Course Number: 578
Length: 2 Days
Having completed this course the participant will be able to understand how security is implemented, deployed and managed in UMTS/HSPA/HSPA+and LET networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.
Who Should Attend
Anyone who is interested in an in-depth knowledge of the security in the UMTS family of wireless networks. The course is essential for network security & wireless specialists, operators and manufacturers, wireless network researcher, academics, security engineers, researchers and consultants.
Objectives
The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in UMTS/HSPA/HSPA+ radio and core network. The course focuses both on the security on the air interface and the core network.
Outline
oVERVIEW OF SECURITY CONCEPTS
- Basic security concepts
- Authentication
- Privacy
- Integrity
- Authorization
- Non-repudiation
Encryption Fundamentals
- Encryption Technologies
- Cryptography Keys
- Symmetric and Asymmetric
- Ciphers
- Cipher Suites
- Certificates
Overview of Wireless Security Requirements
- Wireless security needs
- Basic GSM, GPRS and UMTS security functions
UMTS Security Architecture
- Overview of UMTS Network
- Overview of HSPA/HSPA+
- UMTS security features
- Network access mechanisms
- UMTS authentication and authorization procedures
- Key agreement
- Local authentication
- UMTS ciphering procedures
- Security threats to UMTS
- Security Evolution in E-UTRAN/LTE and EPC
Security in UTRAN
- Typical threats in UTRAN
- Mutual authentication
- Cryptography for authentication
- UTRAN encryption
- Integrity protection of RRC signalling
- Security in E-UTRAN
Security in UMTS Core Network
- Typical Threats in Core Network
- Denial of Services
- IPSec
- Authentication Server
- Network Domain
- MAP application layer security
UMTS Authentication and Key Management (AKA)
- Authentication parameters
- AV and K
- RAND
- SQN and AK
- AMF and MAC
- CK and IK
- RES and X-RES
- AUTN and AUTS
- Normal AKA procedure
- AKA procedure in the AuC
- AKA procedure in the USIM
- AKA procedure in the VLR/SGSN
AKA Algorithms
- AKA Functions with their outputs
- Cryptographic functions and algorithms
- Key generating functions
- Authentication parameters
- Integrity function
- Confidentiality function
- f0, f1 and f1*
- f2, f3 and f4
- f5, f5*, f8 and f9