Skip to Content
From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband
book

From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband

by Martin Sauter
March 2011
Intermediate to advanced
450 pages
18h 25m
English
Wiley
Content preview from From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband

4.8 LTE Security Architecture

The LTE security architecture is similar to the mechanisms already used in UMTS and discussed in Section 3.9. The architecture is based on a secret key which is stored on the SIM card of the subscriber and in the HSS in the network. The same key is used for GSM, UMTS and LTE. It is therefore possible to efficiently move the security context between network nodes when the user roams between different RATs.

During the initial contact with the LTE network, that is, during the attach procedure described earlier, security procedures are invoked between the UE, the MME and the HSS. During this process, the UE authenticates to the network and the network authenticates to the UE. This prevents man-in-the-middle attacks. The authentication algorithms required for the process are stored and executed in the SIM card and in the HSS. This way, the secret key remains in a protected environment and cannot be read by potential attackers eavesdropping on the message exchange on an interface between the SIM and the mobile device or the HSS and the MME. SIM cards must be capable of performing UMTS authentication. Consequently, old GSM-only SIM cards cannot be used for authentication in LTE and the attach procedure is rejected with such SIM cards.

Once authentication has been performed, a set of session keys are generated as described in more detail in [23]. Afterward, ciphering and integrity protection can be activated for all NAS messages between the UE and the MME. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

Abd-Elhamid M. Taha, Hossam S. Hassanein, Najah Abu Ali
4G: LTE/LTE-Advanced for Mobile Broadband, 2nd Edition

4G: LTE/LTE-Advanced for Mobile Broadband, 2nd Edition

Erik Dahlman, Stefan Parkvall, Johan Skold

Publisher Resources

ISBN: 9780470978221Purchase book