01-05 authentication procedure

6
M900/M1800 Base Station Subsystem Signaling Analysis Manual Contents Issue 01 (2007-03-15) Huawei Technologies Proprietary i Contents 5 Authentication Procedure.........................................................................................................5-1 5.1 Overview........................................................................................................................................................... 5-2 5.2 Authentication Procedure ................................................................................................................................. 5-2 5.2.1 Successful Authentication ....................................................................................................................... 5-2 5.2.2 Unsuccessful Authentication .................................................................................................................. 5-3 5.3 Internal Handling of BSC................................................................................................................................. 5-4 5.4 Abnormal Cases ................................................................................................................................................ 5-4

Upload: paul-kabeya

Post on 03-Oct-2015

212 views

Category:

Documents


0 download

DESCRIPTION

Core Network (GSM Authentication)

TRANSCRIPT

  • M900/M1800 Base Station Subsystem Signaling Analysis Manual Contents

    Issue 01 (2007-03-15) Huawei Technologies Proprietary i

    Contents

    5 Authentication Procedure.........................................................................................................5-1 5.1 Overview...........................................................................................................................................................5-2 5.2 Authentication Procedure .................................................................................................................................5-2

    5.2.1 Successful Authentication.......................................................................................................................5-2 5.2.2 Unsuccessful Authentication ..................................................................................................................5-3

    5.3 Internal Handling of BSC.................................................................................................................................5-4 5.4 Abnormal Cases................................................................................................................................................5-4

  • Figures M900/M1800 Base Station Subsystem

    Signaling Analysis Manual

    ii Huawei Technologies Proprietary Issue 01 (2007-03-15)

    Figures

    Figure 5-1 Procedure of successful authentication ...............................................................................................5-3

    Figure 5-2 Authentication rejection procedure .....................................................................................................5-4

  • M900/M1800 Base Station Subsystem Signaling Analysis Manual 5 Authentication Procedure

    Issue 01 (2007-03-15) Huawei Technologies Proprietary 5-1

    5 Authentication Procedure About This Chapter

    The following table lists the contents of this chapter.

    Title Description

    5.1 Overview Introduces the authentication technology of Huawei GSM network.

    5.2 Authentication Procedure Describes authentication procedures, including successful and unsuccessful authentication procedures.

    5.3 Internal Handling of BSC Describes the BSC internal handling regarding authentication.

    5.4 Abnormal Cases Describes typical abnormal authentication procedures.

  • 5 Authentication Procedure M900/M1800 Base Station Subsystem

    Signaling Analysis Manual

    5-2 Huawei Technologies Proprietary Issue 01 (2007-03-15)

    5.1 Overview Authentication refers to the procedure of authenticating the validity of the IMSI and TMSI of MS initiated by the GSM network.

    The purpose of the authentication procedure is to prevent illegal MS from accessing the network, and in the meantime, to protect the private information of legal MS from leakage.

    On the following conditions, the network may initiate the authentication procedure.

    z MS requests modification of its relevant information in VLR or HLR. z Service access is initiated (MS originates a call. MS is called. MS is activated or

    deactivated. Supplementary service is initiated) z MS accesses the network for the first time after MSC/VLR is restarted z The ciphering key sequence number Kc is not matched.

    The purpose of the authentication procedure is twofold.

    z To permit the network to check whether the identity provided by MS is acceptable or not z To provide parameters enabling MS to calculate a new ciphering key

    The authentication procedure is always initiated and controlled by the network.

    5.2 Authentication Procedure The network initiates the authentication procedure by transferring an Authentication Request message to MS and starts timer T3260. The Authentication Request message contains the parameters used to calculate the response parameters, and also contains the CKSN (Ciphering Key Sequence Number) allocated to the key which may be computed from the given parameters.

    Upon receipt of the Authentication Request message, MS processes the challenge information and sends back an Authentication Response message to the network. The new ciphering key Kc calculated from the challenge information shall overwrite the previous one and be stored in SIM before the Authentication Response message is transmitted. The CKSN shall be stored together with the calculated Kc.

    Upon receipt of the Authentication Response message, the network stops timer T3260 and checks the validity of the response.

    5.2.1 Successful Authentication Figure 5-1 shows the procedure of successful authentication.

  • M900/M1800 Base Station Subsystem Signaling Analysis Manual 5 Authentication Procedure

    Issue 01 (2007-03-15) Huawei Technologies Proprietary 5-3

    Figure 5-1 Procedure of successful authentication

    AUT_REQ(1)

    AUT_RES(2)

    MSCBSCBTSMS

    Step 1 The Authentication Request message contains a RAND (Random Number) and a CKSN. There are total 128 bits in the RAND.

    Step 2 The Authentication Response message contains a response number (SRES), which is obtained based on calculation of RAND and Ki through the A3 algorithm.

    The network compares the SRES stored in itself with the one contained in the Authentication Response message. If the two are consistent, authentication shall be passed, and the subsequent sub-procedures (such as the encryption procedure) shall be entered.

    ----End

    5.2.2 Unsuccessful Authentication If authentication fails, i.e. if the response is not valid, the network may distinguish between the two different modes of identification adopted by MS.

    Step 1 If TMSI identification mode has been adopted, the network shall initiate the identification procedure. If the IMSI given by MS differs from the one the network has associated with the TMSI, the network shall restart the authentication procedure. If the IMSI provided by MS is correct, the network shall return an Authentication Reject message.

    Step 2 If IMSI identification mode has been adopted, the network shall directly return an Authentication Reject message. Figure 5-2 shows the authentication rejection procedure.

    Figure 5-2 Authentication rejection procedure

    MSC

    AUT_RES(2)

    AUT_REJ(3)

    BSCBTSMS

    AUT_REQ(1)

    After the network sends the Authentication Reject message, all MM connections in progress are released, and the network restarts the RR connection release procedure.

  • 5 Authentication Procedure M900/M1800 Base Station Subsystem

    Signaling Analysis Manual

    5-4 Huawei Technologies Proprietary Issue 01 (2007-03-15)

    Upon receipt of the Authentication Reject message, MS sets the update status in SIM to "U2 ROAMING NOT ALLOWED", deletes from SIM the stored TMSI, LAI and CKSN.

    If the Authentication Reject message is received in the state "IMSI DETACH INITIATED", timer T3220 shall be stopped when the RR connection is released. If possible, MS should initiate the local release procedure after the normal release procedure is completed, or after T3220 expires. If this is not possible (e.g. detach at power-off), the MSRR sublayer shall be aborted.

    If the Authentication Reject message is received in any other state, MS shall abort any MM connection establishment or call re-establishment procedure, stop any of the timers T3210 or T3230 (if running), release all MM connections, reset and start timer T3240, and enter the state "WAIT FOR NETWORK COMMAND", expecting the release of the RR connection. If the RR connection is not released within a given time controlled by the timer T3240, MS shall abort the RR connection. In both cases, either after a RR connection release triggered from the network side or after a RR connection abort requested by the MS side, MS shall enter the substate "NO IMSI" of "MM IDLE".

    5.3 Internal Handling of BSC The network initiates and controls the authentication procedure. No special processing is required from the BSC.

    5.4 Abnormal Cases

    RR connection failure Upon detection of a RR connection failure before the Authentication Response message is received, the network shall release all MM connections (if any) and abort any ongoing MM-specific procedure.

    Expiry of timer T3260 Before receipt of the Authentication Response message, if timer T3260 expires, the network shall release the RR connection, abort the authentication procedure and any ongoing MM-specific procedure, release all MM connections, and initiate the RR connection release procedure.

    SIM unregistered If the SIM of an MS has not been registered on the network side, the network will directly return an Authentication Reject message to the MS.

    ContentsFigures5 Authentication ProcedureAbout This Chapter5.1 Overview5.2 Authentication Procedure5.2.1 Successful Authentication5.2.2 Unsuccessful Authentication

    5.3 Internal Handling of BSC5.4 Abnormal Cases