Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | About Us | List of Contributors | Become a Contributor |  How to Advertise  
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
LTE Security I: Concept and Authentication
July 31, 2013 | By Netmanias (tech@netmanias.com)
Online viewer:
Comments (15)
The LTE Security technical document consists of two companion documents: this first document (Part I LTE Security I) and the second document (Part II LTE Security II) that follows. These documents will cover the following three topics: LTE authentication (in Part I) and NAS security and AS security (in Part II). In Part I, an overview of LTE security explaining the concept of the three topics and the relationship among them will be given, followed by a detailed description of LTE authentication procedure.
Page 1 of 4



Table of Contents  

1. Introduction
2. LTE Security Concept 
3. LTE Authentication Procedure
4. Closing and References



1. Introduction 


Wireless communication, in its nature, is always at a risk of eavesdropping or manipulation because data originally sent from/to a user may be received and unlawfully used by an unintended user. Locations or traveling routes of a user can also be easily tracked by tracing to which cells the user is connected or through which cells the user is travelling. And this can result in privacy infringement. Mobile communication networks provide security features to ensure data transferred across radio links is not manipulated, prevent unauthorized access by an unintended user to the data received, and protect the privacy of users.


The LTE Security document describes basic security features offered by LTE networks, including LTE authentication, NAS (Non Access Stratum) security and AS (Access Stratum) security. LTE authentication is the process of determining whether a user is an authorized subscriber to the network that he/she is trying to access, while NAS security and AS security are features required to securely deliver user data that travels through LTE radio links at NAS and AS levels.


The LTE Security document consists of the following two companion documents: Part I, LTE Security I, and Part II, LTE Security II. Part I will explain the concept of LTE security and the detailed procedure of LTE authentication, and Part II will discusses NAS and AS security setup.


Part I is organized as follows:


In Chapter 2, the scope of these two companion documents will be defined and a conceptual overview will be given.

Chapter 3 will focus on the detailed procedure of LTE authentication and

Chapter 4 will summarize the LTE authentication and the LTE authentication-related keys.





Page 1 of 4
HI 2014-11-18 16:01:18



Good Document.

blue 2014-12-29 18:01:29



Why in the picture 2 NW sent ATTACH ACCEPT before AS Security Mode Command, from our log i saw opposite result.


00:01:07.735 LTE RRC OTA Packet  --  DL_DCCH / SecurityModeCommand       /*AS SecurityModeCommand form NW */

00:01:08.241 LTE NAS EMM Plain OTA Incoming Message  --  Attach accept Msg/*Attach accept form NW */


Thank you.

garima singh 2016-12-01 19:49:56


  will you tell me on which tool you have did LTE simulation

bjm 2015-04-21 21:51:00

What algorithm is used for the KDF? Is it selectable/configurable?

garima singh 2016-12-01 19:48:25

anybody can tell me whaich simulator  i should use for security setup in LTE..............

Kiran 2015-07-16 14:14:27

Thanks for sharing very useful info

pratit khare 2015-09-07 07:16:54

Hi...plz explain me why ciphering is optional in AS security?

satyasunil.sunkara@tatatel.co.in.com 2016-02-22 17:09:27

Excellent basic stuff...that great,.

jaime 2016-05-18 06:44:17

Great document

jaime 2016-05-19 23:46:30

Hi Would you know what happens in the case  of IWF as in 3G  Serving Network is not used thus how is KASAME going to be derived if there is no SN-ID ??  


Thanks in advance 


Jack Lin 2016-09-26 01:32:36


John Dalgas 2016-12-06 21:00:17

Excellent document.

Very accessably written, focusing on the important matters, and beautifully depicted by sequence diagrams combined with algorithm box diagrams, together showing exactly the creation and flow of information.

By far the best description I have found - I am blown over backwards - just the information I needed - thank you.

kemanzhuo 2017-09-02 21:04:40

excellent, very useful info.

sudhakar 2017-10-07 14:39:20

Hi, Excellent document and can easily understandable 

debasis 2017-10-28 18:58:09

nice document

Thank you for visiting Netmanias! Please leave your comment if you have a question or suggestion.
Related Contents
Netmanias Technical Documents
Netmanias Technical Documents





Subscribe FREE >>

Currently, 47,000+ subscribed to Netmanias.

  • You can get Netmanias Newsletter

    (New contents, Korea ICT News)

  • You can view all netmanias' contents

  • You can download all netmanias'

    contents in pdf file











Open vs. Proprietary 5G Fronthaul Interface: SK Telecom Case

Published: January 11, 2018










How to contribute articles to Netmanias!

We always welcome contributed articles. Share your expertise and inspire others!






View All (157)
5G (1) Backbone (2) Backhaul (3) Blockchain (1) Carrier Ethernet (3) Charging (1) DHCP (4) ECM (2) EMM (16) EPS (2) Google (1) HLS (1) HTTP Adaptive Streaming (3) Handover (5) IPTV (4) Initial Attach (2) IoT (2) Korea (1) LTE (37) LTE Identification (2) LTE-A (1) MPLS (2) Mobility (2) NAT (7) Netflix (1) Network Architecture (3) Network Protocol (20) OTT (1) PCRF (3) QoS (3) RCS (3) SDF (2) SK Telecom (1) Samsung (1) Security (5) Transparent Cache (1) Video Streaming (4) VoLTE (1) Wi-Fi (1) YouTube (2)
Password confirmation
Please enter your registered comment password.