3GPP SAE/LTE Security



Similar documents
Mobile Devices Security: Evolving Threat Profile of Mobile Networks

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

LTE Security How Good Is It?

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

LTE Overview October 6, 2011

3GPP Long Term Evolution: Architecture, Protocols and Interfaces

Diameter in the Evolved Packet Core

LTE and the Evolution to 4G Wireless

Long Term Evolution - LTE. A short overview

Security Analysis of LTE Access Network

Architecture Overview NCHU CSE LTE - 1

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Overview of the Evolved packet core network

Protocol Signaling Procedures in LTE

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Evolution of the 3GPP Network Architecture, (the Evolved Packet Core)

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

Evolutionary Trends towards Beyond 3G Mobile Networks

Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS

Delivery of Voice and Text Messages over LTE

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Security in the Evolved Packet System

IP Multimedia System: general aspects and migration perspectives

3GPP System Architecture Evolution. ATIS LTE Conference January 26, GPP TSG SA Chairman Stephen Hayes

SAE and Evolved Packet Core

Telesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.

4G Mobile Networks At Risk

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

LTE Attach and Default Bearer Setup Messaging

Study of Long Term Evolution Network, its Architecture along with its Interfaces

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

PDF vytvořeno zkušební verzí pdffactory UMTS

Authentication and Security in IP based Multi Hop Networks

LTE X2 Handover Messaging

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

How To Understand The Gsm And Mts Mobile Network Evolution

The LTE Network Architecture

Nokia Siemens Networks Flexi Network Server

Nationwide Interoperability Framework

Introduction to Evolved Packet Core

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols

Mobility Management for All-IP Core Network

LTE Performance and Analysis using Atoll Simulation

UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture Evolution (SAE)

On LTE Security: Closing the Gap Between Standards and Implementation

The future of mobile networking. David Kessens

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

Security and Authentication Concepts

Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester

Technical white paper. Enabling mobile broadband growth Evolved Packet Core

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

ETSI TS V ( )

Performance validation for the mobile core

TEPZZ 68575_A_T EP A1 (19) (11) EP A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

LTE CDMA Interworking

Security Evaluation of CDMA2000

LTE Control Plane on Intel Architecture

3GPP TS V9.0.0 ( )

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra

2G/3G Mobile Communication Systems

Mobility and cellular networks

Security Architecture Standardization and Services in UMTS

ETSI TS V8.0.0 ( ) Technical Specification

GSM v. CDMA: Technical Comparison of M2M Technologies

EE 4105 Communication Engg-II Dr. Mostafa Zaman Chowdhury Slide # 1

EETS 8316 Wireless Networks Fall 2013

3GPP TS V9.0.0 ( )

INTERNATIONAL TELECOMMUNICATION UNION

Chapter 2 Network Architecture and Protocols

Proposal for Candidate Radio Interface Technologies for IMT-Advanced Based on LTE Release 10 and Beyond (LTE-Advanced)

Network Virtualization Mist to MUST

Voice over LTE Telephony on the National Public Safety Broadband Network

3GPP Long-Term Evolution / System Architecture Evolution Overview

Supporting mobility in the RAN cloud

Performance Analysis and Deployment of VoLTE Mechanisms over 3GPP LTE-based Networks

Voice and SMS in LTE White Paper

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

Advanced SIP Series: SIP and 3GPP Operations

Emerging Standards for Mobility Management in Next-Generation All-IP Networks

GSM services over wireless LAN

ETSI TS V6.5.0 ( )

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

ETSI TS V ( )

Wireless Access of GSM

From GSM to LTE-Advanced. An Introduction to Mobile Networks and Mobile Broadband. Revised Second Edition

Kamakshi Sridhar, PhD Distinguished Member of Technical Staff Director Wireless CTO organization

Nokia Siemens Networks Flexi Network Gateway. Brochure

Product Description. HUAWEI E3372s-153 LTE USB Stick (Cat.4) HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Transcription:

3GPP SAE/LTE Security Anand R. Prasad <anand@bq.jp.nec.com> NEC Corporation Disclaimer: This presentation gives views/opinion of the speaker and not necessarily that of NEC Corporation. NIKSUN WWSMC, 26 July, 2011, Princeton, NJ, USA MI 事 企 画 M11-0043

Outline Background on how this thing came into being: Next Generation Mobile Networks (NGMN) and Third Generation Partnership Project (3GPP) Brief overview of Evolved packet system (EPS), i.e., SAE/LTE Security in EPS: Requirements Security per network elements and protocol layers Key hierarchy Authentication and key agreement Mobility Today and Tomorrow including current security activities in Global ICT Standardisation Forum for India (GISFI) For abbreviations check Slide 34 Page 2

Next Generation Mobile Networks (NGMN) and 3GPP

Towards NGMN Next Generation Mobile Network (NGMN): A project by mobile operators with the objective to establish recommendations, requirements and scenario for future mobile broadband networks 21 Mbps 12 Mbps 42 Mbps 1 Gbps 100 Mbps 1.3 Mbps 2 Mbps 50 Mbps 100 Mbps 14.4 kbps 57.6 kbps 171 kbps 1 Mbps 1 Mbps 11 Mbps NGMN 9.6 kbps 14.4 kbps 14 kbps 384 kbps 144 kbps Broadband IP based Cellular network 1993 Phase 1 1997 Rel. 97 2000 Rel.3 2004 Rel. 6 2009 Rel.8 Future 1996 Rel. 96 1998 Rel. 98 2002 Rel. 5 2007 Rel. 7 and WiMAX Time-line of standard development towards NGMN Page 4

NGMN Architecture 3GPP Basic Architecture Service Layer Service Control e.g. IMS Other External Networks e.g. PSTN, PLMN, Internet Enablers PS core of NGMN SAE (or EPC) CS core network Internet Other networks like WiFi NGMN Access Network Subscriber Identity Module (SIM) UTRAN GERAN LTE (or E-UTRAN) Mobile Equipment (ME) Page 5 User Equipment (UE)

3GPP Overview PCG PCG (Project Coordination Group) RAN Plenary (Radio Access Network) SA Plenary (Service ( & Systems Aspect) CT Plenary (Core Network & Terminal) RAN WG1 (Layer 1) SA WG1 (Requirement) CT WG1 (UE/Core NW Layer 3) RAN WG2 (Layer 2/3 /3) SA WG2 (Architecture) CT WG3 (Interworking external) RAN WG3 (RAN to wired) SA WG3 (Security) CT WG4 (Core NW protocol) RAN WG4 (Performance) SA WG4 (Codec) CT WG5 (Open Service Access) RAN WG5 (UE conformance test) SA WG5 (Management) CT WG6 (SIM) Page 6

This is how it works Third Generation Partnership Project (3GPP) develops specification standardized by organizational partners (OPs) OPs follow their government / regulatory mandate OPs participate in the project coordination group (PCG) Individual members are member of at least one of the OPs and provide input to the technical specification group (TSG) Result of TSG is a TR or TS that forms standars by OPs 3GPP also takes input from ITU and uses its guideline Resulting specification from 3GPP TSG is taken to ITU by individual members as specification ATIS USA CCSA China ARIB Japan 3GPP PCG TSG ETSI Europe TTA Korea TTC Japan ITU Organizational Partners Page 7

Evolved Packet System (EPS) Overview and Security EPS is also know as System Architecture Evolution (SAE) / Long Term Evolution (LTE) SAE is also known as Evolved Packet Core (EPC) LTE is also known as Evolved UTRAN

Network Overview evolved NodeB (enodeb) takes over RNC and NodeB function of UMTS End-point for Access Stratum (Radio resource control and User Plane) HSS (AuC,HLR, EIR,DNS) S6a S6d/Gr S3 Mobility Management Entity (MME) takes care of mobility within EPS and inter-rat Performs authentication End-point for Non-Access Stratum (NAS) Selects gateways Gb for UE S4 SGSN S12 Iu PCRF GERAN UTRAN USIM UE ME Uu AS (RRC & UP) S1-MME enodeb MME S10 S11 SGW S5 S8 for Inter- PLMN GXc Gx Rx S2b SGi PDNGW or PGW S2a PDN - Operator IP services (IMS etc.) X2 NAS MME S1-U epdg Trusted 3GPP access, e.g. cdma2000 enodeb E-UTRAN EPC SWp Un-trusted 3GPP access, e.g. WiFi X2, S1-U, S2a, Rx etc. are reference points between network elements. Protocols are defined for each reference point. Solid lines between network elements are mainly for user plane traffic as defined by 3GPP while dashed lines are mainly for control plane. Highlighted network elements are newly introduced network elements in SAE/LTE (EPS). Explanation of network elements related to security are given here. Page 9

Basic Requirements Continued usage of current USIM, i.e., there should not be any change in USIM for accessing EPS network. The USIM that is used in UMTS networks should be thus reusable. Security should be at least of the same level or better than that compared to UMTS. Page 10

Security Requirements Mutual authentication between UE and network Optional confidentiality Mandatory integrity protection for RRC and NAS and optional for UP (algorithms are SNOW 3G and AES) MSIN& IMEI(SV) should be confidentiality protected IMEI(SV) should be sent only after NAS security is activated Uu enodeb X2 Integrity, confidentiality and replay-protection based on operator decision Mutual authentication between network elements Sensitive part of boot-up in secure environment Uses authorized data/software Ensure data/software change attempts are authorized Ciphering /deciphering of control and user plane done in secure environment Keys stored in secure environment Secure environment integrity ensured Sensitive data of secure environment not exposed UE S1-MME enodeb MME S1-U S11 SGW O&M Confidentiality and integrity protection of software transfer Mutual authentication between enb and O&M Page 11

Network Elements and Security Functions End-point (UE is other end-point) for integrity and confidentiality protection of RRC and confidentiality protection of UP Manages AS keys Initiates UE AS security Performs UE authentication Generates AVs HSS (AuC,HLR, EIR,DNS) S6a End-point (UE is other end-point) for integrity protection and confidentiality protection of NAS Manages NAS keys and participates in AS key handling Verifies UE authorization to access service and network Gets AVsfrom HSS Initiates UE NAS security Uu UE enodeb S1-MME MME S11 SGW S1-U E-UTRAN EPC Confidentiality is optional and integrity protection is mandatory and uses SNOW 3G or AES (ZUC was added recently) Page 12

Protocol Layers and Security Functions Has the role of AS (RRC and UP) key handling and security activation in PDCP Performs integrity protection of RRC and confidentiality of RRC and UP Performs NAS key handling and integrity and confidentiality protection of NAS Application / IP RRC PDCP NAS RLC/MAC/L1 Page 13

Key Hierarchy Location of the keys AuC& USIM HSS & ME K CK, IK Kasme Pre-shared secret between the AuC and the USIM Used for Authentication and Key Agreement (AKA) Confidentiality and integrity keys resulting from AKA Passed to HSS from AuCand ME from USIM Generated by HSS and passed to MME Concatenation of CK and IK MME & ME KNASenc KNASint KeNB NAS keys: stays in MME for NAS confidentiality (encryption) and integrity protection enb & ME KUenc KRRCenc KRRCSint KeNBis passed to enb from MME AS keys: Derived from kenbfor RRC confidentiality (encryption), RRC integrity protection and U-plane confidentiality Key separation depending on purpose Page 14

EPS Terminal Start-up and Security S1-U UE Uu enb S1 1 MME HSS SGW PGW UE needs registration to the network All UE and radio details are sent ME identity can be checked by the network Can be security protected Mutual authentication Set up keys Activate security Create path to PDNGW PDNGW assigns the IP address (1) (2) Attach request (3) AKA and start integrity and ciphering by security mode command (SMC) (4) (5) Radio level access and control channel are setup With random access the UE gets radio access to enb RRC messages are not security protected NAS message from UE piggy backed in RRC message NAS message may or may not be security protected HSS is informed at which MME the UE is located IP address allocation (6) Leads to completion of attach and setting of session RRC message maybe sent without protection Page 15

Authentication and Key Agreement (AKA) USIM MME HSS (with AuC) 1. USIM identification 2. Authentication data request 3. Authentication data response with authentication vector (AV) 4. Authentication request 5. Check whether AUTN part of AV sent to UE is acceptable (Authenticate network). Generate keys and RES. 6. Authentication response {RES} 7. RES = XRES? (Authenticate UE) Network and UE are authenticated to each other. The top-level-key (Kasme) is created Page 16

SMC: NAS Algorithm Selection Configured with list of NAS confidentiality and integrity algorithms that can be used and with priority UE enb MME Choose highest priority algorithms NAS integrity protection start NAS Security Mode Command (eksi, UE sec capabilities, ENEA, ENIA, [IMEI request,] [NONCEue, NONCEmme,]NAS-MAC) Verify NAS SMC integrity. If succesful, start ciphering/ deciphering and integrity protection and send NAS Security Mode Complete. NAS de-ciphering /ciphering start NAS Security Mode Complete ([IMEI,] NAS-MAC) Algorithm is chosen for NAS and NAS keys are generated. NAS security starts. Integrity protected with the new algorithm if there was change in algorithm Page 17

SMC: AS Algorithm Selection Configured with list of AS confidentiality and integrity algorithms that can be used and with priority UE enb UE AS security context setup MME UE security capabilities is sent to MME during connection establishment together with START value. This is informed back to UE integrity protected. UE responds back with the same thing again integrity protected. All in NAS. Choose highest priority algorithms UE capabilities., eksi RRC/UP integrity protection start AS Security Mode Command RRC-Integrity protected (Integrity algo, ciphering algo, MAC-I) Verify AS SMC integrity. If succesful, start RRC/UP integrity protection, downlink deciphering, and send AS Security Mode Complete. RRC/UP ciphering start AS Security Mode Complete (MAC-I) RRC/UP ciphering start RRC/UP deciphering start Algorithm is chosen for AS & AS keys are generated. AS security starts. Page 18

Mobility in EPS EPS UMTS MME S10 MME S3 SGSN S1-MME S1-MME S1-MME S1-MME enodeb RNC X2 enodeb enodeb Cell 1 Cell 2 enodeb NodeB NodeB Inter-eNodeB / X2 Inter-MME Inter-eNodeB/S1 Inter-RAT Intra-eNodeB Page 19

Secure Handover in Evolved Packet System (EPS) Provide security material before handover Not good Provide security material during handover Not good Provide security material after handover Good EPS Core Network (CN) CN device CN device BS Serving bad guy Security material given by BS Not good BS Serving Target bad guy TargetBS Serving bad guy Security material given by core network Good BS Target Provides forward and backward security Key changed at each handover Algorithm can be changed at each handover Page 20

Handover and Key Handling Horizontal key derivation NAS uplink COUNT PCI, EARFCN-DL PCI, EARFCN-DL KASME KDF Initial KeNB KeNB KDF KeNB*= KeNB KDF KeNB*= KeNB NCC=0 Vertical key derivation KASME KASME KDF NH KDF PCI, EARFCN-DL PCI, EARFCN-DL PCI, EARFCN-DL NCC=1 NH KDF KeNB*= KeNB KDF KeNB*= KeNB KDF KeNB*= KeNB NCC=2 KASME KDF PCI, EARFCN-DL PCI, EARFCN-DL PCI, EARFCN-DL NH KDF KeNB*= KeNB KDF KeNB*= KeNB KDF KeNB*= KeNB NCC=3 KDF: Key Derivation Function NH: Next Hop NCC: Next hop Chaining Counter PCI: Physical Cell Identity Detail of key derivation and handling on handover Page 21

Inter-Technology Handover for EPS The idea here is to derive keys both ways from the existing context and do AKA at the earliest possible especially in E-UTRAN The keys are named as follows: Mapped context is the one derived from other RAT keys Current context is the context being used Native context is the context of E- UTRAN On handover to E-UTRAN mapped context is used although it is recommended that native context should be used as it is considered stronger EPS enodeb Derive keys in serving network for the target network and in UE based on current keys before handover UMTS NodeB Page 22

Today to Tomorrow

Protection against Unsolicited Communication in IMS (PUCI) - Accounting & Charging server - IMS application Server Threats Data confidentiality Fraud Activities Phishing Denial of Service Bandwidth Availability Productivity Loss Call Quality Degradation Unauthorized Access Can lead to SPIT Eavesdropping SPIT Customer Satisfaction Authentication Re-Routing Bots, virus etc. Caller ID Spoofing There are several VoIP threats that can lead to SPIT Page 24

Protection against Unsolicited Communication in IMS (PUCI) Solve it with Identify, Mark and React Source device Identification (check with automatic means and static operator/user settings) Challenge Further test Result Marking (indicate the likelihood of UC through marking) Marking level Reacting (check threshold level and take action, e.g. re-route, voice mailbox, further test etc.) Marking or no marking Other (based on user or operator policy communication is sent to a given network element for action.) Destination UE (user takes action based on marking and sender ID if available) 3GPP TR 33.937 available. Further work on-going under SPUCI work-item. Page 25

Machine to Machine Communication Known as Machine Type Communication (MTC) Scenarios are, for example, smart metering or healthcare Issues can be from the point of access control to attack on the device itself The biggest problem will be the huge number of devices trying to connect to the mobile network and thus overwhelming the network due to high traffic volume Page 26

GISFI Security Activities The security activity in Global ICT Standardisation Forum for India (GISFI) provides solution for all the activities being carried out by the standardization forum Security SIG also provides input to Indian government The activity is still at its early stage, some of the topics covered are: Cyber security and children Cloud security Inter-of-Things (starting from machine-to-machine, M2M, communication) Page 27

What is happening today and where will it lead to? Some observations of today: Average age of knowledge generation is decreasing with time data and information in readily available World is slowly but steadily moving towards similar level of life globally impact on age of population and education level Reachability is at 24 / 7 Need for convenience is increasing Computing, telecommunications and networking has converged, if not, the trend has only become faster Openness, free and shared are key words Technology enhancement is moving at a faster pace: Wireless data-rate is catching up with wired Computing power is high and increasing while becoming available to all Human society is maturing Business models are changing very fast: 10 to 2 years to 6 months and now 3 months Operators business: conventional, data only, take a ride Page 28

Thoughts: Security? Potentially faster cycle for algorithm development Need of increased awareness and concern of privacy and security Necessity of ever more system security consideration Top-to-bottom End-to-end Better privacy control mechanisms Choice of level of security Fast threat analysis together with proper understanding of risk and input to security solution. Page 29

Conclusions

Conclusions Today we took a look at Evolved Packet System (EPS) security the next generation of mobile communications For more: write to me, check my book or check the 3GPP technical specification TS 33.401 <http://www.3gpp.org/ftp/specs/html-info/33401.htm> Some of the topics currently 3GPP is working on: Taking care of unsolicited communication (I am the rapporteur in 3GPP) Relay node security IMT-advanced etc. Global ICT Standardisation Forum for India (GISFI) is working on several security topics starting from Indian requirements Penetration of security understanding should increase which will bring with it more demand on security itself Complete system consideration of security from the beginning will become even more necessary Bringing potential changes in business arena providers of service at different layers working together? Page 31

.the book Security in Next Generation Mobile Networks: SAE/LTE and WiMAX Authors: Anand R. Prasad <http://www.prasad.bz/> and Seung-Woo Seo Publisher: River Publishers <http://riverpublishers.com/river_publisher/> Available: August 2011 ISBN: 978-87-92329-63-9 Table of Contents: 1. Introduction to NGMN 2. Security Overview 3. Standardization: 3GPP, IEEE 802.16 and WiMAX 4. SAE/LTE Security 5. Security in IEEE 802.16e / WiMAX 6. Security for Other Systems: MBMS, M2M, Femto Contact: <anand@bq.jp.nec.com> Page 32

Abbreviations 3GPP Third Generation Partnership Project NAS Non Access Stratum AS Access Stratum (RRC and UP) NGMN Next Generation Mobile Network AuC Authentication Center PCRF Policy and Charging Rules Function AV Autentication Vector PDCP Packet Data Control Protocol DNS Domain Name System PDN Packet Data network EIR Equipment Identity Register PDNGW Packet Data Network Gateway or PGW EPC Evolved Packet Core PLMN Public Land-Mobile Network epdg evolved Packet Data Gateway PUCI Protection against Unsolicited Communication in IMS E-UTRAN Evolved-UTRAN RAN Radio Access Network GERAN GSM EDGE Radio Access Network RLC Radio Link Control GISFI Global ICT Standardisation Forum for India RRC Radio Resource Control HLR Home Location Register SAE System Architecture Evolution (or EPC for core network) HSS Home Subscriber Subsystem SPIT Spam over Internet Telephony IMS IP Multemedia Subsystem SGSN Serving GPRS Support Node IP Internet Protocol SGW Serving Gateway LTE Long-Term Evolution (or E-UTRAN for UE User Equipment MAC Medium Access Control UP User Plane ME Mobile Equipment USIM Universal Subscriber Identity Module MME Mobility Management Entity UTRAN UMTS Terrestrial Radio Access Network Page 34

Security Overview User Application (IV) Provider Application Application stratum (III) ME USIM (I) (I) (I) (I) AN (II) SN (I) (II) Transport stratum HE Home stratum/ Serving Stratum (I) Network access security (I) Network domain security (II) User domain security (III) Application domain security (IV) Visibility and configurability of security (V) Page 35

EPS AKA Allocated by MME after NAS ciphering S-TMSI (short GUTI) used for efficient radio resource usage e.g. service req., paging (GUTI allocation in 23.401) USIM enb MME HSS RRC connection setup Start of NAS communication GUTI or IMSI Pre-computed or computed on demand Recommended to fetch only 1 AV Authentication data request [IMSI, SNID (MCC+MNC), Network Type] K RES USIM,CK, IK, AUTN AKA RAND 3 bits for 7 values. 111 from network to UE reserved other way it signals deletion CK IK K_ASME KDF SNID RAND, AUTN, eksi Authentication data response AVs(1.n) [RAND, XRES HSS,K ASME, AUTN] K RAND AKA RES USIM,CK, IK, AUTN AUTN acceptable? RES USIM XRES HSS? = RES USIM HSS delete all AVs CK,IK never leave HSS Page 36

Other Security Aspects Network domain control plane protection Protection of IP based control plane will be done using 33.210. If the interfaces are trusted then such protection is not required. Thus for S1-MME and X2-C Implement IPsec ESP [RFC 4303 and TS 33.210] IKEv2 certificate based authentication [TS 33.310] Tunnel mode IPsec mandatory on enb while SEG can be used in core Transport mode is optional Backhaul link user plane protection Protection of user plane will be done using 33.210. If the interfaces are trusted then such protection is not required. S1-U and X2-U IPsec ESP as in RFC 4303 and TS 33.210 with confidentiality, integrity and replay protection IKEv2 certificate based authentication [TS 33.310] Tunnel mode IPsec mandatory on enb while SEG can be used in core Transport mode is optional Management plane protection Same as S1-U and X2-U There is no management traffic over X2 Page 37