11 NAS security context parameter handling

31.1213GPPRelease 16TSUICC-terminal interfaceUniversal Subscriber Identity Module (USIM) application test specification

11.1 NAS security context parameter handling when service "EMM Information" is available

11.1.1 Definition and applicability

The security parameters for authentication, integrity protection and ciphering are tied together in an EPS security context and identified by a key set identifier for E-UTRAN (eKSI). The relationship between the security parameters is defined in 3GPP TS 33.401 [27].

The EPS security context parameters shall be stored on the USIM if the corresponding file is present. If the corresponding file is not present on the USIM, these EMM parameters except allowed CSG list are stored in a non-volatile memory in the ME together with the IMSI from the USIM.

The EFEPSNSC contains the EPS NAS Security context as defined in TS 33.401 [27]. This file shall contain only one record and shall be updated only when the requirements defined in TS 33.401 [27] are met.

11.1.2 Conformance requirement

EPS AKA is the authentication and key agreement procedure that shall be used over E-UTRAN.

Before security can be activated, the MME and the UE need to establish an EPS security context. Usually, the EPS security context is created as the result of an authentication procedure between MME and UE. The EPS security context parameters shall be stored on the USIM if the corresponding file is present, and shall be updated only when the requirements defined in TS 33.401 [27] are met. If the corresponding file is not present on the USIM, these EMM parameters except allowed CSG list are stored in a non-volatile memory in the ME together with the IMSI from the USIM.

– TS 24.301 [26], clause 4.4.2.1 and Annex C;

– TS 31.102 [4], clause 4.2.92;

– TS 33.401 [27], clause 6.1.1, 7.2.5.1 and 7.2.5.2.1.

11.1.3 Test purpose

To verify that the ME generates the EPS security context identified by a key set identifier for E-UTRAN (eKSI) and stores all inside EFEPSNSC if this EF is available and when the requirements defined in TS 33.401 [27] , clauses 7.2.5.1 and 7.2.5.2.1 are met.

11.1.4 Method of test

11.1.4.1 Initial conditions

For this test an E-USS or a NB-SS is required.

The E-USS transmits on one cell, with the following network parameters:

– TAI (MCC/MNC/TAC): 246/081/0001.

– Access control: unrestricted.

The NB-SS transmits on one cell, with the following network parameters:

– TAI (MCC/MNC/TAC): 246/081/0001.

– Access control: unrestricted.

The default E-UTRAN UICC is used.

11.1.4.2 Procedure

a) The UE is switched on.

b) After receipt of an RRCConnectionRequest/RRCConnectionRequest-NB from the UE the E-USS/NB-SS sends RRCConnectionSetup/RRCConnectionSetup-NB to the UE, followed by RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB sent by the UE to the E-USS/NB-SS.

c) During registration and after receipt of an AttachRequest (included in the RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB) from the UE, the E-USS/NB-SS initiates the EPS authentication and AKA procedure. The E-USS/NB-SS uses

eKSI: ’00’

d) Afterwards the E-USS/NB-SS transmits a (NAS) SecurityModeCommand message to activate NAS security, and after receiving (NAS) SecurityModeComplete from the UE, the E-USS/NB-SS sends AttachAccept to the UE with:

TAI (MCC/MNC/TAC): 246/081/ 0001

GUTI: "24608100010266345678"

e) After receipt of the AttachComplete during registration from the UE, the E-USS/NB-SS sends RRCConnectionRelease/RRCConnectionRelease-NB to the UE.

f) The UE or the UE’s radio interface is switched off to perform the DETACH procedure.

11.1.5 Acceptance criteria

1) After step a) the UE shall read EFUST and EFEPSNSC.

2) During step b) the UE shall indicate in the AttachRequest that no key is available.

3) During step c) the UE shall send the AuthenticationResponse message.

4) During step d) the UE shall send the (NAS) SecurityModeComplete message.

5) EFEPSNSC shall not be updated during steps c) to e), unless for invalidating the content of EFEPSNSC.

Note: Invalidation of EFEPSNSC is described in TS 31.102 [4], clause 4.2.92.

6) After step f) the UE shall send DETACH REQUEST to the E-USS/NB-SS.

7) After step f) EFEPSNSC shall contain:

EFEPSNSC (EPS NAS Security Context)

Logically: Key Set Identifier KSIASME: ’00’

ASME Key (KSIASME): 32 byte key, value not checked

Uplink NAS count: any value

Downlink NAS count: any value

Identifiers of selected NAS any value
integrity and encryption
algorithm

Coding:

B1

B2

B3

B4

B5

B6

B7

B8

Bxx

Hex

A0

xx

80

01

00

81

xx

xx

xx

11.2 NAS security context parameter handling when service "EMM Information" is not available, no IMSI change

11.2.1 Definition and applicability

The security parameters for authentication, integrity protection and ciphering are tied together in an EPS security context and identified by a key set identifier for E-UTRAN (eKSI). The relationship between the security parameters is defined in 3GPP TS 33.401 [27].

The EPS security context parameters shall be stored on the USIM if the corresponding file is present. If the corresponding file is not present on the USIM, these EMM parameters except allowed CSG list are stored in a non-volatile memory in the ME together with the IMSI from the USIM.

The EFEPSNSC contains the EPS NAS Security context as defined in TS 33.401 [27]. This file shall contain only one record.

11.2.2 Conformance requirement

EPS AKA is the authentication and key agreement procedure that shall be used over E-UTRAN.

Before security can be activated, the MME and the UE need to establish an EPS security context. Usually, the EPS security context is created as the result of an authentication procedure between MME and UE. The EPS security context parameters shall be stored on the USIM if the corresponding file is present. If the corresponding file is not present on the USIM, these EMM parameters except allowed CSG list are stored in a non-volatile memory in the ME together with the IMSI from the USIM.

These EMM parameters can only be used if the IMSI from the USIM matches the IMSI stored in the non-volatile memory; else the UE shall delete the EMM parameters.

– TS 24.301 [26], clause 4.4.2.1 and Annex C;

– TS 31.102 [4], clause 4.2.92;

– TS 33.401 [27], clause 6.1.1.

11.2.3 Test purpose

To verify that the ME generates the EPS security context identified by a key set identifier for E-UTRAN (eKSI) and stores all inside a non-volatile memory in the ME as EMM information is not available on the USIM. During the test the IMSI on the USIM remains unchanged.

11.2.4 Method of test

11.2.4.1 Initial conditions

For this test an E-USS or a NB-SS is required.

The E-USS transmits on one cell, with the following network parameters:

– TAI (MCC/MNC/TAC): 246/081/0001.

– Access control: unrestricted.

The NB-SS transmits on one cell, with the following network parameters:

– TAI (MCC/MNC/TAC): 246/081/0001.

– Access control: unrestricted.

The default UICC (without the service "EMM Information") is installed into the Terminal.

11.2.4.2 Procedure

a) The UE is switched on.

b) After receipt of an RRCConnectionRequest/RRCConnectionRequest-NB from the UE the E-USS/NB-SS sends RRCConnectionSetup/RRCConnectionSetup-NB to the UE, followed by RRCConnectionSetupComplete/ RRCConnectionSetupComplete-NB sent by the UE to the E-USS/NB-SS.

c) During registration and after receipt of an AttachRequest (included in the RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB) from the UE, the E-USS/NB-SS initiates the EPS authentication and AKA procedure. The E-USS/NB-SS uses

eKSI: 00

d) Afterwards the E-USS/NB-SS transmits a (NAS) SecurityModeCommand message to activate NAS security, and after receiving (NAS) SecurityModeComplete from the UE, the E-USS/NB-SS sends AttachAccept to the UE with:

TAI (MCC/MNC/TAC): 246/081/0001

GUTI: "24608100010266345678"

e) After receipt of the AttachComplete during registration from the UE, the E-USS/NB-SS sends RRCConnectionRelease/ RRCConnectionRelease-NB to the UE.

f) The UE is switched off and performs the Detach procedure.

g) The default UICC remains in use.

h) The Terminal is switched on.

i) After receipt of an RRCConnectionRequest/RRCConnectionRequest-NB from the UE the E-USS/NB-SS sends RRCConnectionSetup/RRCConnectionSetup-NB to the UE, followed by RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB sent by the UE to the E-USS/NB-SS.

j) During registration and after receipt of an AttachRequest (included in the RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB) from the UE, E-USS/NB-SS transmits a (NAS) SecurityModeCommand message to activate NAS security using the last known KASME, and after receiving (NAS) SecurityModeComplete from the UE, the E-USS/NB-SS sends AttachAccept to the UE with:

TAI (MCC/MNC/TAC): 246/081/0001

GUTI: "24608100010266345619"

k) After receipt of the AttachComplete during registration from the UE, the E-USS/NB-SS sends RRCConnectionRelease/RRCConnectionRelease-NB to the UE.

11.2.5 Acceptance criteria

1) After step a) the UE shall read EFUST.

2) During step c) the UE shall send the AuthenticationResponse message.

3) During step d) the UE shall send the (NAS) SecurityModeComplete message.

4) During step j) the UE shall indicate in the AttachRequest eKSI as 00.

5) During step j) the UE shall send the (NAS) SecurityModeComplete message.

6) During step k) the UE shall send the AttachComplete message.

11.3 NAS security context parameter handling when service "EMM Information" is not available, IMSI changed

11.3.1 Definition and applicability

The security parameters for authentication, integrity protection and ciphering are tied together in an EPS security context and identified by a key set identifier for E-UTRAN (eKSI). The relationship between the security parameters is defined in 3GPP TS 33.401 [27].

The EPS security context parameters shall be stored on the USIM if the corresponding file is present. If the corresponding file is not present on the USIM, these EMM parameters except allowed CSG list are stored in a non-volatile memory in the ME together with the IMSI from the USIM.

The EFEPSNSC contains the EPS NAS Security context as defined in TS 33.401 [27]. This file shall contain only one record.

11.3.2 Conformance requirement

EPS AKA is the authentication and key agreement procedure that shall be used over E-UTRAN.

Before security can be activated, the MME and the UE need to establish an EPS security context. Usually, the EPS security context is created as the result of an authentication procedure between MME and UE. The EPS security context parameters shall be stored on the USIM if the corresponding file is present. If the corresponding file is not present on the USIM, these EMM parameters except allowed CSG list are stored in a non-volatile memory in the ME together with the IMSI from the USIM.

These EMM parameters can only be used if the IMSI from the USIM matches the IMSI stored in the non-volatile memory; else the UE shall delete the EMM parameters.

– TS 24.301 [26], clause 4.4.2.1 and Annex C;

– TS 31.102 [4], clause 4.2.92;

– TS 33.401 [27], clause 6.1.1.

11.3.3 Test purpose

1) To verify that the ME generates the EPS security context identified by a key set identifier for E-UTRAN (eKSI) and stores all inside a non-volatile memory in the ME as EMM information is not available on the USIM.

2) To verify that UE deletes existing EMM parameters from the ME’s non-volatile memory in case a different IMSI is activated.

11.3.4 Method of test

11.3.4.1 Initial conditions

For this test an E-USS or NB-SS is required.

The E-USS transmits on one cell, with the following network parameters:

– TAI (MCC/MNC/TAC): 246/081/0001.

– Access control: unrestricted.

The NB-SS transmits on one cell, with the following network parameters:

– TAI (MCC/MNC/TAC): 246/081/0001.

– Access control: unrestricted.

The default UICC (without the service "EMM Information") is installed into the Terminal.

11.3.4.2 Procedure

a) The UE is switched on.

b) After receipt of an RRCConnectionRequest/RRCConnectionRequest-NB from the UE the E-USS/NB-SS sends RRCConnectionSetup/RRCConnectionSetup-NB to the UE, followed by RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB sent by the UE to the E-USS/NB-SS.

c) During registration and after receipt of an AttachRequest (included in the RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB) from the UE, the E-USS/NB-SS initiates the EPS authentication and AKA procedure. The E-USS/NB-SS uses

eKSI: 00

d) Afterwards the E-USS/NB-SS transmits a (NAS) SecurityModeCommand message to activate NAS security, and after receiving (NAS) SecurityModeComplete from the UE, the E-USS/NB-SS sends AttachAccept to the UE with:

TAI (MCC/MNC/TAC): 246/081/0001

GUTI: "24608100010266345678"

e) After receipt of the AttachComplete during registration from the UE, the E-USS/NB-SS sends RRCConnectionRelease/RRCConnectionRelease-NB to the UE.

f) The UE is switched off and performs the Detach procedure.

g) A new UICC with the following configuration is activated:

The default UICC with the following exception: The IMSI is set to "246081222233333".

h) The Terminal is switched on.

i) After receipt of an RRCConnectionRequest/RRCConnectionRequest-NB from the UE the E-USS/NB-SS sends RRCConnectionSetup/RRCConnectionSetup-NB to the UE, followed by RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB sent by the UE to the E-USS/NB-SS.

j) During registration and after receipt of an AttachRequest (included in the RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB) from the UE, E-USS/NB-SS transmits a (NAS) SecurityModeCommand message to activate NAS security using the last known KASME.

k) The UE responds with (NAS) SecurityModeReject.

l) The E-USS/NB-SS sends RRCConnectionRelease/RRCConnectionRelease-NB to the UE.

11.3.5 Acceptance criteria

1) After step a) the UE shall read EFUST.

2) During step c) the UE shall send the AuthenticationResponse message.

3) During step d) the UE shall send the (NAS) SecurityModeComplete message.

4) During step j) the UE shall indicate in the AttachRequest that no key is available.

5) After step j) the UE shall send the (NAS) SecurityModeReject message.

11.4 EPS NAS Security Context Storage

11.4.1 Definition and applicability

The security parameters for authentication, integrity protection and ciphering are tied together in an EPS security context and identified by a key set identifier for E-UTRAN (eKSI). The relationship between the security parameters is defined in 3GPP TS 33.401 [27].

The EPS security context parameters shall be stored on the USIM if the corresponding file is present. If the corresponding file is not present on the USIM, these EMM parameters except allowed CSG list are stored in a non-volatile memory in the ME together with the IMSI from the USIM.

The EFEPSNSC contains the EPS NAS Security context as defined in TS 33.401 [27]. This file shall contain only one record and shall be updated only when the requirements defined in TS 33.401 [27] are met.

11.4.2 Conformance requirement

EPS AKA is the authentication and key agreement procedure that shall be used over E-UTRAN.

Before security can be activated, the MME and the UE need to establish an EPS security context. Usually, the EPS security context is created as the result of an authentication procedure between MME and UE. The EPS security context parameters shall be stored on the USIM if the corresponding file is present, and shall be updated only when the requirements defined in TS 33.401 [27] are met.

– TS 24.301 [26], clause 4.4.2.1 and Annex C;

– TS 31.102 [4], clause 4.2.92 and 5.2.28;

– TS 33.401 [27], clause 6.1.1, 7.2.5.2, 7.2.6.1 and 7.2.6.3.

11.4.3 Test purpose

The update of EPS NAS security context shall be according to the rules and procedures specified in TS 33.401 [27], clause 6.1.1, 7.2.5.2, 7.2.6.1 and 7.2.6.3.

11.4.4 Method of test

11.4.4.1 Initial conditions

For this test an E-USS or a NB-SS is required.

The E-USS transmits on one cell, with the following network parameters:

– TAI (MCC/MNC/TAC): 246/081/0001.

– Access control: unrestricted.

The NB-SS transmits on one cell, with the following network parameters:

– TAI (MCC/MNC/TAC): 246/081/0001.

– Access control: unrestricted.

The default E-UTRAN UICC is used.

11.4.4.2 Procedure

a) The UE is switched on.

b) After receipt of an RRCConnectionRequest/RRCConnectionRequest-NB from the UE the E-USS/NB-SS sends RRCConnectionSetup/RRCConnectionSetup-NB to the UE, followed by RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB sent by the UE to the E-USS/NB-SS.

c) The E-USS/NB-SS receives an AttachRequest (included in the RRCConnectionSetupComplete/RRCConnectionSetupComplete-NB) from the UE.

d) The E-USS/NB-SS initiates the EPS authentication and AKA procedure. The E-USS/NB-SS uses

eKSI: ’00’

e) Afterwards the E-USS/NB-SS transmits a (NAS) SecurityModeCommand message to activate NAS security, and after receiving (NAS) SecurityModeComplete from the UE, the E-USS/NB-SS sends AttachAccept to the UE with:

TAI (MCC/MNC/TAC): 246/081/0001

GUTI: "24608100010266345678"

f) After receipt of the AttachComplete during registration from the UE, the E-USS/NB-SS sends RRCConnectionRelease/RRCConnectionRelease-NB, to the UE.

g) The E-USS/NB-SS sends Paging/Paging-NB to the UE using the S-TMSI.

– for WB-S1: with CN domain indicator set to ”PS”.with CN domain indicator set to ”PS”.

h) After receipt of a RRCConnectionRequest/RRCConnectionRequest-NB message from the UE, the E-USS/NB-SS sends RRCConnectionSetup/RRCConnectionSetup-NB message to the UE, followed by RRCConnectionSetupComplete/RRCConnectionSetupCompleteNB sent by the UE to the E-USS/NB-SS.

i) The UE sends:

– for WB-S1: EMM Service Request followed by the activation of AS security by the E-USS and the Dedicated EPS bearer.

– for NB-IoT: Control Plane Service Request, the NB-SS sends a Service Accept.

j) The following is checked:

– for WB-S1: After keeping the Dedicated EPS Bearer active for 5 seconds, the E-USS sends RRCConnectionRelease to the UE.

– for NB-IoT: After keeping the Default EPS Bearer active for 5 seconds, the NB-SS sends RRCConnectionRelease-NB to the UE.

11.4.5 Acceptance criteria

1) After step a) the UE shall read EFUST and EFEPSNSC.

2) After step a) and before step d) the UE shall either keep the content of EFEPSNSC as specified in the initial conditions or invalidate the content of EFEPSNSC as described in TS 31.102 [4], clause 4.2.92.

3) During step d) the UE shall send the AuthenticationResponse message.

4) During step e) the UE shall send the (NAS) SecurityModeComplete message.

5) After step f) the UE shall have entered idle mode.

6) After step i) the UE shall have

– for WB-S1: a Dedicated EPS bearer established.

– for NB-IoT: a Default bearer established.

7) During steps d), e), f), g), h), i) and j) the UE shall not update EFEPSNSC.