8.1.7 Security mode command
34.123-13GPPPart 1: Protocol conformance specificationRelease 15TSUser Equipment (UE) conformance specification
8.1.7.1 Security mode command in CELL_DCH state (CS Domain)
8.1.7.1.1 Definition
8.1.7.1.2 Conformance requirement
1. This procedure is used to trigger or start of ciphering or to command the restart of ciphering with the new ciphering configuration for the signalling radio bearers and any radio bearers of a particular CN Domain. It is also used to start integrity protection or modify integrity protection configuration for the signalling radio bearers.
2. When the UE receives a SECURITY MODE COMMAND message from the UTRAN, which indicates a downlink activation time for each effected SRB and RB, and new ciphering mode configuration, the UE shall apply the old ciphering configuration, for a particular SRB or RB, before the stated downlink activation time. It shall start to decipher using the new ciphering configuration at the downlink activation time.
3. After the UE has transmitted a SECURITY MODE COMPLETE message using the new integrity protection configuration which includes uplink activation time, it shall start to cipher transmission in the uplink using the new configuration at the respective uplink activation time for each SRB or RB.
Reference
3GPP TS 25.331 clauses 8.1.12, 8.6.3.4, 8.6.3.5.
8.1.7.1.3 Test purpose
To confirm that the UE activates the new ciphering configurations after the stated activation time. To confirm that after the UE receives a SECURITY MODE COMMAND message, it transmits a SECURITY MODE COMPLETE message to the UTRAN using the old ciphering configuration together with the application of the new integrity protection configuration. To confirm that UE send SECURITY MODE FAILURE message when SS transmits a SECURITY MODE COMMAND message that causes an invalid configuration. To confirm that the UE sends a SECURITY MODE FAILURE message when the UE receives an invalid SECURITY MODE COMMAND message.
8.1.7.1.4 Method of test
Initial Condition
System Simulator: 1 cell.
UE: CELL_DCH (state 6-9) as specified in clause 7.4 of TS 34.108.
Test Procedure
The UE is in CELL_DCH state. The SS initiates an Authentication procedure, which will result in the generation of a new security keyset (CK/IK). The SS transmits a SECURITY MODE COMMAND message which contains an unexpected critical message extension. The UE shall respond by sending SECURITY MODE FAILURE message on the DCCH. Then SS transmits a SECURITY MODE COMMAND message with IE’s "Ciphering mode info" and "Integrity protection mode info both omitted". Again the UE shall not trigger any ciphering algorithm and it shall respond by sending SECURITY MODE FAILURE message on the DCCH. Next, the SS transmits a valid SECURITY MODE COMMAND message which includes the correct downlink activation times and "Integrity check info" IE. Then the UE shall check the integrity check info and shall start to configure ciphering in downlink according to the first valid SECURITY MODE COMMAND message. The UE shall transmit a SECURITY MODE COMPLETE message which contains the correct uplink activation times and also "Integrity check info" IE using the new integrity protection configuration. The SS records the uplink ciphering activation time for RB 2. Next, the SS transmits UE CAPABILITY ENQUIRY message repeatedly on the downlink DCCH using RLC-AM mode. The UE shall respond to each downlink message with a UE CAPABILITY INFORMATION message on the uplink DCCH using RLC-AM. SS then send UE CAPABILITY INFORMATION CONFIRM message to the UE. This cycle repeats itself until both the uplink and downlink ciphering activation time for RB 2 has elapsed. SS checks all uplink UE CAPABILITY INFORMATION messages are integrity-protected by UIA algorithm, and that the messages contain the correct values for "Integrity check info" IE. This can be verified in the SS through the reception of a correctly ciphered and integrity-protected UE CAPABILITY INFORMATION message.
Expected sequence
Step |
Direction |
Message |
Comment |
|
UE |
SS |
|||
1 |
RRC connected state on DCH_state. |
|||
1a |
|
AUTHENTICATION REQUEST |
MM message which will result in the generation of a new security keyset |
|
1b |
|
AUTHENTICATION RESPONSE |
MM |
|
2 |
|
SECURITY MODE COMMAND |
See message content. |
|
3 |
|
SECURITY MODE FAILURE |
IE "Failure Cause" shall be set to "Protocol Error" and IE "Protocol Error Information" shall be set to "Message extension not comprehended". |
|
4 |
|
SECURITY MODE COMMAND |
See message content. |
|
5 |
|
SECURITY MODE FAILURE |
IE "Failure Cause" shall be set to "invalid configuration". |
|
6 |
|
SECURITY MODE COMMAND |
See specific message contents. |
|
7 |
Void |
|||
8 |
Void |
|||
9 |
|
SECURITY MODE COMPLETE |
SS verifies that this message is sent using the old ciphering configuration. SS records the uplink ciphering activation time for RB 2. |
|
10 |
|
UE CAPABILITY ENQUIRY |
SS repeats step 10, 11 and 12 until its internal uplink and downlink RLC SN have both surpassed the uplink and downlink ciphering activation time specified for RB2. This message is sent on the downlink DCCH using RLC-AM. |
|
11 |
|
UE CAPABILITY INFORMATION |
UE shall send this message on the uplink DCCH using RLC-AM. SS verifies that the last UE CAPABILITY INFORMATION message is both integrity-protected and ciphered correctly. |
|
12 |
|
UE CAPABILITY INFORMATION CONFIRM |
Specific Message Contents
SECURITY MODE COMMAND (Step 2)
Information Element |
Value/remark |
Integrity check info |
|
Message authentication code |
Calculated result in SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
RRC Message sequence number |
Next RRC SN |
Critical extensions |
’FF’H |
SECURITY MODE FAILURE (Step 3)
The same message found in TS 34.108, clause 9 shall be transmitted by the UE on the uplink DCCH, with the exception of the following IEs:
Information Element |
Value/remark |
Failure cause |
|
Failure cause |
Protocol error |
Protocol error information |
|
Protocol error cause |
Message extension not comprehended |
SECURITY MODE COMMAND (Step 4)
Information Element |
Value/remark |
RRC transaction identifier |
0 |
Integrity check info |
|
Message authentication code |
Calculated result in SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
RRC Message sequence number |
Next RRC SN |
Security Capability |
Same as originally sent by UE (and stored in SS) |
Ciphering mode info |
Not Present |
– Ciphering mode command |
|
Integrity protection mode info |
Not Present |
CN domain identity |
CS Domain |
UE system specific security capability |
Not Present in condition A1 |
UE system specific security capability |
Present In condition A2 |
– Inter-RAT UE security capability |
|
– CHOICE system |
GSM |
– GSM security capability |
The indicated algorithms must be the same as the algorithms supported by the UE as indicated in the IE " UE system specific capability " in the RRC CONNECTION SETUP COMPLETE message. |
Condition |
Explanation |
A1 |
UE not supporting GSM |
A2 |
UE supporting GSM |
SECURITY MODE FAILURE (Step 5)
The same message found in TS 34.108, clause 9 shall be transmitted by the UE on the uplink DCCH, with the exception of the following IEs:
Information Element |
Value/remark |
Failure cause |
|
Failure cause |
Invalid configuration |
SECURITY MODE COMMAND (Step 6)
Information Element |
Value/remark |
RRC transaction identifier |
0 |
Integrity check info |
|
Message authentication code |
Calculated result in SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
RRC Message sequence number |
Next RRC SN |
Security Capability |
Same as originally sent by UE (and stored in SS) |
Ciphering mode info |
|
Ciphering mode command |
Start/restart |
Ciphering algorithm |
UEA1 |
Activation time for DPCH |
(256+CFN-(CFN MOD 8 + 8))MOD 256 |
Radio bearer downlink ciphering activation time info |
|
RB Identity |
1 |
RLC sequence number |
Current RLC SN |
RB Identity |
2 |
RLC sequence number |
Current RLC SN + 2 |
RB Identity |
3 |
RLC sequence number |
Current RLC SN |
RB Identity |
4 |
RLC sequence number |
Current RLC SN |
Integrity protection mode info |
|
Integrity protection mode command |
Modify |
Downlink integrity protection activation info |
|
Current RRC SN for SRB0 |
|
Current RRC SN for SRB1 |
|
Current RRC SN for SRB2 |
|
Current RRC SN for SRB3 |
|
Current RRC SN for SRB4 |
|
Integrity protection algorithm |
UIA1 |
CN domain identity |
CS Domain |
UE system specific security capability |
Not Present in condition A1 |
UE system specific security capability |
Present In condition A2 |
– Inter-RAT UE security capability |
|
– CHOICE system |
GSM |
– GSM security capability |
The indicated algorithms must be the same as the algorithms supported by the UE as indicated in the IE " UE system specific capability " in the RRC CONNECTION SETUP COMPLETE message. |
Condition |
Explanation |
A1 |
UE not supporting GSM |
A2 |
UE supporting GSM |
SECURITY MODE COMPLETE (Step 9)
Information Element |
Value/remark |
RRC transaction identifier |
0 |
Integrity check info |
|
– Message Authentication code |
Checked to see if present. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
– RRC Message sequence number |
Checked to see if present |
Uplink integrity protection activation info |
|
– RRC message sequence number list |
Check to see if the RRC SN for RB 0 to RB 4 are present |
Radio bearer uplink ciphering activation info |
|
– RB Identity other than RB2 |
Check to see if the RLC SN for RB1, 3 and 4 are present |
– RB Identity |
2 |
– RLC sequence number |
SS records this value. See step 10 in ‘expected sequence’ |
8.1.7.1.5 Test requirement
After step 2 the UE shall transmit a SECURITY MODE FAILURE message to report the protocol error detected in the first SECURITY MODE COMMAND message.
After step 4 the UE shall transmit a SECURITY MODE FAILURE message to report on the invalid configuration detected in the second SECURITY MODE COMMAND message.
After step 8 the SS checks that the SECURITY MODE COMPLETE message is received ciphered using the old configuration and that the calculated "integrity check info" IE is correct.
After step 9 SS verifies that all uplink signalling messages on RB2 are integrity protected with UIA1 algorithm.
After uplink ciphering activation time has lapsed, SS verifies that the UE CAPABILITY INFORMATION message received is integrity protected with UIA algorithm and ciphered with the new ciphering configuration and algorithm indicated in the SECURITY MODE COMMAND (Step 6) message.
After downlink ciphering activation time has lapsed, SS shall apply ciphering to all downlink messages using the new configuration. At least one more cycle between step 10 and step 12 shall be repeated correctly after activation time on both directions has lapsed and the messages on both directions shall be ciphered and integrity protected.
8.1.7.1b Security mode command in CELL_DCH state (PS Domain)
8.1.7.1b.1 Definition
8.1.7.1b.2 Conformance requirement
Upon reception of the SECURITY MODE COMMAND message, the UE shall:
1> if neither IE "Ciphering mode info" nor IE "Integrity protection mode info" is included in the SECURITY MODE COMMAND:
2> set the variable INVALID_CONFIGURATION to TRUE.
…
1> prior to sending the SECURITY MODE COMPLETE message:
…
2> if the SECURITY MODE COMMAND message contained the IE "Integrity protection mode info":
3> include and set the IE "Uplink integrity protection activation info" to the value of the variable INTEGRITY_PROTECTION_ACTIVATION_INFO for each signalling radio bearer;
…
2> start applying the new integrity protection configuration in the uplink for signalling radio bearer RB2 from and including the transmitted SECURITY MODE COMPLETE message;
2> transmit the SECURITY MODE COMPLETE message on the uplink DCCH in AM RLC;
…
If the IE "Ciphering mode info" is present and if the IE "Reconfiguration" in the variable CIPHERING_STATUS is set to FALSE, the UE shall:
…
1> apply the new ciphering configuration in the lower layers for all RBs that belong to a CN domain for which the IE "Status" of the variable SECURITY_MODIFICATION is set to "Affected" and all signalling radio bearers:
1> apply the new ciphering configuration as follows:
2> consider an activation time in downlink to be pending:
…
3> for AM-RLC until all AMD PDUs with sequence numbers up to and including activation time –1 have been received;
2> if the IE "Radio bearer downlink ciphering activation time info" is present:
3> apply the following procedure for each radio bearer and signalling radio bearers using RLC-AM or RLC-UM indicated by the IE "RB identity":
…
4> select an "RLC send sequence number" at which (activation) time the new ciphering configuration shall be applied in uplink for that radio bearer according to the following:
…
6> set a suitable value that would ensure a minimised delay in the change to the latest security configuration.
…
5> use the old ciphering configuration for the transmitted and received RLC PDUs with RLC sequence numbers smaller than the corresponding RLC sequence numbers indicated in the IE "Radio bearer uplink ciphering activation time info" sent to UTRAN and in the received IE "Radio bearer downlink ciphering activation time info" received from UTRAN, respectively;
5> use the new ciphering configuration for the transmitted and received RLC PDUs with RLC sequence numbers greater than or equal to the corresponding RLC sequence numbers indicated in the IE "Radio bearer uplink ciphering activation time info" sent to UTRAN and in the received IE "Radio bearer downlink ciphering activation time info" received from UTRAN, respectively;
…
If the IE "Integrity protection mode info" is present and if the IE "Reconfiguration" in the variable INTEGRITY_PROTECTION_INFO is set to FALSE, the UE shall:
…
1> if IE "Integrity protection mode command" has the value "modify" and the IE "Status" in the variable INTEGRITY_PROTECTION_INFO has the value "Started" and this IE was included in SECURITY MODE COMMAND:
…
2> start applying the new integrity protection configuration in the downlink at the RRC sequence number, for each signalling radio bearer n, indicated by the entry for signalling radio bearer n in the "RRC message sequence number list" in the IE "Downlink integrity protection activation info", included in the IE "Integrity protection mode info";
…
4> select a value of the RRC sequence number at which (activation) time the new integrity protection configuration shall be applied in uplink for that signalling radio bearer according to the following:
…
6> set a suitable value that would ensure a minimised delay in the change to the latest integrity protection configuration.
…
2> start applying the new integrity protection configuration in the uplink at the RRC sequence number, for each RBn, except for signalling radio bearer RB2, indicated by the entry for signalling radio bearer n in the "RRC message sequence number list" in the IE "Uplink integrity protection activation info", included in the variable INTEGRITY_PROTECTION_ACTIVATION_INFO;
2> start applying the new integrity protection configuration in the uplink at the RRC sequence number for signalling radio bearer RB2, as specified for the procedure initiating the integrity protection reconfiguration;
2> start applying the new integrity protection configuration in the downlink at the RRC sequence number, for each RBn, except for signalling radio bearer RB2, indicated by the entry for signalling radio bearer n in the "RRC message sequence number list" in the IE "Downlink integrity protection activation info";
NOTE: For signalling radio bearers that have a pending activation time as set for integrity protection by a previous procedure changing the integrity protection configuration, UTRAN should set this value in IE "Downlink integrity protection activation info".
2> start applying the new integrity protection configuration in the downlink at the RRC sequence number for signalling radio bearer RB2, as specified for the procedure initiating the integrity protection reconfiguration.
Reference
3GPP TS 25.331 clauses 8.1.12.3, 8.6.3.4, 8.6.3.5.
8.1.7.1b.3 Test purpose
To confirm that the UE modifies an integrity protection configuration and applies new keys on reception of a correct SECURITY MODE COMMAND message.
To confirm that the UE modifies a ciphering configuration in the uplink and downlink and applies new keys according to transmitted activation times. Also confirms that the UE accepts a new ciphering configuration for a RB when ciphering is started for SRBs.
To confirm that after the UE receives a SECURITY MODE COMMAND message, it transmits a SECURITY MODE COMPLETE message to the UTRAN using the old ciphering configuration and new integrity protection configuration.
To confirm that UE send SECURITY MODE FAILURE message when SS transmits a SECURITY MODE COMMAND message with a non comprehended critical extension.
To confirm that the UE sends a SECURITY MODE FAILURE message when UE receives an invalid SECURITY MODE COMMAND message.
8.1.7.1b.4 Method of test
Initial Condition
System Simulator: 1 cell.
UE: PS-DCCH+DTCH_DCH (state 6-10) as specified in clause 7.4 of TS 34.108.
Test Procedure
The UE is in CELL_DCH state with integrity protection and ciphering started for SRBs. The SS initiates an Authentication and Ciphering procedure, which will result in the generation of a new security keyset (CK/IK).
The SS transmits a SECURITY MODE COMMAND message which contains an unexpected critical message extension. The UE shall respond by sending SECURITY MODE FAILURE message on the DCCH.
Then SS transmits a SECURITY MODE COMMAND message with IEs "Ciphering mode info" and "Integrity protection mode info both omitted". Again the UE shall not trigger any ciphering algorithm and it shall respond by sending SECURITY MODE FAILURE message on the DCCH.
Next, the SS transmits a valid SECURITY MODE COMMAND message which includes the correct downlink activation times and "Integrity check info" IE. The UE shall check the integrity check info and shall start to configure ciphering in downlink according to the SECURITY MODE COMMAND message.
Then UE shall transmit a SECURITY MODE COMPLETE message which contains uplink activation times and also the correct "Integrity check info" IE using the new integrity protection configuration. SS records the uplink ciphering activation time for RB 2.
Next, the SS transmits UE CAPABILITY ENQUIRY message repeatedly on the downlink DCCH using RLC-AM mode. The UE shall respond to each downlink message with a UE CAPABILITY INFORMATION message on the uplink DCCH using RLC-AM. SS shall send UE CAPABILITY INFORMATION CONFIRM messages to the UE for each received UE CAPABILITY INFORMATION message from the UE.
This cycle repeats itself until both the uplink and downlink ciphering activation time for RB 2 has elapsed. SS checks all uplink UE CAPABILITY INFORMATION messages are integrity-protected by UIA algorithm, and that the messages contain the correct values for "Integrity check info" IE. This can be verified in the SS through the reception of a correctly ciphered and integrity-protected UE CAPABILITY INFORMATION message.
Expected sequence
Step |
Direction |
Message |
Comment |
|
UE |
SS |
|||
1 |
RRC connected state on DCH_state. |
|||
1a |
|
AUTHENTICATION AND CIPHERING REQUEST |
GMM message which will result in the generation of a new security keyset |
|
1b |
|
AUTHENTICATION AND CIPHERING RESPONSE |
GMM |
|
2 |
|
SECURITY MODE COMMAND |
See message content. |
|
3 |
|
SECURITY MODE FAILURE |
IE "Failure Cause" shall be set to "Protocol Error" and IE "Protocol Error Information" shall be set to "Message extension not comprehended". |
|
4 |
|
SECURITY MODE COMMAND |
See message content. |
|
5 |
|
SECURITY MODE FAILURE |
IE "Failure Cause" shall be set to "invalid configuration". |
|
6 |
|
SECURITY MODE COMMAND |
See specific message contents. |
|
7 |
|
SECURITY MODE COMPLETE |
SS verifies that this message is sent using the old ciphering configuration and with the new integrity protection configuration. SS records the uplink ciphering activation time for RB 2. |
|
8 |
|
UE CAPABILITY ENQUIRY |
SS repeats step 8, 9 and 10 until its internal uplink and downlink RLC SN have both surpassed the uplink and downlink ciphering activation time specified for RB2. This message is sent on the downlink DCCH using RLC-AM. |
|
9 |
|
UE CAPABILITY INFORMATION |
UE shall send this message on the uplink DCCH using RLC-AM. SS verifies that the last UE CAPABILITY INFORMATION message is both integrity-protected and ciphered correctly. |
|
10 |
|
UE CAPABILITY INFORMATION CONFIRM |
Specific Message Contents
SECURITY MODE COMMAND (Step 2)
Information Element |
Value/remark |
RRC transaction identifier |
0 |
Integrity check info |
|
Message authentication code |
Calculated result in SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
RRC Message sequence number |
Next RRC SN |
Critical extensions |
’FF’H |
SECURITY MODE FAILURE (Step 3)
Message content is the same as found in Clause 9 of TS 34.108, with the exception of the following IEs:
Information Element |
Value/remark |
Failure cause |
|
Failure cause |
Protocol error |
Protocol error information |
|
Protocol error cause |
Message extension not comprehended |
SECURITY MODE COMMAND (Step 4)
Use the same message content as found in clause 9 of TS 34.108, with the following exceptions:
Information Element |
Value/remark |
Integrity check info |
|
Message authentication code |
Calculated result in SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
RRC Message sequence number |
Next RRC SN |
Security Capability |
Same as originally sent by UE (and stored in SS) |
Ciphering mode info |
Not Present |
Integrity protection mode info |
Not Present |
CN domain identity |
PS Domain |
SECURITY MODE FAILURE (Step 5)
Message content is the same as found in Clause 9 of TS 34.108, with the exception of the following IEs:
Information Element |
Value/remark |
Failure cause |
|
Failure cause |
Invalid configuration |
SECURITY MODE COMMAND (Step 6 )
Information Element |
Condition |
Value/remark |
RRC transaction identifier |
A1, A2 |
0 |
Integrity check info |
||
Message authentication code |
Calculated result in SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
|
RRC Message sequence number |
Next RRC SN |
|
Security Capability |
Same as originally sent by UE (and stored in SS) |
|
Ciphering mode info |
||
Ciphering mode command |
Start/restart |
|
Ciphering algorithm |
UEA1 |
|
Activation time for DPCH |
Not Present |
|
Radio bearer downlink ciphering activation time info |
||
RB Identity |
1 |
|
RLC sequence number |
Current RLC SN |
|
RB Identity |
2 |
|
RLC sequence number |
Current RLC SN + 2 |
|
RB Identity |
3 |
|
RLC sequence number |
Current RLC SN |
|
RB Identity |
4 |
|
RLC sequence number |
Current RLC SN |
|
RB Identity |
20 |
|
RLC sequence number |
Current RLC SN |
|
Integrity protection mode info |
||
Integrity protection mode command |
Modify |
|
Downlink integrity protection activation info |
||
Current RRC SN for SRB0 |
||
Current RRC SN for SRB1 |
||
0 |
||
Current RRC SN for SRB3 |
||
Current RRC SN for SRB4 |
||
Integrity protection algorithm |
UIA1 |
|
CN domain identity |
PS Domain |
|
UE system specific security capability |
A1 |
Not Present |
UE system specific security capability |
A2 |
|
– Inter-RAT UE security capability |
||
– CHOICE system |
GSM |
|
– GSM security capability |
The indicated algorithms must be the same as the algorithms supported by the UE as indicated in the IE " UE system specific capability " in the RRC CONNECTION SETUP COMPLETE message. |
Condition |
Explanation |
A1 |
UE not supporting GSM |
A2 |
UE supporting GSM |
NOTE: "Current RLC SN" is defined as the value of VT(S) in the SS at the time when the SECURITY MODE COMMAND is submitted to RLC for transmission, that is, the RLC send sequence number of the next transmitted RLC PDU on the particular radio bearer. "Current RRC SN" is defined as the RRC message sequence number of the next transmitted RRC message on the particular radio bearer.
SECURITY MODE COMPLETE (Step 7)
Information Element |
Value/remark |
RRC transaction identifier |
0 |
Integrity check info |
|
– Message Authentication code |
This IE is checked to see if it is present. The value is compared against the XMAC-I value computed by SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
– RRC Message sequence number |
This IE is checked to see if it is present. The value is used by SS to compute the XMAC-I value. |
Uplink integrity protection activation info |
|
– RRC message sequence number list |
|
-RRC message sequence number |
Check to see if the RRC SN for RB 0 is present |
-RRC message sequence number |
Check to see if the RRC SN for RB 1 is present |
-RRC message sequence number |
Check to see if the RRC SN for RB 2 is present |
-RRC message sequence number |
Check to see if the RRC SN for RB 3 is present |
-RRC message sequence number |
Check to see if the RRC SN for RB 4 is present |
Radio bearer uplink ciphering activation time info |
|
– Radio bearer activation time |
|
– RB Identity |
1 |
– RLC sequence number |
Check to see if the RLC SN for RB1is present |
– RB Identity |
2 |
– RLC sequence number |
SS records this value. See step 8 in ‘expected sequence’ |
– RB Identity |
3 |
– RLC sequence number |
Check to see if the RLC SN for RB3 is present |
– RB Identity |
4 |
– RLC sequence number |
Check to see if the RLC SN for RB4 is present |
– RB Identity |
20 |
– RLC sequence number |
Check to see if the RLC SN for RB20 is present |
8.1.7.1b.5 Test requirement
After step 2 the UE shall transmit a SECURITY MODE FAILURE message to report the protocol error detected in the first SECURITY MODE COMMAND message.
After step 4 the UE shall transmit a SECURITY MODE FAILURE message to report on the invalid configuration detected in the second SECURITY MODE COMMAND message.
At step 7 SS checks that the SECURITY MODE COMPLETE message is received ciphered using the old configuration and that the calculated "integrity check info" IE is correct according to the new integrity protection configuration (new key and HFN set to zero).
After step 7 SS verifies that all uplink signalling messages on RB2 are integrity protected with the new integrity protection configuration.
After uplink ciphering activation time has elapsed, SS verifies that the UE CAPABILITY INFORMATION message received is ciphered with the new ciphering configuration as indicated in the SECURITY MODE COMMAND (Step 6) message.
After downlink ciphering activation time has elapsed, SS shall apply ciphering to all downlink messages using the new ciphering configuration. At least one more cycle between step 8 and step 10 shall be repeated correctly after activation time on both directions has elapsed and the messages on both directions shall be ciphered and integrity protected.
8.1.7.1c Security mode control in CELL_DCH state (CN Domain switch and new keys at RRC message sequence number wrap around)
8.1.7.1c.1 Definition
8.1.7.1c.2 Conformance requirement
Upon reception of the SECURITY MODE COMMAND message, the UE shall:
…
2> set the variable LATEST_CONFIGURED_CN_DOMAIN equal to the IE "CN domain identity";
2> set the IE "Status" in the variable SECURITY_MODIFICATION for the CN domain indicated in the IE "CN domain identity" in the received SECURITY MODE COMMAND to the value "Affected";
…
If a new security key set (new ciphering and integrity protection keys) has been received from the upper layers [40] for the CN domain as indicated in the variable LATEST_CONFIGURED_CN_DOMAIN, the UE shall:
1> set the START value for the CN domain indicated in the variable LATEST_CONFIGURED_CN_DOMAIN to zero;
1> if the SECURITY MODE COMMAND message contained the IE "Integrity protection mode info":
2> for integrity protection in the downlink on each signalling radio bearer except RB2:
3> if IE "Integrity protection mode command" has the value "start":
…
3> else:
4> for the first message for which the RRC sequence number in a received RRC message for this signalling radio bearer is equal to or greater than the activation time as indicated in IE "Downlink integrity protection activation info" as included in the IE "Integrity protection mode info":
5> start using the new integrity key;
5> for this signalling radio bearer:
6> set the IE "Downlink RRC HFN" in the variable INTEGRITY_PROTECTION_INFO of the downlink COUNT-I to zero.
2> for integrity protection in the uplink on each signalling radio bearer except RB2:
3> for the first message for which the RRC sequence number in a to be transmitted RRC message for this signalling radio bearer is equal to the activation time as indicated in IE "Uplink integrity protection activation info" included in the transmitted SECURITY MODE COMPLETE message:
4> start using the new integrity key;
4> for this signalling radio bearer:
5> set the IE "Uplink RRC HFN" in the variable INTEGRITY_PROTECTION_INFO of the uplink COUNT-I to zero.
2> for integrity protection in the downlink on signalling radio bearer RB2:
3> at the received SECURITY MODECOMMAND:
4> start using the new integrity key;
4> set the IE "Downlink RRC HFN" in the variable INTEGRITY_PROTECTION_INFO of the downlink COUNT-I to zero.
2> for integrity protection in the uplink on signalling radio bearer RB2 :
3> at the transmitted SECURITY MODE COMPLETE:
4> start using the new integrity key;
4> set the IE "Uplink RRC HFN" in the variable INTEGRITY_PROTECTION_INFO of the uplink COUNT-I to zero.
1> if the SECURITY MODE COMMAND message contained the IE "Ciphering mode info":
2> for each signalling radio bearer and for each radio bearer for the CN domain indicated in the variable LATEST_CONFIGURED_CN_DOMAIN:
3> if the IE "Status" in the variable CIPHERING_STATUS has the value "Started" for this CN domain, then for ciphering on radio bearers using RLC-TM:
4> at the CFN as indicated in the IE "Ciphering activation time for DPCH" in the IE "Ciphering mode info":
5> start using the new key in uplink and downlink;
5> set the HFN component of the COUNT-C to zero.
3> if the IE "Status" in the variable CIPHERING_STATUS has the value "Started" for this CN domain, then for ciphering on radio bearers and signalling radio bearers using RLC-AM and RLC-UM:
4> in the downlink, at the RLC sequence number indicated in IE "Radio bearer downlink ciphering activation time info" in the IE "Ciphering mode info":
5> start using the new key;
5> set the HFN component of the downlink COUNT-C to zero.
4> in the uplink, at the RLC sequence number indicated in IE "Radio bearer uplink ciphering activation time info":
5> start using the new key;
5> set the HFN component of the uplink COUNT-C to zero.
1> consider the value of the latest transmitted START value to be zero.
…
If the IE "Ciphering mode info" is present and if the IE "Reconfiguration" in the variable CIPHERING_STATUS is set to FALSE, the UE shall:
1> apply the new ciphering configuration in the lower layers for all RBs that belong to a CN domain for which the IE "Status" of the variable SECURITY_MODIFICATION is set to "Affected" and all signalling radio bearers:
2> using the ciphering algorithm (UEA [40]) indicated by the IE "Ciphering algorithm" as part of the new ciphering configuration;
2> for each radio bearer that belongs to a CN domain for which the IE "Status" of the variable SECURITY_MODIFICATION is set to "Affected" and all signalling radio bearers:
3> using the value of the IE "RB identity" in the variable ESTABLISHED_RABS minus one as the value of BEARER [40] in the ciphering algorithm.
…
If the IE "Integrity protection mode info" is present and if the IE "Reconfiguration" in the variable INTEGRITY_PROTECTION_INFO is set to FALSE, the UE shall:
1> set the IE "Reconfiguration" in the variable INTEGRITY_PROTECTION_INFO to TRUE;
1> if IE "Integrity protection mode command" has the value "modify" and the IE "Status" in the variable INTEGRITY_PROTECTION_INFO has the value "Started" and this IE was included in SECURITY MODE COMMAND:
…
2> start applying the new integrity protection configuration in the downlink at the RRC sequence number, for each signalling radio bearer n, indicated by the entry for signalling radio bearer n in the "RRC message sequence number list" in the IE "Downlink integrity protection activation info", included in the IE "Integrity protection mode info";
2> set the content of the variable INTEGRITY_PROTECTION_ACTIVATION_INFO according to the following:
…
2> start applying the new integrity protection configuration in the uplink at the RRC sequence number, for each RBn, except for signalling radio bearer RB2, indicated by the entry for signalling radio bearer n in the "RRC message sequence number list" in the IE "Uplink integrity protection activation info", included in the variable INTEGRITY_PROTECTION_ACTIVATION_INFO;
2> start applying the new integrity protection configuration in the uplink at the RRC sequence number for signalling radio bearer RB2, as specified for the procedure initiating the integrity protection reconfiguration;
2> start applying the new integrity protection configuration in the downlink at the RRC sequence number, for each RBn, except for signalling radio bearer RB2, indicated by the entry for signalling radio bearer n in the "RRC message sequence number list" in the IE "Downlink integrity protection activation info";
2> start applying the new integrity protection configuration in the downlink at the RRC sequence number for signalling radio bearer RB2, as specified for the procedure initiating the integrity protection reconfiguration.
Reference
3GPP TS 25.331 clauses 8.1.12.3, 8.6.3.4, 8.6.3.5.
8.1.7.1c.3 Test purpose
To verify that the UE correctly modifies the integrity protection and ciphering configuration with a newly generated PS domain keyset for when previously using the CS domain keyset.
To verify that the UE can handle change of integrity protection key when the RRC message sequence number wraps around when the SECURITY MODE COMMAND is received.
8.1.7.1c.4 Method of test
Initial Condition
System Simulator: 1 cell.
UE: has entered PS+CS-DCCH+DTCH_DCH (state 6-14) using procedure P24 as specified in clause 7.4 of TS 34.108.
Test Procedure
The UE is in CELL_DCH state.
The SS transmits UE CAPABILITY ENQUIRY message repeatedly on the downlink DCCH using RLC-UM mode on SRB1. The UE shall respond to each downlink message with a UE CAPABILITY INFORMATION message on the uplink DCCH using RLC-AM. SS then sends UE CAPABILITY INFORMATION CONFIRM message to the UE using RLC-AM. This procedure is repeated until the RRC message sequence number for SRB 2 in downlink equals 15.
The SS initiates an Authentication procedure, which will result in the generation of a new security keyset (CK/IK). The SS transmits a valid SECURITY MODE COMMAND message which includes the correct downlink activation times and "Integrity check info" IE.
Then the UE shall check the integrity check info and shall start to configure ciphering in downlink according to the first valid SECURITY MODE COMMAND message. The UE shall transmit a SECURITY MODE COMPLETE message which contains the correct uplink activation times and also "Integrity check info" IE using the new integrity protection configuration.
The SS records the uplink ciphering activation time for RB 2.
Next, the SS transmits UE CAPABILITY ENQUIRY message repeatedly on the downlink DCCH using RLC-AM mode. The UE shall respond to each downlink message with a UE CAPABILITY INFORMATION message on the uplink DCCH using RLC-AM. SS then send UE CAPABILITY INFORMATION CONFIRM message to the UE. This cycle repeats itself until both the uplink and downlink ciphering activation time for RB 2 has elapsed. SS checks all uplink UE CAPABILITY INFORMATION messages are integrity-protected by UIA algorithm, and that the messages contain the correct values for "Integrity check info" IE. This can be verified in the SS through the reception of a correctly ciphered and integrity-protected UE CAPABILITY INFORMATION message.
The SS transmits UE CAPABILITY ENQUIRY message on the downlink DCCH using RLC-UM mode on SRB1. The UE shall respond to this message with a UE CAPABILITY INFORMATION message on the uplink DCCH using RLC-AM. SS then send UE CAPABILITY INFORMATION CONFIRM message to the UE.
Expected sequence
Step |
Direction |
Message |
Comment |
|
UE |
SS |
|||
1 |
The UE is in CELL_DCH state. |
|||
2 |
|
UE CAPABILITY ENQUIRY |
The SS repeats step 2, 3 and 4 until its internal downlink RRC message sequence number for RB 2 has the value 15. |
|
3 |
|
UE CAPABILITY INFORMATION |
The UE shall send this message on the uplink DCCH using RLC-AM. SS verifies that the last UE CAPABILITY INFORMATION message is both integrity-protected and ciphered correctly. |
|
4 |
|
UE CAPABILITY INFORMATION CONFIRM |
||
5 |
|
AUTHENTICATION and CIPHERING REQUEST |
GMM message which will result in the generation of a new security keyset |
|
6 |
|
AUTHENTICATION AND CIPHERING RESPONSE |
GMM |
|
7 |
|
SECURITY MODE COMMAND |
See specific message contents. |
|
8 |
|
SECURITY MODE COMPLETE |
The SS verifies that this message is sent using the old ciphering configuration. SS records the uplink ciphering activation time for RB 2. |
|
9 |
|
UE CAPABILITY ENQUIRY |
The SS repeats step 9, 10 and 11 until its internal uplink and downlink RLC SN have both surpassed the uplink and downlink ciphering activation time specified for RB2. This message is sent on the downlink DCCH using RLC-AM. |
|
10 |
|
UE CAPABILITY INFORMATION |
The UE shall send this message on the uplink DCCH using RLC-AM. SS verifies that the last UE CAPABILITY INFORMATION message is both integrity-protected and ciphered correctly. |
|
11 |
|
UE CAPABILITY INFORMATION CONFIRM |
||
12 |
|
UE CAPABILITY ENQUIRY |
The SS sends this message with the downlink RRC message sequence number for SRB 1 with the value 0. |
|
13 |
|
UE CAPABILITY INFORMATION |
The UE shall send this message on the uplink DCCH using RLC-AM. SS verifies that the last UE CAPABILITY INFORMATION message is both integrity-protected and ciphered correctly. |
|
14 |
|
UE CAPABILITY INFORMATION CONFIRM |
Specific Message Contents
SECURITY MODE COMMAND (Step 7)
Use the same message content as found in clause 9 of TS 34.108, with the following exceptions:
Information Element |
Value/remark |
RRC transaction identifier |
0 |
Integrity check info |
|
Message authentication code |
Calculated result in SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
RRC Message sequence number |
Next RRC SN |
Security Capability |
Same as originally sent by UE (and stored in SS) |
Ciphering mode info |
|
Ciphering mode command |
Start/restart |
Ciphering algorithm |
UEA1 |
Radio bearer downlink ciphering activation time info |
|
RB Identity |
1 |
RLC sequence number |
Current RLC SN |
RB Identity |
2 |
RLC sequence number |
Current RLC SN + 2 |
RB Identity |
3 |
RLC sequence number |
Current RLC SN |
RB Identity |
4 |
RLC sequence number |
Current RLC SN |
RB Identity |
20 |
RLC sequence number |
Current RLC SN |
Integrity protection mode info |
|
Integrity protection mode command |
Modify |
Downlink integrity protection activation info |
|
Current RRC SN for SRB0 |
|
Current RRC SN for SRB1 |
|
0 |
|
Current RRC SN for SRB3 |
|
Current RRC SN for SRB4 |
|
Integrity protection algorithm |
UIA1 |
CN domain identity |
PS Domain |
NOTE: "Current RLC SN" is defined as the value of VT(S) in the SS at the time when the SECURITY MODE COMMAND is submitted to RLC for transmission, that is, the RLC send sequence number of the next transmitted RLC PDU on the particular radio bearer. "Current RRC SN" is defined as the RRC message sequence number of the next transmitted RRC message on the particular radio bearer.
SECURITY MODE COMPLETE (Step 8)
Use the same message content as found in clause 9 of TS 34.108, with the following exceptions:
Information Element |
Value/remark |
RRC transaction identifier |
0 |
Integrity check info |
|
– Message Authentication code |
This IE is checked to see if it is present. The value is compared against the XMAC-I value computed by SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
– RRC Message sequence number |
This IE is checked to see if it is present. The value is compared against the XMAC-I value computed by SS. |
Uplink integrity protection activation info |
|
– RRC message sequence number list |
Check to see if the RRC SN for RB 0 to RB 4 are present |
-RRC message sequence number |
Check to see if the RRC SN for RB 0 is present |
-RRC message sequence number |
Check to see if the RRC SN for RB 1 is present |
-RRC message sequence number |
Check to see if the RRC SN for RB 2 is present |
-RRC message sequence number |
Check to see if the RRC SN for RB 3 is present |
-RRC message sequence number |
Check to see if the RRC SN for RB 4 is present |
Radio bearer uplink ciphering activation time info |
|
– Radio bearer activation time |
|
– RB Identity |
1 |
– RLC sequence number |
Check to see if the RLC SN for RB1 is present |
– RB Identity |
2 |
– RLC sequence number |
SS records this value. See step 10 in ‘expected sequence’ |
– RB Identity |
3 |
– RLC sequence number |
Check to see if the RLC SN for RB3 is present |
– RB Identity |
4 |
– RLC sequence number |
Check to see if the RLC SN for RB4 is present |
– RB Identity |
20 |
– RLC sequence number |
Check to see if the RLC SN for RB20 is present |
8.1.7.1c.5 Test requirement
After step 7 the SS checks that the SECURITY MODE COMPLETE message is received ciphered using the old configuration and that the calculated "integrity check info" IE is correct.
After step 8 SS verifies that all uplink signalling messages on RB2 are integrity protected with UIA1 algorithm.
After uplink ciphering activation time has lapsed, SS verifies that the UE CAPABILITY INFORMATION message received is integrity protected with UIA algorithm and ciphered with the new ciphering configuration and algorithm indicated in the SECURITY MODE COMMAND (Step 7) message.
After downlink ciphering activation time has lapsed, SS shall apply ciphering to all downlink messages using the new configuration. At least one more cycle between step 9 and step 11 shall be repeated correctly after activation time on both directions has lapsed and the messages on both directions shall be ciphered and integrity protected..
8.1.7.1d Security mode control in CELL_DCH state interrupted by a cell update
8.1.7.1d.1 Definition
8.1.7.1d.2 Conformance requirement
If:
– a cell update procedure according to subclause 8.3.1 is initiated; and
– the received SECURITY MODE COMMAND message causes either,
– the IE "Reconfiguration" in the variable CIPHERING_STATUS to be set to TRUE; and/or
– the IE "Reconfiguration" in the variable INTEGRITY_PROTECTION_INFO to be set to TRUE:
the UE shall:
1> abort the ongoing integrity and/or ciphering reconfiguration;
1> resume data transmission on any suspended radio bearer and signalling radio bearer mapped on RLC-AM or RLC-UM;
1> allow the transmission of RRC messages on all signalling radio bearers with any RRC SN;
1> when the response message has been submitted to lower layers for transmission:
2> if the SECURITY MODE COMMAND message contained the IE "Ciphering mode info":
3> set the IE "Reconfiguration" in the variable CIPHERING_STATUS to FALSE; and
3> clear the variable RB_UPLINK_CIPHERING_ACTIVATION_TIME_INFO;
2> if the SECURITY MODE COMMAND message contained the IE "Integrity protection mode info":
3> set the IE "Reconfiguration" in the variable INTEGRITY_PROTECTION_INFO to FALSE; and
3> clear the variable INTEGRITY_PROTECTION_ACTIVATION_INFO.
2> continue with any ongoing processes and procedures as if the invalid SECURITY MODE COMMAND message has not been received; and
2> clear the variable SECURITY_MODIFICATION;
2> the procedure ends.
Reference
3GPP TS 25.331 clause 8.1.12.4b,
8.1.7.1d.3 Test purpose
To confirm that the UE aborts the ongoing integrity and ciphering configuration and the security mode control procedure in case it is interrupted by a cell update procedure.
8.1.7.1d.4 Method of test
Initial Condition
System Simulator: 1 cell.
SYSTEM INFORMATION BLOCK TYPE 1 (see specific message contents).
UE: PS-DCCH+DTCH_DCH (state 6-10) as specified in clause 7.4 of TS 34.108.
The RRC CONNECTION SETUP message used in the initial setup should be as shown under Specific Message Contents below.
Test Procedure
The UE is in CELL_DCH state. The SS initiates an Authentication and Ciphering procedure, which will result in the generation of a new security keyset (CK/IK).
The SS transmits a valid SECURITY MODE COMMAND message which includes the correct downlink activation times and "Integrity check info" IE..
Then SS turns off the power in the cell after the UE has received the Security Mode Command , but before the UE could complete this security procedure to change over to the new security configuration. The UE will initiate the cell reselection procedure.
The UE shall then abort the Security procedure and is expected to continue to use the old security configuration..
Then after 6 seconds the power is turned on in the cell again.
The UE sends a CELL UPDATE message which includes the value "Radio link failure" set in IE "Cell update cause". The SS verifies that this message is integrity-protected correctly with the old security configuration. The SS shall transmit a CELL UPDATE CONFIRM message which includes "Physical channel information elements", on downlink DCCH after receiving CELL UPDATE message. The UE transmits a PHYSICAL CHANNEL RECONFIGURATION COMPLETE message on the uplink DCCH using RLC-AM. SS verifies that this message is both integrity-protected and ciphered correctly with the old security configuration.
Next, the SS transmits UE CAPABILITY ENQUIRY message on the downlink DCCH using RLC-AM mode. The UE shall respond to with a UE CAPABILITY INFORMATION message on the uplink DCCH using RLC-AM using the same old integrity and ciphering configuration as used before the SECURITY MODE COMMAND was received.
Expected sequence
Step |
Direction |
Message |
Comment |
|
UE |
SS |
|||
1 |
The UE is in CELL_DCH state. |
|||
2 |
|
AUTHENTICATION AND CIPHERING REQUEST |
GMM message which will result in the generation of a new security keyset |
|
3 |
|
AUTHENTICATION AND CIPHERING RESPONSE |
GMM |
|
4 |
|
SECURITY MODE COMMAND |
See specific message contents. |
|
5 |
SS turns off power in the cell after the UE has received the Security Mode Command , but before the UE could complete this security procedure to change over to the new security configuration. |
|||
6 |
The UE starts cell reselection |
|||
7 |
After waiting for 6 seconds, the SS turns on power in the cell. |
|||
8 |
|
CELL UPDATE |
This message includes the value "Radio link failure" set in IE "Cell update cause". The SS verifies that message is integrity-protected correctly with the old security configuration |
|
9 |
|
CELL UPDATE CONFIRM |
This message includes "Physical channel information elements". |
|
10 |
|
PHYSICAL CHANNEL RECONFIGURATION COMPLETE |
The UE shall send this message on the uplink DCCH using RLC-AM. SS verifies that message is both integrity-protected and ciphered correctly with the old security configuration |
|
11 |
|
UE CAPABILITY ENQUIRY |
The SS repeats step 11, 12 and 13 until its internal uplink and downlink RLC SN have both surpassed the uplink and downlink ciphering activation time specified for RB2. This message is sent on the downlink DCCH using RLC-AM. |
|
12 |
|
UE CAPABILITY INFORMATION |
The UE shall send this message on the uplink DCCH using RLC-AM. SS verifies that the last UE CAPABILITY INFORMATION message is both integrity-protected and ciphered correctly. |
|
13 |
|
UE CAPABILITY INFORMATION CONFIRM |
Specific Message Contents
RRC CONNECTION SETUP (message used in the initial setup)
Use the same message type and contents as found in clause 9 of TS 34.108 with the following exception:
Signalling RB information to setup |
(AM DCCH for RRC) |
– RB identity |
Not Present |
– CHOICE RLC info type |
|
– RLC info |
|
– CHOICE Uplink RLC mode |
AM RLC |
– Transmission RLC discard |
|
– SDU discard mode |
No discard |
– MAX_DAT |
15 |
– Transmission window size |
32 |
– Timer_RST |
500 |
– Max_RST |
1 |
– Polling info |
|
– Timer_poll_prohibit |
200 |
– Timer_poll |
OMIT |
– Poll_PDU |
Not Present |
– Poll_SDU |
1 |
– Last transmission PDU poll |
TRUE |
– Last retransmission PDU poll |
TRUE |
– Poll_Window |
99 |
– Timer_poll_periodic |
Not Present |
System Information Block type 1 (FDD)
Use the default system information block with the same type specified in clause 6.1 of TS 34.108, with the following exceptions:
Information Element |
Value/remark |
– UE Timers and constants in connected mode |
|
– T312 |
2 |
SECURITY MODE COMMAND (Step 4 )
Use the same message content as found in clause 9 of TS 34.108, with the following exceptions:
Information Element |
Value/remark |
Integrity check info |
|
Message authentication code |
Calculated result in SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
RRC Message sequence number |
Next RRC SN |
Security Capability |
Same as originally sent by UE (and stored in SS) |
Ciphering mode info |
|
Ciphering mode command |
Start/restart |
Ciphering algorithm |
UEA1 |
Activation time for DPCH |
Not Present |
Radio bearer downlink ciphering activation time info |
|
RB Identity |
1 |
RLC sequence number |
Current RLC SN |
RB Identity |
2 |
RLC sequence number |
Current RLC SN + 2 |
RB Identity |
3 |
RLC sequence number |
Current RLC SN |
RB Identity |
4 |
RLC sequence number |
Current RLC SN |
RB Identity |
20 |
RLC sequence number |
Current RLC SN |
Integrity protection mode info |
|
Integrity protection mode command |
Modify |
Downlink integrity protection activation info |
|
Current RRC SN for SRB0 |
|
Current RRC SN for SRB1 |
|
Current RRC SN for SRB2 |
|
Current RRC SN for SRB3 |
|
Current RRC SN for SRB4 |
|
Integrity protection algorithm |
UIA1 |
CN domain identity |
PS Domain |
NOTE: "Current RLC SN" is defined as the value of VT(S) in the SS at the time when the SECURITY MODE COMMAND is submitted to RLC for transmission, that is, the RLC send sequence number of the next transmitted RLC PDU on the particular radio bearer. "Current RRC SN" is defined as the RRC message sequence number of the next transmitted RRC message on the particular radio bearer.
CELL UPDATE (Step 8)
The contents of CELL UPDATE message are identical as "Contents of CELL UPDATE message" as found in clause 9 of TS 34.108 Annex A with the following exceptions:
Information Element |
Value/remark |
U-RNTI |
|
– SRNC Identity |
Check to see if set to ‘0000 0000 0001’ |
– S-RNTI |
Check to see if set to ‘0000 0000 0000 0000 0000 0001’ |
Cell Update Cause |
"Radio link failure" |
CELL UPDATE CONFIRM (Step 9) (FDD)
The contents of CELL UPDATE CONFIRM message is identical as "CELL UPDATE CONFIRM message" as found in Annex A with the following exceptions:
Information Element |
Value/remark |
U-RNTI |
Same as CELL UPDATE message in step 8 |
RRC State indicator |
CELL_DCH |
CHOICE channel requirement |
Uplink DPCH info |
-UplinkDPCH Info |
Same as RADIO BEARER SETUP message used to move to initial condition |
Downlink information common for all radio links |
Same as RADIO BEARER SETUP message used to move to initial condition |
Downlink information for each radio links |
Same as RADIO BEARER SETUP message used to move to initial condition |
CELL UPDATE CONFIRM (Step 9) (TDD)
The contents of CELL UPDATE CONFIRM message is identical as "CELL UPDATE CONFIRM message" as found in clause 9 of TS 34.108 Annex A with the following exceptions:
Information Element |
Value/remark |
U-RNTI |
Same as CELL UPDATE message in step 8 |
RRC State indicator |
CELL_DCH |
UplinkDPCH timeslots and codes |
Same as RADIO BEARER SETUP message used to move to initial condition |
Downlink information for each radio links |
Same as RADIO BEARER SETUP message used to move to initial condition |
8.1.7.1d.5 Test requirement
After uplink ciphering activation time has lapsed, SS verifies that the UE CAPABILITY INFORMATION message received at step 12 is integrity protected with UIA algorithm and ciphered with the old ciphering configuration and algorithm and not the one indicated in the SECURITY MODE COMMAND (Step 4) message.
8.1.7.2 Security mode command in CELL_FACH state
8.1.7.2.1 Definition
8.1.7.2.2 Conformance requirement
1. This procedure is used to trigger the start of ciphering, or to command the restart of ciphering with the new ciphering configuration for the signalling radio bearers and any radio bearers of a particular CN Domain. It is also used to start integrity protection or modify integrity protection configuration for signalling radio bearers.
2. When the UE receives a SECURITY MODE COMMAND message from the UTRAN, which indicates the downlink activation time for each effected SRB and RB, and new ciphering mode configuration, the UE shall apply the old ciphering configuration, for a particular SRB or RB, before the stated downlink activation time. It shall start to decipher using the new ciphering configuration at the downlink activation time.
3. The UE shall transmit SECURITY MODE COMPLETE message using the new integrity protection configuration stated in the received SECURITY MODE COMMAND message. The SECURITY MODE COMPLETE message shall include the ciphering uplink activation time. The UE shall start to apply the new ciphering configuration on the uplink direction, after the uplink activation time has elapsed respectively for each SRB or RB.
Reference
3GPP TS 25.331 clauses 8.1.12, 8.6.3.4, 8.6.3.5.
8.1.7.2.3 Test purpose
To confirm that after the UE receives a SECURITY MODE COMMAND message, it transmits a SECURITY MODE COMPLETE message to the UTRAN using the old ciphering configuration together with the application of the new integrity protection configuration. To confirm that the UE applies the old ciphering configuration in the downlink prior to the activation time; and uses the new ciphering configuration on and after the activation time. To confirm that the UE starts to cipher its uplink transmissions after the uplink activation time stated in SECURITY MODE COMPLETE message is reached. To confirm that the UE sends a SECURITY MODE FAILURE message when the UE receives an invalid SECURITY MODE COMMAND message.
8.1.7.2.4 Method of test
Initial Condition
System Simulator: 1 cell.
UE: CELL_FACH (state 6-11) as specified in clause 7.4 of TS 34.108.
Test Procedure
The UE is in CELL_FACH state. The SS initiates an Authentication and Ciphering procedure, which will result in the generation of a new security keyset (CK/IK). The SS transmits a SECURITY MODE COMMAND message which contains an unexpected critical message extension. The UE shall respond by sending SECURITY MODE FAILURE message on the DCCH. Next, SS transmits a valid SECURITY MODE COMMAND message which includes the correct downlink activation times and IE "Integrity check info". The UE shall check the integrity check info. It shall start to configure ciphering in downlink and transmit a SECURITY MODE COMPLETE message, which contains the correct uplink activation times using the new integrity protection configuration. This message shall contain the IE "Integrity check info". SS records the uplink ciphering activation time for RB 2. Next, SS transmits UE CAPABILITY ENQUIRY message repeatedly on the downlink DCCH using RLC-AM mode. The UE shall respond to each downlink message with a UE CAPABILITY INFORMATION message on the uplink DCCH using RLC-AM. SS checks all uplink messages are integrity-protected by UIA1 algorithm, and that the messages contain the correct values for "Integrity check info" IE by sending a UE CAPABILITY INFORMATION CONFIRM. This cycle repeats itself until both the uplink and downlink ciphering activation time for RB 2 have elapsed. After both the uplink and downlink ciphering activation time for RB 2 have passed, the UE shall be able to communicate with the SS using the new ciphering configurations. This can be verified in SS through the reception of a correctly ciphered and integrity-protected UE CAPABILITY INFORMATION message.
Expected sequence
Step |
Direction |
Message |
Comment |
|
UE |
SS |
|||
1 |
UE is initially in CELL_FACH state. |
|||
1a |
|
AUTHENTICATION AND CIPHERING REQUEST |
GMM message which will result in the generation of a new security keyset |
|
1b |
|
AUTHENTICATION AND CIPHERING RESPONSE |
GMM |
|
2 |
|
SECURITY MODE COMMAND |
See specific message content |
|
3 |
|
SECURITY MODE FAILURE |
IE "Failure Cause" shall be set to "Protocol Error" and IE "Protocol Error Information" shall be set to "Message extension not comprehended". |
|
4 |
Void |
|||
5 |
Void |
|||
6 |
Void |
|||
7 |
Void |
|||
8 |
|
SECURITY MODE COMMAND |
See specific message contents. |
|
9 |
|
SECURITY MODE COMPLETE |
SS verifies that this message is sent using the old ciphering configuration. SS records the uplink ciphering activation time for RB 2. |
|
10 |
|
UE CAPABILITY ENQUIRY |
SS repeats step 10, 11 and 12 until its internal uplink and downlink RLC SN have both surpassed the uplink and downlink ciphering activation time specified for RB2. This message is sent on the downlink DCCH using RLC-AM. |
|
11 |
|
UE CAPABILITY INFORMATION |
UE shall send this message on the uplink DCCH using RLC-AM. SS verifies that the last UE CAPABILITY INFORMATION message is both integrity-protected and ciphered correctly. |
|
12 |
|
UE CAPABILITY INFORMATION CONFIRM |
Specific Message Contents
SECURITY MODE COMMAND (Step 2)
Information Element |
Value/remark |
Integrity check info |
|
Message authentication code |
Calculated result in SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
RRC Message sequence number |
Next RRC SN |
Critical extensions |
’FF’H |
SECURITY MODE COMMAND (Step 8)
Information Element |
Value/remark |
RRC transaction identifier |
0 |
Integrity check info |
|
Message authentication code |
Calculated result in SS. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
RRC Message sequence number |
Next RRC SN |
Security Capability |
Same as originally sent by UE (and stored in SS) |
Ciphering mode info |
|
Ciphering mode command |
Start/restart |
Ciphering algorithm |
UEA1 |
Activation time for DPCH |
Not Present |
Radio bearer downlink ciphering activation time info |
|
RB Identity |
1 |
RLC sequence number |
Current RLC SN |
RB Identity |
2 |
RLC sequence number |
Current RLC SN + 2 |
RB Identity |
3 |
RLC sequence number |
Current RLC SN |
RB Identity |
4 |
RLC sequence number |
Current RLC SN |
RB Identity |
20 |
RLC sequence number |
Current RLC SN |
Integrity protection mode info |
|
Integrity protection mode command |
Modify |
Downlink integrity protection activation info |
|
Current RRC SN for SRB0 |
|
Current RRC SN for SRB1 |
|
Current RRC SN for SRB2 |
|
Current RRC SN for SRB3 |
|
Current RRC SN for SRB4 |
|
Integrity protection algorithm |
UIA1 |
CN domain identity |
PS Domain |
UE system specific security capability |
Not Present in condition A1 |
UE system specific security capability |
Present In condition A2 |
– Inter-RAT UE security capability |
|
– CHOICE system |
GSM |
– GSM security capability |
The indicated algorithms must be the same as the algorithms supported by the UE as indicated in the IE "UE system specific capability" in the RRC CONNECTION SETUP COMPLETE message. |
Condition |
Explanation |
A1 |
UE not supporting GSM |
A2 |
UE supporting GSM |
SECURITY MODE COMPLETE (Step 9)
Information Element |
Value/remark |
RRC transaction identifier |
0 |
Integrity check info |
|
– Message Authentication code |
Checked to see if present. The first/ leftmost bit of the bit string contains the most significant bit of the MAC-I. |
– RRC Message sequence number |
Checked to see if present |
Uplink integrity protection activation info |
|
– RRC message sequence number list |
Check to see if it the RRC SN for RB 0 to RB 4 are present |
Radio bearer uplink ciphering activation info |
|
– RB Identity other than RB2 |
Check to see if the RLC SN for RB1, 3 , 4 and 20 are present |
– RB Identity |
2 |
– RLC sequence number |
SS records this value. See step 10 in ‘expected sequence’ |
8.1.7.2.5 Test requirement
After step 2 the UE shall transmit a SECURITY MODE FAILURE message to report the protocol error detected in the first SECURITY MODE COMMAND message.
After step 8 the SS checks that the SECURITY MODE COMPLETE message is received ciphered using the old configuration and that the calculated MAC-I values in "integrity check info" IE is correct.
After step 9 SS verifies that all uplink signalling messages on RB2 are integrity protected with UIA1 algorithm.
After uplink ciphering activation time has lapsed, SS verifies that the UE CAPABILITY INFORMATION message received is integrity protected with UIA algorithm and ciphered with the new ciphering configuration and algorithm indicated in the SECURITY MODE COMMAND (Step 8) message.
After downlink ciphering activation time has lapsed, SS shall apply ciphering to all downlink messages using the new configuration. At least one more cycle between step 10 and step 12 shall be repeated correctly after activation time on both directions has lapsed and the messages on both directions shall be ciphered and integrity protected.
8.1.7.3 Security mode command in CELL_DCH state (UEA2/UIA2, CS Domain)
8.1.7.3.1 Definition
Applicable to all Rel-7 UEs which support FDD and CS domain services.
8.1.7.3.2 Conformance requirement
Same conformance requirement as clause 8.1.7.1.2.
8.1.7.3.3 Test purpose
Same test purpose as clause 8.1.7.1.3 except that ciphering algorithm used is UEA2 and integrity protection algorithm used is UIA2.
8.1.7.3.4 Method of test
Initial Condition
System Simulator: 1 cell.
UE: CELL_DCH (state 6-9) as specified in clause 7.4 of TS 34.108.
Test Procedure
Same test procedure as clause 8.1.7.1.4 except that ciphering algorithm used is UEA2 and integrity protection algorithm used is UIA2.
Expected sequence
Same expected sequence as clause 8.1.7.1.4
Specific Message Contents
Same specific message contents as clause 8.1.7.1.4 except for the following:
SECURITY MODE COMMAND (Step 6)
Information Element |
Value/remark |
Ciphering mode info |
|
Ciphering algorithm |
UEA2 |
Integrity protection mode info |
|
Integrity protection algorithm |
UIA2 |
8.1.7.3.5 Test requirement
After step 2 the UE shall transmit a SECURITY MODE FAILURE message to report the protocol error detected in the first SECURITY MODE COMMAND message.
After step 4 the UE shall transmit a SECURITY MODE FAILURE message to report on the invalid configuration detected in the second SECURITY MODE COMMAND message.
After step 8 the SS checks that the SECURITY MODE COMPLETE message is received ciphered using the old configuration and that the calculated "integrity check info" IE is correct.
After step 9 SS verifies that all uplink signalling messages on RB2 are integrity protected using UIA2 algorithm.
After uplink ciphering activation time has lapsed, SS verifies that the UE CAPABILITY INFORMATION message received is integrity protected with UIA2 algorithm and ciphered with the new ciphering configuration and algorithm UEA2 indicated in the SECURITY MODE COMMAND (Step 6) message.
After downlink ciphering activation time has lapsed, SS shall apply ciphering to all downlink messages using the new configuration using UEA2. At least one more cycle between step 10 and step 12 shall be repeated correctly after activation time on both directions has lapsed and the messages on both directions shall be ciphered using UEA2 and integrity protected using UIA2.
8.1.7.3b Security mode command in CELL_DCH state (UEA2/UIA2, PS Domain)
8.1.7.3b.1 Definition
Applicable to all Rel-7 UEs which support FDD and PS domain services.
8.1.7.3b.2 Conformance requirement
Same conformance requirement as clause 8.1.7.1b.2.
8.1.7.3b.3 Test purpose
Same test purpose as clause 8.1.7.1b.3 except that ciphering algorithm used is UEA2 and integrity protection algorithm used is UIA2.
8.1.7.3b.4 Method of test
Initial Condition
System Simulator: 1 cell.
UE: PS-DCCH+DTCH_DCH (state 6-10) as specified in clause 7.4 of TS 34.108.
Test Procedure
Same test procedure as clause 8.1.7.1b.4 except that ciphering algorithm used is UEA2 and integrity protection algorithm used is UIA2.
Expected sequence
Same expected sequence as clause 8.1.7.1b.4
Specific Message Contents
Same specific message contents as clause 8.1.7.1b.4 except for the following:
SECURITY MODE COMMAND (Step 6)
Information Element |
Value/remark |
Ciphering mode info |
|
Ciphering algorithm |
UEA2 |
Integrity protection mode info |
|
Integrity protection algorithm |
UIA2 |
8.1.7.3b.5 Test requirement
After step 2 the UE shall transmit a SECURITY MODE FAILURE message to report the protocol error detected in the first SECURITY MODE COMMAND message.
After step 4 the UE shall transmit a SECURITY MODE FAILURE message to report on the invalid configuration detected in the second SECURITY MODE COMMAND message.
At step 7 SS checks that the SECURITY MODE COMPLETE message is received ciphered using the old configuration and that the calculated "integrity check info" IE is correct according to the new integrity protection configuration (new key and HFN set to zero).
After step 7 SS verifies that all uplink signalling messages on RB2 are integrity protected with the new integrity protection configuration using UIA2.
After uplink ciphering activation time has elapsed, SS verifies that the UE CAPABILITY INFORMATION message received is ciphered with the new ciphering configuration using UEA2 as indicated in the SECURITY MODE COMMAND (Step 6) message.
After downlink ciphering activation time has elapsed, SS shall apply ciphering to all downlink messages using the new ciphering configuration using UEA2. At least one more cycle between step 8 and step 10 shall be repeated correctly after activation time on both directions has elapsed and the messages on both directions shall be ciphered using UEA2 and integrity protected using UIA2.
8.1.7.3c Security mode control in CELL_DCH state (UEA2/UIA2, CN Domain switch and new keys at RRC message sequence number wrap around)
8.1.7.3c.1 Definition
Applicable to all Rel-7 UEs which support FDD and CS domain services and PS domain services.
8.1.7.3c.2 Conformance requirement
Same conformance requirement as clause 8.1.7.1c.2.
8.1.7.3c.3 Test purpose
Same test purpose as clause 8.1.7.1c.3 except that ciphering algorithm used is UEA2 and integrity protection algorithm used is UIA2.
8.1.7.3c.4 Method of test
Initial Condition
System Simulator: 1 cell.
UE: has entered PS+CS-DCCH+DTCH_DCH (state 6-14) using procedure P24 as specified in clause 7.4 of TS 34.108, UEA2 and UIA2 are configured.
Test Procedure
Same test procedure as clause 8.1.7.1c.4 except that ciphering algorithm used is UEA2 and integrity protection algorithm used is UIA2.
Expected sequence
Same expected sequence as clause 8.1.7.1c.4
Specific Message Contents
Same specific message contents as clause 8.1.7.1c.4 except for the following:
SECURITY MODE COMMAND (Step 7)
Use the same message content as found in clause 9 of TS 34.108, with the following exceptions:
Information Element |
Value/remark |
Ciphering mode info |
|
Ciphering algorithm |
UEA2 |
Integrity protection mode info |
|
Integrity protection algorithm |
UIA2 |
8.1.7.3c.5 Test requirement
After step 7 the SS checks that the SECURITY MODE COMPLETE message is received ciphered using the old configuration and that the calculated "integrity check info" IE is correct.
After step 8 SS verifies that all uplink signalling messages on RB2 are integrity protected with UIA2 algorithm.
After uplink ciphering activation time has lapsed, SS verifies that the UE CAPABILITY INFORMATION message received is integrity protected with UIA2 algorithm and ciphered with the new ciphering configuration and algorithm UEA2 indicated in the SECURITY MODE COMMAND (Step 7) message.
After downlink ciphering activation time has lapsed, SS shall apply ciphering to all downlink messages using the new configuration using UEA2. At least one more cycle between step 9 and step 11 shall be repeated correctly after activation time on both directions has lapsed and the messages in both directions shall be ciphered using UEA2 and integrity protected using UIA2.
8.1.7.3d Security mode control in CELL_DCH state interrupted by a cell update (UEA2/UIA2)
8.1.7.3d.1 Definition
Applicable to all Rel-7 UEs which support FDD and PS domain services.
8.1.7.3d.2 Conformance requirement
Same conformance requirement as clause 8.1.7.1d.2.
8.1.7.3d.3 Test purpose
Same test purpose as clause 8.1.7.1d.3 except that ciphering algorithm used is UEA2 and integrity protection algorithm used is UIA2.
8.1.7.3d.4 Method of test
Initial Condition
System Simulator: 1 cell.
SYSTEM INFORMATION BLOCK TYPE 1 (see specific message contents).
UE: PS-DCCH+DTCH_DCH (state 6-10) as specified in clause 7.4 of TS 34.108.
The RRC CONNECTION SETUP message used in the initial setup should be as shown under Specific Message Contents in clause 8.1.7.1d.4.
Test Procedure
Same test procedure as clause 8.1.7.1d.4 except that ciphering algorithm used is UEA2 and integrity protection algorithm used is UIA2.
Expected sequence
Same expected sequence as clause 8.1.7.1d.4
Specific Message Contents
Same specific message contents as clause 8.1.7.1d.4 except for the following:
SECURITY MODE COMMAND (Step 4)
Use the same message content as found in clause 9 of TS 34.108, with the following exceptions:
Information Element |
Value/remark |
Ciphering mode info |
|
Ciphering algorithm |
UEA2 |
Integrity protection mode info |
|
Integrity protection algorithm |
UIA2 |
8.1.7.3d.5 Test requirement
After uplink ciphering activation time has lapsed, SS verifies that the UE CAPABILITY INFORMATION message received at step 12 is integrity protected with UIA2 algorithm and ciphered with the old ciphering configuration and algorithm UEA2 and not the one indicated in the SECURITY MODE COMMAND (Step 4) message.
8.1.7.4 Security mode command in CELL_FACH state (UEA2/UIA2)
8.1.7.4.1 Definition
Applicable to all Rel-7 UEs which support FDD and PS domain services.
8.1.7.4.2 Conformance requirement
Same conformance requirement as clause 8.1.7.2.2.
8.1.7.4.3 Test purpose
Same test purpose as clause 8.1.7.2.3.
8.1.7.4.4 Method of test
Initial Condition
System Simulator: 1 cell.
UE: CELL_FACH (state 6-11) as specified in clause 7.4 of TS 34.108.
Test Procedure
Same test procedure as clause 8.1.7.2.4 except that ciphering algorithm used is UEA2 and integrity protection algorithm used is UIA2.
Expected sequence
Same expected sequence as clause 8.1.7.2.4
Specific Message Contents
Same specific message contents as clause 8.1.7.2.4 except for the following:
SECURITY MODE COMMAND (Step 8)
Information Element |
Value/remark |
Ciphering mode info |
|
Ciphering algorithm |
UEA2 |
Integrity protection mode info |
|
Integrity protection algorithm |
UIA2 |
8.1.7.4.5 Test requirement
After step 2 the UE shall transmit a SECURITY MODE FAILURE message to report the protocol error detected in the first SECURITY MODE COMMAND message.
After step 8 the SS checks that the SECURITY MODE COMPLETE message is received ciphered using the old configuration and that the calculated MAC-I values in "integrity check info" IE is correct.
After step 9 SS verifies that all uplink signalling messages on RB2 are integrity protected with UIA2 algorithm.
After uplink ciphering activation time has lapsed, SS verifies that the UE CAPABILITY INFORMATION message received is integrity protected with UIA2 algorithm and ciphered with the new ciphering configuration and algorithm using UEA2 indicated in the SECURITY MODE COMMAND (Step 8) message.
After downlink ciphering activation time has lapsed, SS shall apply ciphering using UEA2 to all downlink messages using the new configuration. At least one more cycle between step 10 and step 12 shall be repeated correctly after activation time on both directions has lapsed and the messages on both directions shall be ciphered using UEA2 and integrity protected using UIA2.