Table of Contents
1. Introduction
2. NAS Security
3. AS Security
4. Security Context
5. Closing and References
1. Introduction
In LTE Security I[1], Part I of the LTE Security technical document, we have discussed LTE authentication based on EPS AKA procedure and learned a UE and an MME get to share the KASME when authenticated.
In this document, w...