LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

Similar documents
LTE X2 Handover Messaging

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

LTE Security How Good Is It?

LTE Attach and Default Bearer Setup Messaging

LTE RRC Connection Setup Messaging

3GPP LTE Packet Data Convergence Protocol (PDCP) Sub Layer

4G Mobile Networks At Risk

3GPP LTE Channels and MAC Layer

LTE and the Evolution to 4G Wireless

Security Analysis of LTE Access Network

Protocol Signaling Procedures in LTE

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Architecture Overview NCHU CSE LTE - 1

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Delivery of Voice and Text Messages over LTE

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Security in the Evolved Packet System

LTE Mobility Enhancements

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

3GPP Long Term Evolution: Architecture, Protocols and Interfaces

Telesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

SS7 & LTE Stack Attack

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

LTE Performance and Analysis using Atoll Simulation

Diameter in the Evolved Packet Core

Security in cellular-radio access networks

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Evolutionary Trends towards Beyond 3G Mobile Networks

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Overview of the Evolved packet core network

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

3GPP Long-Term Evolution / System Architecture Evolution Overview

Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS

2. Archtiecture overview related to support for use of a reverse http proxy

Securing the Interconnect Signaling Network Security

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

Chapter 1 Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework

Nokia Siemens Networks Flexi Network Server

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture

Introduction to Evolved Packet Core

Mobility Management. Sara Modarres Razavi

Study of Long Term Evolution Network, its Architecture along with its Interfaces

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

LTE protocol tests for IO(D)T and R&D using the R&S CMW500

Triton Multi-purpose LTE wireless core networking testing tool

Long Term Evolution - LTE. A short overview

The LTE Network Architecture

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

Chapter 2 Network Architecture and Protocols

LTE Overview October 6, 2011

LTE Control Plane on Intel Architecture

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam

Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols

LTE CDMA Interworking

Upcoming Enhancements to LTE: R9 R10 R11!

TEPZZ 68575_A_T EP A1 (19) (11) EP A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks

Supporting mobility in the RAN cloud

Public Safety Communications Research. LTE Demonstration Network Test Plan. Phase 3 Part 1: Network Interoperability & Drive Test. Version 2.

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *

Design and Implementation of a Distributed Mobility Management Entity (MME) on OpenStack

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.

SAE and Evolved Packet Core

Emerging Standards for Mobility Management in Next-Generation All-IP Networks

Integrating Lawful Intercept into the Next Generation 4G LTE Network

ehrpd Mike Keeley Market Segment Director

UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture Evolution (SAE)

ETSI TR V6.1.0 ( )

End to End Delay Performance Evaluation for VoIP in the LTE Network

Comparison of LTE and WiMAX on the Basis of Qualities

Throughput for TDD and FDD 4 G LTE Systems

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

End-2-End QoS Provisioning in UMTS networks

Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure

GSM and UMTS security

Implementing LTE International Data Roaming

ETSI TS V8.1.0 ( ) Technical Specification

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background

On LTE Security: Closing the Gap Between Standards and Implementation

Long Term Evolution - LTE L10 Training Programs. Catalog of Course Descriptions

Technical white paper. Enabling mobile broadband growth Evolved Packet Core

Performance validation for the mobile core

NSA LTE - Deep-Dive Monitoring of Wireless Uu and Wireline EPC Interfaces

MERA s competence in security design includes but is not limited to the following areas: Engineering and assessments for security solutions (e.g.

IPv6 and 4G. Christian Bonnet Michelle Wetterwald Institut Eurécom

The future of mobile networking. David Kessens

Authentication and Security in IP based Multi Hop Networks

IP Multimedia System: general aspects and migration perspectives

Transcription:

LTE Security Encryption and Integrity Protection in LTE 2012 Inc. 1

LTE Security: ey Concepts Authentication The LTE Network verifies the UE s identity by challenging the UT use the keys and report a result. The network checks the result against the expected result Integrity Signaling message receiver verifies that the received message is exactly the message that the transmitter sent This is done using an integrity checksum Guards against man in the middle attacks where the senders messages and intercepted by a hacker and a modified message is relayed to the receiver Encryption The sender encrypts the data with a secret key that is only known to the receiver Only the receiver is able to decode the message Guards against hackers listening in on the data 2012 Inc. 2

LTE Security ey Hierarchy USIM and AuC UE and HSS UE and MME UE and MME NASint NASenc enb UE and enodeb UPenc RRCint RRCenc 2012 Inc. 3

Encryption and Integrity Protection in the LTE Control Plan MME NAS NASint NASenc enodeb RRC RRCint RRCenc UE NAS NASint NASenc RRC RRCint RRCenc LTE supports two levels on security on the control plane The NAS traffic between the MME and the UE is protected with NAS level keys The RRC connection traffic between the MME and the UE is protected with RRC level keys This means that the NAS traffic is being protected with NAS as well as RRC level security 2012 Inc. 4

Encryption and Integrity Protection in the LTE User enodeb Plane UE User plane data is encrypted with the UPenc key User Plane User Plane UPenc UPenc 2012 Inc. 5

LTE NAS ey Derivation at the MME and UE NASint : Integrity protection key for NAS signaling messages NASenc : Encryption key for NAS signaling messages NASint NASenc 2012 Inc. 6

LTE RRC ey Derivation at the enodeb and UE RRCint : Integrity protection key for RRC signaling messages RRCenc : Encryption key for RRC signaling messages enb enb RRCint RRCenc 2012 Inc. 7

LTE User Plane ey Derivation at the enodeb and UE UPenc : User plane encryption key enb UPenc 2012 Inc. 8

ey Stream Computation Ciphering Integrity Protection Bearer Message Count Direction Count Bearer ey ey Stream Length ey ey Stream Direction 2012 Inc. 9

3GPP Security Specifications LTE Security 33.401: System Architecture Evolution (SAE); Security architecture 33.402: System Architecture Evolution (SAE); Security aspects of non-3gpp Lawful Interception 33.106: Lawful interception requirements 33.107: Lawful interception architecture and functions 33.108: Handover interface for Lawful Interception ey Derivation Function 33.220: GAA: Generic Bootstrapping Architecture (GBA) Backhaul Security 33.310: Network Domain Security (NDS); Authentication Framework (AF) Relay Node Security 33.816: Feasibility study on LTE relay node security (also 33.401) Home (e) Node B Security 33.320: Home (evolved) Node B Security 2012 Inc. 10

Thank You Thank you for visiting. The following links provide more information about telecom design tools and techniques: Links EventStudio System Designer VisualEther Protocol Analyzer Telecom Call Flows TCP/IP Sequence Diagrams Telecom Networking Software Description Sequence diagram based systems engineering tool. Wireshark based visual protocol analysis and system design reverse engineering tool. GSM, SIP, H.323, ISUP, LTE and IMS call flows. TCP/IP explained with sequence diagrams. Real-time and embedded systems, call flows and object oriented design articles. 2012 Inc. 11