Security for Base Stations
- 6.4.1 General Security Considerations
- 6.4.2 Specification of Platform Security
- 6.4.3 Exposed Position and Threats
- 6.4.4 Security Requirements
- 7 EPS Authentication and Key Agreement
- 7.1 Identification
- 7.1.1 User Identity Confidentiality
- 7.1.2 Terminal Identity Confidentiality
- 7.2 The EPS Authentication and Key Agreement Procedure
- 7.2.1 Goals and Prerequisites of EPS AKA
- 7.2.2 Distribution of EPS Authentication Vectors from HSS to MME
- 7.2.3 Mutual Authentication and Establishment of a Shared Key Between the Serving Network and the UE
- 7.2.4 Distribution of Authentication Data Inside and Between Serving Networks
- 7.3 Key Hierarchy
- 7.3.1 Key Derivations
- 7.3.2 Purpose of the Keys in the Hierarchy
- 7.3.3 Cryptographic Key Separation
- 7.3.4 Key Renewal
- 7.4 Security Contexts.
- 8 EPS Protection for Signalling and User Data
- 8.1 Security Algorithms Negotiation
- 8.1.1 Mobility Management Entities
- 8.1.2 Base Stations
- 8.2 NAS Signalling Protection
- 8.2.1 NAS Security Mode Command Procedure
- 8.2.2 NAS Signalling Protection
- 8.3 AS Signalling and User Data Protection
- 8.3.1 AS Security Mode Command Procedure
- 8.3.2 RRC Signalling and User Plane Protection
- 8.3.3 RRC Connection Re-establishment
- 8.4 Security on Network Interfaces
- 8.4.1 Application of NDS to EPS
- 8.4.2 Security for Network Interfaces of Base Stations
- 8.5 Certificate Enrolment for Base Stations
- 8.5.1 Enrolment Scenario
- 8.5.2 Enrolment Principles
- 8.5.3 Enrolment Architecture
- 8.5.4 CMPv2 Protocol and Certificate Profiles
- 8.5.5 CMPv2 Transport
- 8.5.6 Example Enrolment Procedure
- 8.6 Emergency Call Handling
- 8.6.1 Emergency Calls with NAS and AS Security Contexts in Place
- 8.6.2 Emergency Calls without NAS and AS Security Contexts
- 8.6.3 Continuation of the Emergency Call when Authentication Fails
- 9 Security in Intra-LTE State Transitions and Mobility
- 9.1 Transitions to and from Registered State
- 9.1.1 Registration
- 9.1.2 Deregistration
- 9.2 Transitions Between Idle and Connected States
- 9.2.1 Connection Initiation
- 9.2.2 Back to Idle State
- 9.3 Idle State Mobility
- 9.4 Handover
- 9.4.1 Handover Key Management Requirements Background
- 9.4.2 Handover Keying Mechanisms Background
- 9.4.3 LTE Key Handling in Handover
- 9.4.4 Multiple Target Cell Preparations
- 9.5 Key Change on the Fly
- 9.5.1 KeNB Rekeying
- 9.5.2 KeNB Refresh
- 9.5.3 NAS Key Rekeying
- 9.6 Periodic Local Authentication Procedure
- 9.7 Concurrent Run of Security Procedures
- 10 EPS Cryptographic Algorithms
- 10.1 Null Algorithms
- 10.2 Ciphering Algorithms
- 10.3 Integrity Algorithms.
- 10.4 Key Derivation Algorithms
- 11 Interworking Security Between EPS and Other Systems
- 11.1 Interworking with GSM and 3G Networks
- 11.1.1 Routing Area Update Procedure in UTRAN
- 11.1.2 Tracking Area Update Procedure in EPS
- 11.1.3 Handover from EPS to 3G or GSM
- 11.1.4 Handover from 3G or GSM to EPS
- 11.2 Interworking with Non-3GPP Networks
- 11.2.1 Principles of Interworking with Non-3GPP Networks
- 11.2.2 Authentication and Key Agreement for Trusted Access
- 11.2.3 Authentication and Key Agreement for Untrusted Access
- 11.2.4 Security for Mobile IP Signalling
- 11.2.5 Mobility between 3GPP and non-3GPP Access Networks
- 12 Security for Voice over LTE
- 12.1 Methods for Providing Voice over LTE
- 12.1.1 IMS over LTE
- 12.1.2 Circuit Switched Fallback (CSFB)
- 12.1.3 Single Radio Voice Call Continuity (SRVCC)
- 12.2 Security Mechanisms for Voice over LTE
- 12.2.1 Security for IMS over LTE
- 12.2.2 Security for Circuit Switched Fallback
- 12.2.3 Security for Single Radio Voice Call Continuity
- 13 Security for Home Base Station Deployment
- 13.1 Security Architecture, Threats and Requirements
- 13.1.1 Scenario
- 13.1.2 Threats and Risks
- 13.1.3 Requirements
- 13.1.4 Security Architecture
- 13.2 Security Features
- 13.2.1 Authentication
- 13.2.2 Local Security
- 13.2.3 Communications Security
- 13.2.4 Location Verification and Time Synchronization
- 13.3 Security Procedures Internal to the Home Base Station
- 13.3.1 Secure Boot and Device Integrity Check
- 13.3.2 Removal of Hosting Party Module
- 13.3.3 Loss of Backhaul Link
- 13.3.4 Secure Time Base
- 13.3.5 Handling of Internal Transient Data
- 13.4 Security Procedures between Home Base Station and Security Gateway
- 13.4.1 Device Integrity Validation
- 13.4.2 Device Authentication
- 13.4.3 IKEv2 and Certificate Profiling.
- 13.4.4 Certificate Processing
- 13.4.5 Combined Device-Hosting Party Authentication
- 13.4.6 Authorization and Access Control
- 13.4.7 IPsec Tunnel Establishment
- 13.4.8 Time Synchronization
- 13.5 Security Aspects of Home Base Station Management
- 13.5.1 Management Architecture
- 13.5.2 Management and Provisioning during Manufacturing
- 13.5.3 Preparation for Operator-specific Deployment
- 13.5.4 Relationships between HeNB Manufacturer and Operator
- 13.5.5 Security Management in Operator Network
- 13.5.6 Protection of Management Traffic
- 13.5.7 Software Download
- 13.5.8 Location Verification
- 13.6 Closed Subscriber Groups and Emergency Call Handling
- 13.6.1 UE Access Control to HeNBs
- 13.6.2 Emergency Calls
- 14 Future Challenges
- 14.1 Near-term Outlook
- 14.2 Far-term Outlook
- Abbreviations
- References
- Index.