Price: $1,499.00

Course Number: 578
Length: 2 Days
Print Friendly, PDF & Email

Having completed this course the participant will be able to understand how security is implemented, deployed and managed in UMTS/HSPA/HSPA+and LET networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.

Who Should Attend

Anyone who is interested in an in-depth knowledge of the security in the UMTS family of wireless networks. The course is essential for network security & wireless specialists, operators and manufacturers, wireless network researcher, academics, security engineers, researchers and consultants.

Objectives

The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in UMTS/HSPA/HSPA+ radio and core network. The course focuses both on the security on the air interface and the core network.

Outline

oVERVIEW OF SECURITY CONCEPTS

  • Basic security concepts
  • Authentication
  • Privacy
  • Integrity
  • Authorization
  • Non-repudiation

Encryption Fundamentals

  • Encryption Technologies
  • Cryptography Keys
  • Symmetric and Asymmetric
  • Ciphers
  • Cipher Suites
  • Certificates

Overview of Wireless Security Requirements

  • Wireless security needs
  • Basic GSM, GPRS and UMTS security functions

UMTS Security Architecture

  • Overview of UMTS Network
  • Overview of HSPA/HSPA+
  • UMTS security features
  • Network access mechanisms
  • UMTS authentication and authorization procedures
  • Key agreement
  • Local authentication
  • UMTS ciphering procedures
  • Security threats to UMTS
  • Security Evolution in E-UTRAN/LTE and EPC

Security in UTRAN

  • Typical threats in UTRAN
  • Mutual authentication
  • Cryptography for authentication
  • UTRAN encryption
  • Integrity protection of RRC signalling
  • Security in E-UTRAN

Security in UMTS Core Network

  • Typical Threats in Core Network
  • Denial of Services
  • IPSec
  • Authentication Server
  • Network Domain
  • MAP application layer security

UMTS Authentication and Key Management (AKA)

  • Authentication parameters
  • AV and K
  • RAND
  • SQN and AK
  • AMF and MAC
  • CK and IK
  • RES and X-RES
  • AUTN and AUTS
  • Normal AKA procedure
  • AKA procedure in the AuC
  • AKA procedure in the USIM
  • AKA procedure in the VLR/SGSN

AKA Algorithms

  • AKA Functions with their outputs
  • Cryptographic functions and algorithms
  • Key generating functions
  • Authentication parameters
  • Integrity function
  • Confidentiality function
  • f0, f1 and f1*
  • f2, f3 and f4
  • f5, f5*, f8 and f9

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.