Whilst the industry standards inform how to implement systems, they do not provide readers with the underlying principles behind security specifications. LTE Security fills this gap by providing first hand information from 3GPP insiders who explain the rationale for design decisions.
- Provides a concise guide to the 3GPP/LTE Security Standardization specifications
- Authors are leading experts who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPP
- Shows how GSM and 3G security was enhanced and extended to meet the requirements of fourth generation systems
- Gives the rationale behind the standards specifications enabling readers to have a broader understanding of the context of these specifications
- Explains why LTE security solutions are designed as they are and how theoretical security mechanisms can be put to practical use
1 Overview of the Book.
2.1 Evolution of Cellular Systems.
2.2 Basic Security Concepts.
2.3 Basic Cryptographic Concepts.
2.4 Introduction to LTE Standardization.
2.5 Notes on Terminology and Specification Language.
3 GSM Security.
3.1 Principles of GSM Security.
3.2 The Role of the SIM.
3.4 GSM Cryptographic Algorithms.
4 Third-generation Security (UMTS).
4.1 Principles of Third-generation Security.
4.2 Third-generation Security Mechanisms.
4.3 Third-generation Cryptographic Algorithms.
4.4 Interworking between GSM and 3G security.
4.5 Network Domain Security.
5 3G–WLAN Interworking.
5.1 Principles of 3G–WLAN Interworking.
5.2 Security Mechanisms of 3G–WLAN Interworking.
5.3 Cryptographic Algorithms for 3G–WLAN Interworking.
6 EPS Security Architecture.
6.1 Overview and Relevant Specifications.
6.2 Requirements and Features of EPS Security.
6.3 Design Decisions for EPS Security.
6.4 Platform Security for Base Stations.
7 EPS Authentication and Key Agreement.
7.2 The EPS Authentication and Key Agreement Procedure.
7.3 Key Hierarchy.
7.4 Security Contexts.
8 EPS Protection for Signalling and User Data.
8.1 Security Algorithms Negotiation.
8.2 NAS Signalling Protection.
8.3 AS Signalling and User Data Protection.
8.4 Security on Network Interfaces.
8.5 Certificate Enrolment for Base Stations.
8.6 Emergency Call Handling.
9 Security in Intra-LTE State Transitions and Mobility.
9.1 Transitions to and from Registered State.
9.2 Transitions Between Idle and Connected States 149
9.3 Idle State Mobility.
9.5 Key Change on the Fly.
9.6 Periodic Local Authentication Procedure.
9.7 Concurrent Run of Security Procedures.
10 EPS Cryptographic Algorithms.
10.1 Null Algorithms.
10.2 Ciphering Algorithms.
10.3 Integrity Algorithms.
10.4 Key Derivation Algorithms.
11 Interworking Security Between EPS and Other Systems.
11.1 Interworking with GSM and 3G Networks.
11.2 Interworking with Non-3GPP Networks.
12 Security for Voice over LTE.
12.1 Methods for Providing Voice over LTE.
12.2 Security Mechanisms for Voice over LTE.
13 Security for Home Base Station Deployment.
13.1 Security Architecture, Threats and Requirements.
13.2 Security Features.
13.3 Security Procedures Internal to the Home Base Station.
13.4 Security Procedures between Home Base Station and Security Gateway.
13.5 Security Aspects of Home Base Station Management.
13.6 Closed Subscriber Groups and Emergency Call Handling.
14 Future Challenges.
14.1 Near-term Outlook.
14.2 Far-term Outlook.
Günther Horn received a PhD (Dr.rer.nat.) degree in Mathematics from the University of Tübingen, Germany, in 1985. He served as an Assistant Professor of Mathematics at the University of California at Irvine in 1985. He joined the Corporate Technology Labs of Siemens AG in Munich in 1986. In 2007, he joined Nokia Siemens Networks. He has been engaged in research on and standardization of new telecommunications systems, including security in mobile networks, fraud control, and mobile applications security. He has been active in many collaborative research projects sponsored by the European Union. In recent years, the focus of his work has been on the standardization of 3G security and SAE/LTE security in the 3GPP security group (SA3), of which he has been a member since it started in 1999. Before this, he contributed to ETSI SMG. He has published on communications security in conference proceedings, journals, and books.
Wolf-Dietrich Moeller studied Physics and Electrical Engineering in Berlin, Glasgow and Munich. With his research work on semiconductor device technology at Technische Universität München (TUM) he received his Dr.-Ing. degree in 1977. In the same year he joined the Corporate Technology Labs of Siemens AG in Munich. After leading a research group on microprocessor architectures and VLSI chip design from 1983 until 1993, in recent years his main subject has been research in security for mobile communications, device integrity and security hardware. He has been active in European and German collaborative research projects, and contributes to the standardisation of mobile security in 3GPP. Since 2007 he has worked at Nokia Siemens Networks Research and Technology Labs in research, standardisation and systems engineering for fixed and mobile networks. Recently he contributed to the book Selected Topics in Communication Networks and Distributed Systems (forthcoming).
Valtteri Niemi received a PhD degree in Mathematics from the University of Turku, Finland in 1989. After serving in various positions at University of Turku, he became an Associate Professor in Mathematics at the University of Vaasa, Finland, during 1993-97. He joined Nokia Research Center (NRC), Helsinki in 1997 where he has contributed in several roles for Nokia research in the wireless security area, including cryptological aspects. In 2008, he moved to the new NRC laboratory in Lausanne, Switzerland, where his main focus is on privacy-enhancing technologies. He was nominated as a Nokia Fellow in January 2009. He has participated to the 3GPP SA3 (security) standardization group from the beginning. During 2003-2009 he was the chairman of the group.
Before 3GPP, Niemi took part in ETSI SMG 10 for GSM security work. He has published more than 40 scientific articles and he is a co-author of three books.