The present document specifies the security architecture, i.e., the security features and the security mechanisms for the Evolved Packet System and the Evolved Packet Core, and the security procedures performed within the evolved Packet System (EPS) including the Evolved Packet Core (EPC) and the Evolved UTRAN (E-UTRAN).
The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
For a specific reference, subsequent revisions do not apply.
For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
TS 25.331: "3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Radio Resource Control (RRC); Protocol Specification ".
TS 44.060: "3rd Generation Partnership Project; Technical Specification Group GSM/EDGE Radio Access Network; General Packet Radio Service (GPRS); Mobile Station (MS) - Base Station System (BSS) interface; Radio Link Control/Medium Access Control (RLC/MAC) protocol.
TS 23.122: "3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) functions related to Mobile Station (MS) in idle mode".
TS 33.320: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security of Home Node B (HNB) / Home evolved Node B (HeNB)".
For the purposes of the present document, the terms and definitions given in TR 21.905, in TS 33.102 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.
Access Security Management Entity:
entity which receives the top-level keys in an access network from the HSS. For E-UTRAN access networks, the role of the ASME is assumed by the MME
Activation of security context:
the process of taking into use a security context.
Authentication data:
Data that is part of a security context or of authentication vectors.
Chaining of KeNB:
derivation of a new KeNB from another KeNB (i.e., at cell handover)
Current EPS security context:
The security context which has been activated most recently. Note that a current EPS security context originating from either a mapped or native EPS security context may exist simultaneously with a native non-current EPS security context.
ECM-CONNECTED state:
This is as defined in TS 23.401. The term ECM-CONNECTED state corresponds to the term EMM-CONNECTED mode used in TS 24.301.
ECM-IDLE state:
As defined in TS 23.401. The term ECM-IDLE state corresponds to the term EMM-IDLE mode used in TS 24.301.
EPS-Authentication Vector:
KASME, RAND, AUTN, XRES
EPS security context:
A state that is established locally at the UE and a serving network domain. At both ends "EPS security context data" is stored, that consists of the EPS NAS security context, and the EPS AS security context.
EPS AS security context:
the cryptographic keys at AS level with their identifiers, the Next Hop parameter NH, the Next Hop Chaining Counter parameter NCC used for next hop access key derivation, the identifiers of the selected AS level cryptographic algorithms, counters used for replay protection and SCG Counter used as freshness input into S-KeNB derivations. Note that the EPS AS security context only exists when cryptographically protected radio bearers are established and is otherwise void.
EPS AS Secondary Cell security context:
This context consists of the cryptographic keys for SeNB (KUPenc), the identifier of the selected AS SC level cryptographic algorithm and counters used for replay protection.
EPS NAS security context:
This context consists of KASME with the associated key set identifier, the UE security capabilities, and the uplink and downlink NAS COUNT values. In particular, separate pairs of NAS COUNT values are used for each EPS NAS security contexts, respectively. The distinction between native and mapped EPS security contexts also applies to EPS NAS security contexts. The EPS NAS security context is called "full" if it additionally contains the keys KNASint and KNASenc and the identifiers of the selected NAS integrity and encryption algorithms.
Full native EPS security context:
A native EPS security context for which the EPS NAS security context is full according to the above definition. A full native EPS security context is either in state "current" or state "non-current".
Forward security:
In the context of KeNB key derivation, forward security refers to the property that, for an eNB with knowledge of a KeNB, shared with a UE, it shall be computationally infeasible to predict any future KeNB, that will be used between the same UE and another eNB. More specifically, n hop forward security refers to the property that an eNB is unable to compute keys that will be used between a UE and another eNB to which the UE is connected after n or more handovers (n=1 or 2).
A security context which has been established according to TS 33.102.
Mapped security context:
Security context created by converting the current security context in the source system to a security context for the target system in inter-system mobility, e.g., UMTS keys created from EPS keys. The EPS NAS security context of a mapped security context is full and current.
Native EPS security context:
An EPS security context whose KASME was created by a run of EPS AKA.
Non-current EPS security context:
A native EPS security context that is not the current one. A non-current EPS security context may be stored along with a current EPS security context in the UE and the MME. A non-current EPS security context does not contain an EPS AS security context. A non-current EPS security context is either of type "full native" or of type "partial native".
Partial native EPS security context:
A partial native EPS security context consists of KASME with the associated key set identifier, the UE security capabilities, and the uplink and downlink NAS COUNT values, which are initially set to zero before the first NAS SMC procedure for this security context. A partial native EPS security context is created by an EPS AKA, for which no corresponding successful NAS SMC has been run. A partial native context is always in state "non-current".
Re-derivation of NAS keys:
derivation of new NAS keys from the same KASME but including different algorithms (and no freshness parameter)
Refresh of KeNB:
derivation of a new KeNB from the same KASME and including a freshness parameter
Re-keying of KeNB:
derivation of a new KeNB from a new KASME in ECM-CONNECTED (i.e., . to activate a partial native EPS security context, or to re-activate a non-current full EPS security context)
Re-keying of NAS keys:
derivation of new NAS keys from a new KASME
UE security capabilities:
The set of identifiers corresponding to the ciphering and integrity algorithms implemented in the UE. This includes capabilities for EPS AS and NAS, and includes capabilities for UTRAN and GERAN if these access types are supported by the UE.
UE EPS security capabilities:
The UE security capabilities for EPS AS and NAS.
User plane:
Within the context of TS 33.401, this means the data path between UE and Serving Gateway that does NOT go via the MME.
(User) Data via MME:
User Data sent to or from the UE that uses an RRC connection established using the Control Plane CIoT EPS optimisation specified in TS 23.401.
IOPS-capable eNB:
an eNB that has the capability of IOPS mode operation, which provides local IP connectivity and Public Safety services to IOPS-enabled UEs via a Local EPC when the eNB has lost backhaul to the Macro EPC or it has no backhaul to the Macro EPC.
IOPS network:
an IOPS network consists of one or more eNBs operating in IOPS mode and connected to a Local EPC.
Local EPC:
a Local EPC is an entity which provides functionality that eNBs in IOPS mode of operation use, instead of the Macro EPC, in order to support Public Safety services.
Macro EPC:
the EPC which serves an eNB when it is not in IOPS mode of operation.
Nomadic EPS:
a deployable system which has the capability to provide radio access (via deployable IOPS-capable eNB(s)), local IP connectivity and Public Safety services to IOPS-enabled UEs in the absence of normal EPS.
IOPS-enabled UE:
is an UE that is configured to use networks operating in IOPS mode.
For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
AES
All data variables in the present document are presented with the most significant substring on the left hand side and the least significant substring on the right hand side. A substring may be a bit, byte or other arbitrary length bitstring. Where a variable is broken down into a number of substrings, the leftmost (most significant) substring is numbered 0, the next most significant is numbered 1, and so on through to the least significant.