The following security features related to user identity confidentiality are provided:
-
user identity confidentiality: the property that the permanent user identity (IMSI) of a user to whom a services is delivered cannot be eavesdropped on the radio access link;
-
user location confidentiality: the property that the presence or the arrival of a user in a certain area cannot be determined by eavesdropping on the radio access link;
-
user untraceability: the property that an intruder cannot deduce whether different services are delivered to the same user by eavesdropping on the radio access link.
To achieve these objectives, the user is normally identified by a temporary identity by which he is known by the visited serving network. To avoid user traceability, which may lead to the compromise of user identity confidentiality, the user should not be identified for a long period by means of the same temporary identity. To achieve these security features, in addition it is required that any signalling or user data that might reveal the user's identity is ciphered on the radio access link.
Clause 6.1 describes a mechanism that allows a user to be identified on the radio path by means of a temporary identity by which he is known in the visited serving network. This mechanism should normally be used to identify a user on the radio path in location update requests, service requests, detach requests, connection re-establishment requests, etc.
The following security features related to entity authentication are provided:
-
user authentication: the property that the serving network corroborates the user identity of the user;
-
network authentication: the property that the user corroborates that he is connected to a serving network that is authorised by the user's HE to provide him services; this includes the guarantee that this authorisation is recent.
To achieve these objectives, it is assumed that entity authentication should occur at each connection set-up between the user and the network. Two mechanisms have been included: an authentication mechanism using an authentication vector delivered by the user's HE to the serving network, and a local authentication mechanism using the integrity key established between the user and serving network during the previous execution of the authentication and key establishment procedure.
Clause 6.3 describes an authentication and key establishment mechanism that achieves the security features listed above and in addition establishes a secret cipher key (see 5.1.3) and integrity key (see 5.1.4) between the user and the serving network. This mechanism should be invoked by the serving network after a first registration of a user in a serving network and after a service request, location update request, attach request, detach request or connection re-establishment request, when the maximum number of local authentications using the derived integrity key have been conducted.
Clause 6.5 describes the local authentication mechanism. The local authentication mechanism achieves the security features user authentication and network authentication and uses an integrity key established between user and serving network during the previous execution of the authentication and key establishment procedure. This mechanism should be invoked by the serving network after a service request, location update request, attach request, detach request or connection re-establishment request, provided that the maximum number of local authentications using the same derived integrity key has not been reached yet.
The following security features are provided with respect to confidentiality of data on the network access link:
-
cipher algorithm agreement: the property that the MS and the SN can securely negotiate the algorithm that they shall use subsequently;
-
cipher key agreement: the property that the MS and the SN agree on a cipher key that they may use sub-sequently;
-
confidentiality of user data: the property that user data cannot be overheard on the radio access interface;
-
confidentiality of signalling data: the property that signalling data cannot be overheard on the radio access interface;
Cipher key agreement is realised in the course of the execution of the mechanism for authentication and key agreement (see
6.3). Cipher algorithm agreement is realised by means of a mechanism for security mode negotiation between the user and the network (see
6.4.5). This mechanism also enables the selected ciphering algorithm and the agreed cipher key to be applied in the way described in
6.6.
The following security features are provided with respect to integrity of data on the network access link:
-
integrity algorithm agreement: the property that the MS and the SN can securely negotiate the integrity algorithm that they shall use subsequently;
-
integrity key agreement: the property that the MS and the SN agree on an integrity key that they may use subsequently;
-
data integrity and origin authentication of signalling data: the property that the receiving entity (MS or SN) is able to verify that signalling data has not been modified in an unauthorised way since it was sent by the sending entity (SN or MS) and that the data origin of the signalling data received is indeed the one claimed;
Integrity key agreement is realised in the course of the execution of the mechanism for authentication and key agreement (see
6.3). Integrity algorithm agreement is realised by means of a mechanism for security mode negotiation between the user and the network (see
6.4.5). This mechanism also enables the selected integrity algorithm and the agreed integrity key to be applied in the way described in
6.5.
The SN may request the MS to send it the IMEI or IMEISV of the terminal. The IMEI should be securely stored in the terminal. However, the presentation of this identity to the network is not a security feature and the transmission of the IMEI or IMEISV may be unprotected. Although it is not a security feature, it should not be deleted from UMTS however, as it is useful for other purposes.