7696081213

7696081213



1.    Visited network’s VLR/SGSN reąuests a set of AVs frora the HLR/AuC in the user’s home network.

2.    HLR/AuC computes an array of AVs. This is done by means of the authentication algorithms and the user’s private secret key K, which is stored only in the home network’s HLR/AuC and the USIM in the user’s mobile station.

3.    Home network’s HLR/AuC responds by sending n authentication vectors AV1 ? AVn back to the visited network’s VLR/SGSN.

Stage 2:

1.    Visited network’s VLR/SGSN chooses one AV and challenges mobile station’s USIM by sending the RAND and AUTN fields in the vector to it.

2.    The mobile station’s USIM processes the AUTN. With the aid of the private secret key K, the user is able to verify that the received challenge data could only have been constructed by someone who had access to the same secret key K. The USIM will also verify that the AV has not expired by checking its seąuence number (SEQ) field. Provided that the network can be authenticated and that the AV is still valid, the USIM proceeds to generate a confidentiality key (CK), an integrity key (IK) and a response for the network (RES).

3.    The user responds with RES to the visited network.

4.    Visited network’s VLR/SGSN verifies that response is correct by comparing the expected response (XRES) from the current AV with the response (RES) received from the mobile station’s USIM.

Mutual authentication is performed in step 5 of the former algorithm. Both the USIM and the VLR/SGSN have authenticated each other after two conditions have met: First, that the USIM has verified that the MAC field in AUTN eąuals a value computed internally using the key K and the fields SQN, RAND and AMF. Second, that the VLR/SGSN has verified that the RES value transmitted by user’s mobile station eąuals the internal XRES value.

3.3 Integrity and confidentiality algorithms

Since the control signaling information transmitted between the mobile station and the network is so important and sensitive, its integrity must be protected. The mechanism that carries out this security feature is based on an UMTS Integrity Algorithm (UIA) implemented both in the mobile station and in the module of the UTRAN closer to the core network, i.e. the RNC. See figurę 4.

The UIA explained in this subsection is the f9 algorithm, depicted in figurę 8. The procedurę of data integrity verification is as follows: First, the f9 algorithm in the user eąuipment computes a 32-bit message authentication codę (MAC-I) for data integrity based on its input parameters, which include the signaling data (MESSAGE). Second, the MAC-I computed is attached to the signaling information and sent over the radio interface from the user eąuipment to the RNC. Third, once the RNC has received the information and the attached MAC-I, it computes XMAC-I on the signaling data received in the same way as the mobile station computed MAC-I. Fourth, the integrity of the signaling information is determined by comparing the MAC-I and the XMAC-I.

A detailed description of each of the input parameters is out of the scope of this document, further details concerning their meaning can be found in [4] and [5]. Figurę 9 shows that the internal structure of the f9 algorithm uses the shared integrity key IK and is based on a chain of

14



Wyszukiwarka

Podobne podstrony:
00085 ?5c54cc53a0b9e32369adfc9c63114c 84Hurwitz & Mathur factors of complexity. On the other ha
chain12 Queen s Chain Add another set of rings through the two rings added in the prior step. Notę:
CCF20110521002 łt I Genetics In each set of three sentences, the same word is missing. Supply the w
skanuj0176 „A coherent set of actions aimed at gaining a sustainable advantage over competition im
00056 na606836bd6c2f599916ab238e8c554 55 Adaptive Hierarchical Bayesian Kalman Filtering where Yt.i
00084 8a84776b80a82af6fe353d1bf09489 5A Very Simple Set of Process Control Rules*Arnon M. HurwitzS
00086 s4929f2605de3c43391d910b6633f9d 85 A Very Simple Set of Process Control Rules Cl = (T(l,l,-0O
00088 e23747bf2be5db3f0ee3295fd07ac7 87A Very Simple Set of Process Control Rules Table 3. New &
00090 ?d1d351fe584f51c4e23c939fd54473 89 A Very Simple Set of Process Control Rules ZONĘ SCORE b
00092 ?546ec4ad45fd72a0b658e111513581 91 A Very Simple Set of Process Control Rules Figurę 2 shows
00094 ?b88a889f5ea0de435f5ce77d7deced A Very Simple Set of Process Control Rules 93 +1.5 to 3.0
FLASHING NEON CHRISTMAS LIGHTS FLASHING NEON CHRISTMAS LIGHTS This flashing set of neon Christmas li
18 1024x768 ftinctional programming. combined vith a rich set of high-levcl tools for building synj.
99 Polish Phoneme Statistics Obtained on Large Set of Written Texts Table 1 Phonemes in Polish (SAMP
101 Polish Phoneme Statistics Obtained on Large Set of Written Texts proceeding t j. This basie sch
103 Polish Phoneme Statistics Obtained on Large Set of Written Texts Table 2 Most common Polish
105 Polish Phoneme Statistics Obtained on Large Set of Written Texts Triphones    x F
m POLITECHNIKA GDAŃSKAIntroduction Internet of Things (loT) The network of physical objects or

więcej podobnych podstron