LTE Security Presentation
LTE Security Presentation
LTE Security Presentation
com
telecommunication design systems engineering real-time and embedded systems
LTE Security
Encryption and Integrity Protection in LTE
EventHelix.com
Encryption The sender encrypts the data with a secret key that is only known to the receiver Only the receiver is able to decode the message Guards against hackers listening in on the data
EventHelix.com
EventHelix.com
telecommunication design systems engineering real-time and embedded systems
eNodeB
UE
NAS
KNASint KNASenc
RRC
KRRCint KRRCenc
RRC
KRRCint KRRCenc
This means that the NAS traffic is being protected with NAS as well as RRC level security
4
eNodeB
UE
User Plane
KUPenc
User Plane
KUPenc
EventHelix.com
telecommunication design systems engineering real-time and embedded systems
EventHelix.com
telecommunication design systems engineering real-time and embedded systems
EventHelix.com
telecommunication design systems engineering real-time and embedded systems
CK, IK
KASME KeNB KUPenc
2012 EventHelix.com Inc. 8
EventHelix.com
Integrity Protection
Message Bearer
Key
Key Stream
Length
Key
Key Stream
Direction
EventHelix.com
telecommunication design systems engineering real-time and embedded systems
Lawful Interception
33.106: Lawful interception requirements 33.107: Lawful interception architecture and functions 33.108: Handover interface for Lawful Interception
Backhaul Security
33.310: Network Domain Security (NDS); Authentication Framework (AF)
10
EventHelix.com
Thank You
Links EventStudio System Designer Description
Thank you for visiting EventHelix.com. The following links provide more information about telecom design tools and techniques:
Wireshark based visual protocol analysis and system design reverse engineering tool.
GSM, SIP, H.323, ISUP, LTE and IMS call flows. TCP/IP explained with sequence diagrams. Real-time and embedded systems, call flows and object oriented design articles.
11