8.5 Security in testing

34.123-33GPPPart 3: Abstract test suite (ATS)TSUser Equipment (UE) conformance specification

The security functions at the SS side are implemented in RLC and MAC layers. When the AM or UM RLC entities and a MAC(d) entity are created, the TTCN will download a security context for each CN domain used. The two ASPs CMAC_SecurityMode_Config_REQ and CRLC_SecurityMode_Config_REQ configure the SS security contexts and associate the contexts to the created entities. The SS shall support one activate security contexts and one context pending activation for each CN domain.

A security context at the SS consists of the security parameter START, 20 bits long and a pair of integrity key and a ciphering key, each 128 bits long. All these security parameters belong to a CS or a PS domain. The SS shall have the ability to store these values till the new values are downloaded and activated. STARTcs is used for initialization of all counters-C and counters-I (32 bits long each) of all DL and UL radio bearers for ciphering and integrity protection in the CS domain. The same is for STARTps in the PS domain. The TTCN downloads the new START value whenever it is received from the UE. In the case of a succeeded authentication procedure, the START value is reset to zero by the TTCN.

Once the START is downloaded the SS will, according to the activation time, initialize the 20 most significant bits of the RRC HFN (for integrity protection), the RLC HFN (for ciphering) and the MAC-d HFN (for ciphering) to the START value of the corresponding service domain; the remaining bits are initialized to 0.

Upon the concerned RLC entities and the MAC(d) entity release in the SS, the associated security contexts are no longer used and shall be removed as well. The RLC and the MAC(d) entities are addressed by the TTCN with the cell id = -1.

8.5.1 Authentication

A GMM or MM authentication test step makes use of a number of TSOs to generate an authentication vector:

AV := {RAND, XRES, CK, IK, AUTN}

If the UE has valid authentication parameters (CKSN/KSI), for the respective domain, use of the Authentication procedure after an INITIAL DIRECT TRANSFER message is optional. Authentication in this case will be left to the test case implementation and need not be specified in the prose. However, in the case where the UE does not have valid authentication parameters the Authentication procedure shall be performed.

8.5.2 Ciphering

The ciphering in the SS is activated through the ASP CRLC_Ciphering_Activate_REQ for the AM or UM mode and through CMAC_Ciphering_Activate_REQ for the TM mode.

A PIXIT parameter px_CipheringOnOff indicates whether all the tests are performed under ciphering activated or not. If ciphering should be off at the test execution, the ciphering algorithm in IE ciphering ModeInfo is set to uea0 (no encryption). The UE under test is informed about the SS ciphering capability via IE cipheringAlgorithmCap set to uea0.

Unless specified otherwise in the test prose, px_CipheringOnOff shall be set to on in FDD mode and off in LCR TDD mode.

Table 8.5.2 gives the mapping of the RB id and the bearer value used in the ciphering calculation at the SS side.

Table 8.5.2: Mapping between RB identity in ASP and BEARER value in the ciphering calculation

RB identity

(TTCN constant)

Direction

RLC mode

BEARER value

Type

Comments

-1 (tsc_RB_BCCH)

downlink

TM

N/A

No ciphering applicable

-2 (tsc_RB_PCCH)

downlink

TM

N/A

No ciphering applicable

-3 (tsc_RB_BCCH_FACH)

downlink

TM

N/A

No ciphering applicable

-4 (tsc_RB_2ndPCCH )

downlink

TM

N/A

No ciphering applicable

-5 (tsc_RB_2ndCCCH )

uplink

TM

N/A

No ciphering applicable

-6 (tsc_RB_MTCH_RLC_TR)

downlink

TM

N/A

RAB

For RLC MTCH test, no ciphering applicable

-8 (tsc_RB_MCCH_RLC_TR)

downlink

TM

N/A

No ciphering applicable

-10 (tsc_RB_UM_7_RLC)

downlink

TM

N/A

RAB

For UM RLC tests using 7 bit Lis, no ciphering used

-10 (tsc_RB_UM_7_RLC)

uplink

TM

N/A

RAB

For UM RLC tests using 7 bit LIs, no ciphering used

-11 (tsc_RB_UM_15_RLC)

downlink

TM

N/A

RAB

For UM RLC tests using 15 bit LIs, no ciphering used

-11 (tsc_RB_UM_15_RLC)

uplink

TM

N/A

RAB

For UM RLC tests using 15 bit LIs, no ciphering used

-12 (tsc_RB_AM_7_RLC)

downlink

TM

N/A

RAB

For AM RLC tests using 15 bit LIs, no ciphering used

-12 (tsc_RB_AM_7_RLC)

uplink

TM

N/A

RAB

For AM RLC tests using 7 bit LIs, no ciphering used

-13 (tsc_RB_AM_15_RLC)

downlink

TM

N/A

RAB

For AM RLC tests using 15 bit LIs, no ciphering used

-13 (tsc_RB_AM_15_RLC)

uplink

TM

N/A

RAB

For AM RLC tests using 15 bit LIs, no ciphering used

-14 tsc_RB_DCCH_FACH_MAC)

downlink

TM

N/A

SRB3

MAC testing no ciphering used

-14 (tsc_RB_DCCH_FACH_MAC)

uplink

TM

N/A

SRB3

MAC testing no ciphering used

-15 (tsc_RB_DCCH_DCH_MAC)

downlink

TM

N/A

SRB3

MAC testing no ciphering used

-15 (tsc_RB_DCCH_FACH_MAC)

uplink

TM

N/A

SRB3

MAC testing no ciphering used

-16 (tsc_RB3_DCCH_RRC)

uplink

AM

2

SRB3

-18 (tsc_RB_CCCH_FACH_MAC)

downlink

TM

N/A

SRB0

No ciphering applicable

-19 (tsc_RB_BCCH_FACH_RAB)

downlink

TM

N/A

SRB

No ciphering applicable

-20 (tsc_RB_DTCH_E_DCH_MAC)

uplink

TM

N/A

RAB

MAC testing no ciphering used

-21 (tsc_RB_DTCH_E_DCH_MAC1)

uplink

TM

N/A

RAB

MAC testing no ciphering used

-22 (tsc_RB_DTCH_E_DCH_MAC2)

uplink

TM

N/A

RAB

MAC testing no ciphering used

-25 (tsc_RB_MAC_HS)

downlink

TM

N/A

RAB

MAC/RLC testing no ciphering used

-25 (tsc_RB_MAC_HS)

uplink

TM

N/A

RAB

MAC/RLC testing no ciphering used

-26 (tsc_RB_MAC_ehs_26)

downlink

TM

N/A

RAB

MACehs testing no ciphering used

-26 (tsc_RB_MAC_ehs_26)

Uplink

TM

N/A

RAB

MACehs testing no ciphering used

-27 (tsc_RB_MAC_ehs_27)

downlink

TM

N/A

RAB

MACehs testing no ciphering used

-27 (tsc_RB_MAC_ehs_27)

downlink

TM

N/A

RAB

MACehs testing no ciphering used

0 (tsc_RB0)

uplink

TM

N/A

SRB0

No ciphering applicable

0 (tsc_RB0)

downlink

UM

N/A

SRB0

No ciphering applicable

1 (tsc_RB1)

uplink

UM

0

SRB1

1 (tsc_RB1)

downlink

UM

0

SRB1

2 (tsc_RB2)

uplink

AM

1

SRB2

2 (tsc_RB2)

downlink

AM

1

SRB2

3 (tsc_RB3)

uplink

AM

2

SRB3

3 (tsc_RB3)

downlink

AM

2

SRB3

4 (tsc_RB4)

uplink

AM

3

SRB4

4 (tsc_RB4)

downlink

AM

3

SRB4

5 (tsc_RB5)

uplink

TM

4

SRB

DCCH

5 (tsc_RB5)

downlink

TM

4

SRB

DCCH

6

uplink

5

Not used currently

6

downlink

5

Not used currently

7

uplink

6

Not used currently

7

downlink

6

Not used currently

8

uplink

7

Not used currently

8 (tsc_RB_MCCH)

downlink

UM

7

No ciphering applicable

9

uplink

8

Not used currently

9 (tsc_RB_MSCH)

downlink

8

No ciphering applicable

10 (tsc_RB10)

uplink

TM

9

RAB#1-1

or RAB1

10 (tsc_RB10)

downlink

TM

9

RAB#1-1

or RAB1

11 (tsc_RB11)

uplink

TM

10

RAB#1-2

or RAB2

11 (tsc_RB11)

downlink

TM

10

RAB#1-2

or RAB2

12 (tsc_RB12)

uplink

TM

11

RAB#1-3

12 (tsc_RB12)

downlink

TM

11

RAB#1-3

13 (tsc_RB13)

uplink

TM

12

RAB#2

13 (tsc_RB13)

downlink

TM

12

RAB#2

14

uplink

13

Not used currently

14 (tsc_MTCH1)

downlink

UM

13

No ciphering

15

uplink

14

Not used currently

15 (tsc_MTCH2)

downlink

UM

14

No ciphering

16

uplink

15

Not used currently

16 (tsc_MTCH3)

downlink

UM

15

No ciphering

17 (tsc_RB17)

uplink

AM

16

RAB#2

17 (tsc_RB17)

downlink

AM

16

RAB#2

20 (tsc_RB20)

uplink

AM

19

RAB#1

20 (tsc_RB20)

downlink

AM

19

RAB#1

21 (tsc_RB21)

uplink

UM

20

RAB#2

21 (tsc_RB21)

downlink

UM

20

RAB#2

22 (tsc_RB22)

uplink

AM

21

RAB#2

22 (tsc_RB22)

downlink

AM

21

RAB#2

23 (tsc_RB23)

uplink

AM

22

RAB#2

23 (tsc_RB23)

downlink

AM

22

RAB#2

24 (tsc_RB24)

uplink

AM

23

RAB#2

24 (tsc_RB24)

downlink

AM

23

RAB#2

25 (tsc_RB25)

uplink

AM

24

RAB#1

25 (tsc_RB25)

downlink

AM

24

RAB#1

26 (tsc_RB26)

uplink

UM

25

RAB#1

MAC testing no ciphering used

26 (tsc_RB26)

downlink

UM

25

RAB#1

MAC testing no ciphering used

27 (tsc_RB27)

uplink

UM

26

RAB#2

MAC testing no ciphering used

27 (tsc_RB27)

downlink

UM

26

RAB#2

MAC testing no ciphering used

28 (tsc_RB28)

uplink

AM

27

RAB#3

MAC testing no ciphering used

28 (tsc_RB28)

downlink

AM

27

RAB#3

MAC testing no ciphering used

29

uplink

28

Not used yet currently

29 (tsc_RB29)

downlink

AM

28

SRB0

No ciphering applicable

30

uplink

29

Not used yet currently

30 (tsc_RB30)

downlink

UM

N/A

CTCH FACH no ciphering used

31

uplink

30

Not used yet currently

31 (tsc_RB31)

downlink

UM

N/A

CTCH FACH no ciphering used

32

uplink

31

Not used yet currently

32

downlink

31

Not used yet currently

8.5.3 Integrity

The integrity protection in the SS is activated through the ASP CRLC_Integrity_Activate_REQ for all SRB.

MAC-I (MessageAuthenticationCode) is calculated by the SS. If the integrity protection is not yet started, the "integrity protection info" IE is omitted in TTCN. If integrity protection is started the TTCN includes the "integrity protection info" IE with all bits set to "0". The SS takes care of all the necessary initialization and calculation on SRBs.

Once integrity is started, the SS initializes and calculates a correct Message Authentication Code, overrides the initial value all bits "0" and inserts a corresponding RRC message sequence number into the IntegrityCheckInfo for all DL DCCH messages. In UL, the SS shall check the received MessageAuthenticationCode. If it is wrong, the ASP CRLC_Integrity_Failure_IND will report having received an UL message with integrity error. If it is correct SS forwards the received messages to the TTCN.

In addition, CRLC_MAC_I_Mode_REQ can be used to force the SS generate wrong DL MAC-I on a specific SRB for the integrity error handling test.

8.5.4 Test security scenarios

Five basic test scenarios are presented in the present document. The corresponding core spec references are found in 3GPP TS 25.331 [21], clauses 8.1.12, 8.2.2.2, 8.5.10.1, 8.5.10.2, 8.6.3.4, 8.6.3.5, 8.6.4.3 and 8.6.4.8.

Start security;

RB setup;

AM RB reconfiguration;

Security modification;

SRNS relocation;

Modification of RLC size of AM RB during RB reconfiguration;

Cell/URA update;

InterRAt HO to UTRAN.

As Default, the 1st three basic scenarios can be subdivided into:

Start integrity without ciphering start;

Start integrity and ciphering at the same time.

Regarding the simultaneous SRNS relocation, the security scenarios at the relocation are split into:

No security configuration modification;

Modification of integrity (FRESH) without ciphering configuration change;

Modification integrity FRESH and ciphering algorithm;

A security modification pending at the SRNS relocation.

This clause shows the procedures how the security ASP applied to the SS configurations at the different security test scenarios.

8.5.4.1 Start security function

CIPHERING_STATUS = NotStarted for the CN domain concerned.

8.5.4.1.1 Start integrity protection without start of ciphering

INTEGRITY_PROTECTION Status = NotStarted.

SECURITY MODE COMMAND with "Integrity protection mode info" IE containing integrityProtectionModeCommand = Start, no "Ciphering mode info" IE

1 Before sending SECURITY MODE COMMAND (SMC)

CRLC_SecurityMode_Config_REQ

startValue = value most recently received or 0 (new key)

integrityKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_SetRRC_MessageSN_REQ (SN=0)

— Downlink RRC message sequence number set to 0

CRLC_Integrity_Activate_REQ (CN domain concerned)

integrityProtectionModeCommand = startIntegrityProtection (FRESH)

integrityProtectionAlgorithm = selected value

— downlink integrity protection starts immediately

CRLC_Integrity_Activate_REQ (CN domain concerned)

ul_IntegProtActivationInfo = 0 (RB2 only)

2 Send SECURITY MODE COMMAND

3 After receiving SECURITY MODE COMPLETE

CRLC_Integrity_Activate_REQ (CN domain concerned)

ul_IntegProtActivationInfo = value in "Uplink integrity protection activation time" (except RB2) received from SECURITY MODE COMPLETE

8.5.4.1.2 Start both integrity protection and ciphering

INTEGRITY_PROTECTION Status = NotStarted.

SECURITY MODE COMMAND with "Integrity protection mode info" IE containing integrityProtectionModeCommand = Start, and "Ciphering mode info" IE containing cipheringModeCommand = Start/Restart (algorithm UEA0 or UEA1)

1 Before sending SECURITY MODE COMMAND message

CRLC_SecurityMode_Config_REQ

startValue = value most recently received or 0 ( new key)

cipheringKey = value maintained by TTCN

integrityKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_SequenceNumber_REQ

— Get current RLC SN of all SRB for calculating suitable down link activation time

CRLC_Suspend_REQ

— Suspend all signalling radio bearers except RB2. Optionally an SS may start immediate suspension of processing of data PDUs in the UL. The UL control PDUs and Piggybacked Status may optionally processed.

CRLC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = Start/Restart (algorithm)

rb_DL_CiphActivationTimeInfo = calculated activation time

incHFN = NotInc

CRLC_SetRRC_MessageSN_REQ (SN=0)

— Downlink RRC message sequence number set to 0

CRLC_Integrity_Activate_REQ (CN domain concerned)

integrityProtectionModeCommand = startIntegrityProtection (FRESH)

integrityProtectionAlgorithm = selected value

(downlink integrity protection starts immediate)

CRLC_Integrity_Activate_REQ (CN domain concerned)

ul_IntegProtActivationInfo = 0 (RB2 only)

CRLC_ProhibitRLC_Ack_REQ

mode = prohibit (RB3 only)

— An SS supporting suspension of UL data PDUs may provide a dummy CRLC_ProhibitRLC_Ack_CNF

2 Send SECURITY MODE COMMAND

3 After receiving SECURITY MODE COMPLETE

CRLC_Ciphering_Activate_REQ (CN domain concerned)

rb_UL_CipheringActivationTimeInfo = value received in SECURITY MODE COMPLETE

incHFN = NotInc

CRLC_Integrity_Activate_REQ (CN domain concerned)

ul_IntegProtActivationInfo = value in "Uplink integrity protection activation time" (except RB2) received from SECURITY MODE COMPLETE

CRLC_ProhibitRLC_Ack_REQ

mode = continue (RB3 only)

— An SS supporting suspension of UL data PDUs may provide a dummy CRLC_ProhibitRLC_Ack_CNF

CRLC_Resume_REQ

— If the SS implemented the optional suspension of UL data PDUs, then the processing in the UL of data PDUs shall be resumed. Any suspended UL control PDUs and Piggybacked Status shall be preceded or resumed.

8.5.4.1.3 Void

8.5.4.2 RB setup

INTEGRITY_PROTECTION Status = Started.

Condition: "RAB information for setup" IE included in RADIO BEARER SETUP

8.5.4.2.1 AM / UM RB

1 Sending the RADIO BEARER SETUP message.

2 Configuring the RB.

3 After receiving RADIO BEARER SETUP COMPLETE.

8.5.4.2.1.1 Ciphering not started

CIPHERING_STATUS = NotStarted for the CN domain concerned

CRLC_SecurityMode_Config_REQ

startValue = value most recently received

cipheringKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = NULL (no ciphering)

rb_DL_CiphActivationTimeInfo = 0 (from the first block)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ (CN domain concerned)

rb_UL_CipheringActivationTimeInfo = 0 (from the first block)

incHFN = NotInc

8.5.4.2.1.2 Ciphering started

CIPHERING_STATUS = Started for the CN domain concerned

CRLC_SecurityMode_Config_REQ

startValue = value most recently received

cipheringKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = Start/Restart (algorithm)

rb_DL_CiphActivationTimeInfo = 0 (from the first block)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ (CN domain concerned)

rb_UL_CipheringActivationTimeInfo = 0 (from the first block)

incHFN = NotInc

8.5.4.2.2 TM RB

Enter Cell_DCH,

no TM RB established before,

"COUNT-C activation time" IE included in RADIO BEARER SETUP COMPLETE message.

8.5.4.2.2.1 Ciphering not started

CIPHERING_STATUS = NotStarted for the CN domain concerned,

1 Send the RADIO BEARER SETUP message

2 Configuring the RB

3 After receiving RADIO BEARER SETUP COMPLETE

CMAC_SecurityMode_Config_REQ

startValue = value most recently received

cn_DomainIdentity = CS or PS

CMAC_Ciphering_Activate_REQ (CN domain concerned)

incHFN = NotInc

cipheringModeCommand = NULL (no ciphering)

activationTimeForDPCH = value in "COUNT-C activation time"

8.5.4.2.2.2 Ciphering started

CIPHERING_STATUS = Started for the CN domain concerned,

1 Sending RADIO BEARER SETUP

2 Configuring the RB

CMAC_SecurityMode_Config_REQ

startValue = value most recently received

cipheringKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CMAC_Ciphering_Activate_REQ (CN domain concerned)

incHFN = NotInc

cipheringModeCommand = Start/Restart (algorithm)

activationTimeForDPCH = value in "Activation time" of the RB

3 After receiving RADIO BEARER SETUP COMPLETE message

CMAC_SecurityMode_Config_REQ

startValue = value received in response message

cipheringKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CMAC_Ciphering_Activate_REQ (CN domain concerned)

incHFN = IncPerCFN_Cycle

cipheringModeCommand = Start/Restart (algorithm)

activationTimeForDPCH = value in "COUNT-C activation time"

8.5.4.3 RB Reconfiguration for AM RAB modification of RLC size

CIPHERING_STATUS = Started for the CN domain concerned,

"RB mapping info" IE, changing AM RB RLC size, is included in

CELL UPDATE CONFIRM,

RADIO REARER RECONFIGURATION,

RADIO BEARER RELEASE

8.5.4.3.1 "RB mapping info" in CELL UPDATE CONFIRM

After sending the CELL UPDATE CONFIRM message, re-establish the RB and re-configure the RB with new RLC size and re-initialize COUNT-C for the RB:

CRLC_Config_REQ

Release the concerned RB

CRLC_Config_REQ

Setup the concerned RB (new RLC size)

CRLC_SecurityMode_Config_REQ

startValue = value received in the CELL UPDATE message

integrityKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CiphActivationTimeInfo = now

incHFN = NotInc

8.5.4.3.2 "RB mapping info" in RB RECONFIGURATION / RELEASE

After receiving the reconfiguration complete message, re-establish the RB and re-configure the RB with new RLC size and re-initialize COUNT-C for the RB:

CRLC_Config_REQ

Release the concerned RB

CRLC_Config_REQ

Setup the concerned RB (new RLC size)

CRLC_SecurityMode_Config_REQ

startValue = value received in the reconfiguration complete message

integrityKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CiphActivationTimeInfo = now

incHFN = NotInc

8.5.4.4 Security modification

Updating security keys is the scenario in this clause.

INTEGRITY_PROTECTION STATUS = Started

SECURITY MODE COMMAND contains "Ciphering mode info" IE and/or "Integrity protection mode info" IE

8.5.4.4.1 Integrity started, ciphering not started

CIPHERING_STATUS = NotStarted for the CN domain concerned

SECURITY MODE COMMAND with "Integrity protection mode info" IE containing integrityProtectionModeCommand = modify, but "Ciphering mode info" IE absent the same CN domain as in the previous SMC to start integrity protection.

1 Before sending SECURITY MODE COMMAND message

CRLC_SecurityMode_Config_REQ

startValue = 0 (new key)

integrityKey = new key

cn_DomainIdentity = CS or PS

CRLC_RRC_MessageSN_REQ

— Get current RRC Message SN for calculation of DL activation time

CRLC_Integrity_Activate_REQ (CN domain concerned)

integrityProtectionModeCommand = modify

dl_IntegrityProtActivationInfo = now (SRB2), calculated value or a pending activation time set by previous security mode control procedure (SRB2 other than SRB2)

CRLC_Integrity_Activate_REQ (CN domain concerned, RB2)

ul_IntegrityProtActivationInfo = now

2 Sending SECURITY MODE COMMAND message

3 After receiving SECURITY MODE COMPLETE

CRLC_Integrity_Activate_REQ (CN domain concerned)

ul_IntegProtActivationInfo = value in "Uplink integrity protection activation time" (except RB2)

8.5.4.4.2 Integrity and ciphering started

CIPHERING_STATUS = Started for the CN domain concerned

SECURITY MODE COMMAND contains

"Integrity protection mode info" IE with integrityProtectionModeCommand = modify,

"Ciphering mode info" IE with cipheringModeCommand = Start/Restart.

1 Before sending SECURITY MODE COMMAND message

CRLC_SecurityMode_Config_REQ

startValue = 0 (new key)

integrityKey = new key

cipheringKey = new key

cn_DomainIdentity = CS or PS

if TM RB exist

CMAC_SecurityMode_Config_REQ

startValue = 0 ( new key)

cipheringKey = new key

integrityKey = new key

cn_DomainIdentity = CS or PS

CRLC_SequenceNumber_REQ

— Get current RLC SN for calculating suitable down link activation time

CRLC_Suspend_REQ

— Optionally an SS may start immediate suspension of processing of data PDUs in the UL. The UL control PDUs and Piggybacked Status may optionally be processed.

CRLC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = calculated activation time

incHFN = NotInc

CRLC_RRC_MessageSN_REQ

— Get current RRC message SN for calculating suitable DL activation time

CRLC_Integrity_Activate_REQ (CN domain concerned)

integrityProtectionModeCommand = modify

dl_IntegrityProtActivationInfo = now (SRB2), calculated value or a pending activation time set by previous security mode control procedure (SRB other than SRB2)

CRLC_Integrity_Activate_REQ (CN domain concerned,RB2)

ul_IntegrityProtActivationInfo = now

if TM RB exist

CPHY_Frame_Number_REQ

–Get current CFN for calculating suitable activation time for TM RB

CMAC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = Start/Restart (existing algorithm)

activationTimeForDPCH = calculated activation time

incHFN = IncPerCFN_Cycle

CRLC_ProhibitRLC_Ack_REQ

mode = prohibit (RB3 only)

— An SS supporting suspension of UL data PDUs may provide a dummy CRLC_ProhibitRLC_Ack_CNF

2 Sending SECURITY MODE COMMAND message

3 After receiving SECURITY MODE COMPLETE

CRLC_Ciphering_Activate_REQ (CN domain concerned)

rb_UL_CipheringActivationTimeInfo = value received in SECURITY MODE COMPLETE

incHFN = NotInc

CRLC_Integrity_Activate_REQ (CN domain concerned, except RB2)

ul_IntegProtActivationInfo = value in "Uplink integrity protection activation time"

CRLC_ProhibitRLC_Ack_REQ

mode = continue (RB3 only)

— An SS supporting suspension of UL data PDUs may provide a dummy CRLC_ProhibitRLC_Ack_CNF

CRLC_Resume_REQ

— If the SS implemented the optional suspension of UL data PDUs, then the processing in the UL of data PDUs shall be resumed. Any suspended UL control PDUs and Piggybacked Status shall be preceded or resumed.

8.5.4.5 SRNS relocation

Simultaneous SRNS relocation will take place

either "Downlink count synchronization info" IE is received in

CELL UPDATE CONFIRM,

PHYSICAL CHANNEL RECONFIGURATION,

RADIO BEARER SETUP,

RADIO BEARER RELEASE,

TRANSPORT CHANNEL RECONFIGURATION,

URA UPDATE CONFIRM,

UTRAN MOBILITY INFROMATION,

or "new U-RNTI" IE is received in

RADIO BEARER RECONFIGURATION.

INTEGRITY_PROTECTION Status = Started

8.5.4.5.1 Void
8.5.4.5.2 Presence of "Integrity protection mode info" but absence of "Ciphering mode info"

SRNS relocation related messages listed contains "Integrity protection mode info" but does not have "Ciphering mode info" IE.

SRNS relocation related message with "Integrity protection mode info" IE containing integrityProtectionModeCommand = Start, but no "Ciphering mode info" IE (no ciphering configuration change).

8.5.4.5.2.1 No security configuration pending

No security configuration pending triggered by previous SECURITY MODE COMMAND.

1 Before sending one of the SRNS relocation related messages

CRLC_SecurityMode_Config_REQ

startValue = OMIT (no COUNT-I re-initialization)

integrityKey = OMIT or value maintained by TTCN (no key change)

cn_DomainIdentity = CS or PS

CRLC_Integrity_Activate_REQ (CN domain concerned)

integrityProtectionModeCommand = Start (FRESH)

integrityProtectionAlgorithm = selected value

— downlink integrity protection starts immediately

CRLC_Integrity_Activate_REQ (CN domain concerned)

ul_IntegProtActivationInfo = value (now)

2 Sending one of the SRNS relocation related messages

3 Re-establishing RB2 and re-initialize COUNT-C for RB2

CRLC_SequenceNumber_REQ

CRLC_SequenceNumber_CNF

newHFN = MAX(HFN of DL COUNT-C of RB2, HFN of UL COUNT-C of RB2) + 1

CRLC_Config_REQ

— Release RB2

CRLC_Config_REQ

— Setup RB2

CRLC_SecurityMode_Config_REQ

startValue = newHFN

cn_DomainIdentity = CS or PS concerned

CRLC_Ciphering_Activate_REQ (CN domain concerned)

if CIPHERING_STATUS= NotStarted

cipheringModeCommand = NULL (no ciphering)

if CIPHERING_STATUS = Started

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now (RB2 only)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ (CN domain concerned)

rb_UL_CipheringActivationTimeInfo = now (RB2 only)

incHFN = NotInc

4 Receiving the response message

5 Re-establishing all RBs and SRBs (except SRB2) and re-initialize COUNT-C for all RBs and SRBs (except SRB2)

CRLC_Config_REQ

— Release all RBs and all SRBs (except SRB2)

CRLC_Config_REQ

— Setup all RB’s and all SRB’s (except RB2)

CRLC_SecurityMode_Config_REQ

startValue = value received in the response message

integrityKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ

if CIPHERING_STATUS= NotStarted

cipheringModeCommand = NULL (no ciphering)

if CIPHERING_STATUS = Started

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now (except SRB2)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CiphActivationTimeInfo = now (except SRB2)

incHFN = NotInc

8.5.4.5.2.2 Pending security configuration (new keys)

A pending security configuration is triggered by the previous SECURITY MODE COMMAND (new Key).

1 Before sending one of the SRNS relocation related messages

CRLC_SecurityMode_Config_REQ

startValue = 0 (new key)

integrityKey = new key

cn_DomainIdentity = CS or PS

CRLC_Integrity_Activate_REQ

IntegrityProtectionModeCommand = Start (FRESH)

IntegrityProtectionAlgorithm = selected value (downlink integrity protection starts immediately)

CRLC_Integrity_Activate_REQ

ul_IntegProtActivationInfo = value (now)

2 Send one of the SRNS relocation related messages

3 Re-establish RB2 and re-initialize COUNT-C for RB2

CRLC_SequenceNumber_REQ

CRLC_SequenceNumber_CNF

HFN = MAX(HFN of DL/UL COUNT-C of RB2) + 1

CRLC_Config_REQ

Release RB2

CRLC_Config_REQ

Setup RB2

CRLC_SecurityMode_Config_REQ

startValue = HFN calculated above

cipheringKey = new key

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ

if CIPHERING_STATUS= NotStarted

cipheringModeCommand = NULL (no ciphering)

if CIPHERING_STATUS = Started

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now (RB2 only)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CipheringActivationTimeInfo = now (RB2 only)

incHFN = NotInc

4 Receive the response message

5 Re-establish all RBs and SRBs (except RB2) and re-initialize COUNT-C for all RBs and SRBs (except RB2)

CRLC_Config_REQ

Release all RB’s and SRB’s (except RB2)

CRLC_Config_REQ

Setup all RB’s and SRB’s (except RB2)

CRLC_SecurityMode_Config_REQ

startValue = value received in the response message

integrityKey = new key

cipheringKey = new key

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate _REQ

if CIPHERING_STATUS= NotStarted

cipheringModeCommand = NULL (no ciphering)

if CIPHERING_STATUS = Started

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now (except RB2)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CiphActivationTimeInfo = now (except RB2)

incHFN = NotInc

6 Re-initialize COUNT-I for all RB’s and SRB’s (except RB2)

CRLC_SecurityMode_Config_REQ

startValue = 0 (new key)

integrityKey = new key

cn_DomainIdentity = CS or PS

CRLC_Integrity_Activate_REQ

IntegrityProtectionModeCommand = Start (FRESH)

IntegrityProtectionAlgorithm = selected value (downlink integrity protection starts immediately)

CRLC_Integrity_Activate_REQ

ul_IntegProtActivationInfo = value (now)

8.5.4.5.2.3 Pending security configuration (no new keys)

A pending security configuration is triggered by the previous SECURITY MODE COMMAND (no new keys).

1 Before sending one of the SRNS relocation related messages

CRLC_SecurityMode_Config_REQ

startValue = OMIT (no COUNT-I re-initialization)

integrityKey = OMIT or value maintained by TTCN (no key change) cn_DomainIdentity = CS or PS

CRLC_Integrity_Activate_REQ

SS_IntegrityProtectionModeCommand = Start (FRESH)

IntegrityProtectionAlgorithm = selected value (downlink integrity protection starts immediately)

CRLC_Integrity_Activate_REQ

ul_IntegProtActivationInfo = value (now)

2 Send one of the SRNS relocation related messages

3 Re-establish RB2 and re-initialize COUNT-C for RB2

CRLC_SequenceNumber_REQ

CRLC_SequenceNumber_CNF

HFN = MAX(HFN of DL/UL COUNT-C of RB2) + 1

CRLC_Config_REQ

Release RB2

CRLC_Config_REQ

Setup RB2

CRLC_SecurityMode_Config_REQ

startValue = HFN calculated above

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ

if CIPHERING_STATUS= NotStarted

cipheringModeCommand = NULL (no ciphering)

if CIPHERING_STATUS = Started

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now (RB2 only)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CipheringActivationTimeInfo = now (RB2 only)

incHFN = NotInc

4 Receive the response message

5 Re-establish all RBs and SRBs (except RB2) and re-initialize COUNT-C for all RBs and SRBs (except RB2)

CRLC_Config_REQ

Release all RB’s and SRB’s (except RB2)

CRLC_Config_REQ

Setup all RB’s and SRB’s (except RB2)

CRLC_SecurityMode_Config_REQ

startValue = value received in the response message

integrityKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ

if CIPHERING_STATUS= NotStarted

cipheringModeCommand = NULL (no ciphering)

if CIPHERING_STATUS = Started

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now (except RB2)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CiphActivationTimeInfo = now (except RB2)

incHFN = NotInc

6 Re-initialize COUNT-I for all RB’s and SRB’s (except RB2)

CRLC_SecurityMode_Config_REQ

startValue = value received in the response message

integrityKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Integrity_Activate_REQ

IntegrityProtectionModeCommand = Start (FRESH)

IntegrityProtectionAlgorithm = selected value (downlink integrity protection starts immediately)

CRLC_Integrity_Activate_REQ

ul_IntegProtActivationInfo = value (now)

8.5.4.5.3 Presence of "Integrity protection mode info" and "Ciphering mode info" IE

CIPHERING_STATUS = Started for the CN domain concerned,

SRNS relocation related message with "Integrity protection mode info" IE containing integrityProtectionModeCommand = Start, and "Ciphering mode info" IE containing cipheringModeCommand = Start/Restart (change ciphering algorithm, no "Radio bearer downlink ciphering activation time info")

8.5.4.5.3.1 No security configuration pending

1 Before sending one of the SRNS relocation related messages

CRLC_SecurityMode_Config_REQ

startValue = OMIT (no COUNT-I re-initialization)

integrityKey = OMIT or value maintained by TTCN (no key change)

cn_DomainIdentity = CS or PS

CRLC_Integrity_Activate_REQ

SS_IntegrityProtectionModeCommand = Start (FRESH)

IntegrityProtectionAlgorithm = selected value (downlink integrity protection starts immediately)

CRLC_Integrity_Activate_REQ

ul_IntegProtActivationInfo = value (now)

2 Send one of the SRNS relocation related messages

3 Re-establish RB2 and re-initialize COUNT-C for RB2

CRLC_SequenceNumber_REQ

CRLC_SequenceNumber_CNF

HFN = MAX(HFN of DL/UL COUNT-C of RB2) + 1

CRLC_Config_REQ

Release RB2

CRLC_Config_REQ

Setup RB2

CRLC_SecurityMode_Config_REQ

startValue = HFN calculated above

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ

if CIPHERING_STATUS= NotStarted

cipheringModeCommand = NULL (no ciphering)

if CIPHERING_STATUS = Started

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now (RB2 only)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CipheringActivationTimeInfo = now (RB2 only)

incHFN = NotInc

4 Receive the response message

5 Re-establish all RBs and SRBs (except RB2) and re-initialize COUNT-C for all RBs and SRBs (except RB2)

CRLC_Config_REQ

Release all RB’s and SRB’s (except RB2)

CRLC_Config_REQ

Setup all RB’s and SRB’s (except RB2)

CRLC_SecurityMode_Config_REQ

startValue = value received in the response message

integrityKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ

cipheringModeCommand = Start/Restart (new algorithm)

rb_DL_CiphActivationTimeInfo = now (except RB2)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CiphActivationTimeInfo = now (except RB2)

incHFN = NotInc

8.5.4.5.3.2 Pending security configuration (new keys)

1 Before sending one of the SRNS relocation related messages

CRLC_SecurityMode_Config_REQ

startValue = 0 (new key)

integrityKey = new key

cn_DomainIdentity = CS or PS

CRLC_Integrity_Activate_REQ

SS_IntegrityProtectionModeCommand = Start (FRESH)

IntegrityProtectionAlgorithm = selected value (downlink integrity protection starts immediately)

CRLC_Integrity_Activate_REQ

ul_IntegProtActivationInfo = value (now)

2 Send one of the SRNS relocation related messages

3 Re-establish RB2 and re-initialize COUNT-C for RB2

CRLC_SequenceNumber_REQ

CRLC_SequenceNumber_CNF

HFN = MAX(HFN of DL/UL COUNT-C of RB2) + 1

CRLC_Config_REQ

Release RB2

CRLC_Config_REQ

Setup RB2

CRLC_SecurityMode_Config_REQ

startValue = HFN calculated above

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ

cipheringModeCommand = NULL (no ciphering status change)

rb_DL_CiphActivationTimeInfo = now (RB2 only)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CipheringActivationTimeInfo = now (RB2 only)

incHFN = NotInc

4 Receive the response message

5 Re-establish all RBs and SRBs (except RB2) and re-initialize COUNT-C for all RBs and SRBs (except RB2)

CRLC_Config_REQ

Release all RB’s and SRB’s (except RB2)

CRLC_Config_REQ

Setup all RB’s and SRB’s (except RB2)

CRLC_SecurityMode_Config_REQ

startValue = 0

integrityKey = new key

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate _REQ

cipheringModeCommand = Start/Restart (new algorithm)

rb_DL_CiphActivationTimeInfo = now (except RB2)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CiphActivationTimeInfo = now (except RB2)

incHFN = NotInc

6 Re-initialize COUNT-I for all RBs and SRBs (except RB2)

CRLC_SecurityMode_Config_REQ

startValue = 0 (new key)

integrityKey = new key

cn_DomainIdentity = CS or PS

CRLC_Integrity_Activate_REQ

IntegrityProtectionModeCommand = Start (FRESH)

IntegrityProtectionAlgorithm = selected value (downlink integrity protection starts immediately)

CRLC_Integrity_Activate_REQ

ul_IntegProtActivationInfo = value (now)

8.5.4.5.3.3 Pending security configuration (no new key)

1 Before sending one of the SRNS relocation related messages

CRLC_SecurityMode_Config_REQ

startValue = OMIT (no COUNT-I re-initialization)

integrityKey = OMIT or value maintained by TTCN (no key change)

cn_DomainIdentity = CS or PS

CRLC_Integrity_Activate_REQ

SS_IntegrityProtectionModeCommand = Start (FRESH)

IntegrityProtectionAlgorithm = selected value (downlink integrity protection starts immediately)

CRLC_Integrity_Activate_REQ

ul_IntegProtActivationInfo = value (now)

2 Send one of the SRNS relocation related messages

3 Re-establish RB2 and re-initialize COUNT-C for RB2

CRLC_SequenceNumber_REQ

CRLC_SequenceNumber_CNF

HFN = MAX(HFN of DL/UL COUNT-C of RB2) + 1

CRLC_Config_REQ

Release RB2

CRLC_Config_REQ

Setup RB2

CRLC_SecurityMode_Config_REQ

startValue = HFN calculated above

n_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ

if CIPHERING_STATUS= NotStarted

cipheringModeCommand = NULL (no ciphering)

if CIPHERING_STATUS = Started

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now (RB2 only)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ

rb_UL_CipheringActivationTimeInfo = now (RB2 only)

incHFN = NotInc

4 Receive the response message

5 Re-establish all RBs and SRBs (except RB2) and re-initialize COUNT-C for all RBs and SRBs (except RB2)

CRLC_Config_REQ

Release all RB’s and SRB’s (except RB2)

CRLC_Config_REQ

Setup all RB’s and SRB’s (except RB2)

CRLC_SecurityMode_Config_REQ

startValue = value received in the response message

integrityKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate _REQ

cipheringModeCommand = Start/Restart (new algorithm)

rb_DL_CiphActivationTimeInfo = now (except RB2)

CRLC_Ciphering_Activate _REQ

rb_UL_CiphActivationTimeInfo = now (except RB2)

6 Re-initialize COUNT-I for all RBs and SRBs (except RB2)

CRLC_SecurityMode_Config_REQ

startValue = value received in the response message

integrityKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Integrity_Activate_REQ

IntegrityProtectionModeCommand = Start (FRESH)

IntegrityProtectionAlgorithm = selected value (downlink integrity protection starts immediately)

CRLC_Integrity_Activate_REQ

ul_IntegProtActivationInfo = value (now)

8.5.4.6 CELL/URA update

8.5.4.6.1 RLC re-establish (RB2, RB3, RB4)

"RLC re-establish (RB2, RB3, RB4)" in CELL UPDATE CONFIRM message is set to TRUE CIPHERING_STATUS = Started for the CN domain concerned

1. After sending CELL UPDATE CONFIRM message, re-establish the RB2, RB3 and RB4 (if established)

CRLC_SecurityMode_Config_REQ

startValue = value received from CELL UPDATE message

cipheringKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now (RB2, RB3, RB4)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ (CN domain concerned)

rb_UL_CipheringActivationTimeInfo = now (RB2, RB3, RB4)

incHFN = NotInc

8.5.4.6.2 RLC re-establish (RAB)

"RLC re-establish (RB5 and upwards)" in CELL UPDATE CONFIRM message is set to TRUE CIPHERING_STATUS = Started for the CN domain concerned

1. After sending CELL UPDATE CONFIRM message, re-establish the RAB

CRLC_SecurityMode_Config_REQ

startValue = value received from CELL UPDATE message

cipheringKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = Start/Restart (existing algorithm)

rb_DL_CiphActivationTimeInfo = now (RB5 and upwards)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ (CN domain concerned)

rb_UL_CipheringActivationTimeInfo = now (RB5 and upwards)

incHFN = NotInc

8.5.4.7 Inter RAT handover to UTRAN

8.5.4.7.1 ciphering has not been activated

ciphering has not been started in the radio access technology from which inter RAT handover is performed. TM mode radio bearer will be established in the UTRAN.

1. Sending HANDOVER TO UTRAN COMMAND in a RAT different from UTRAN

2. After receiving HANDOVER TO UTRAN COMPLETE message

CMAC_SecurityMode_Config_REQ

startValue = value received in HANDOVER TO UTRAN COMPLETE message

cn_DomainIdentity = CS or PS

CMAC_Ciphering_Activate_REQ (CN domain concerned)

incHFN = NotInc

cipheringModeCommand = NULL

activationTimeForDPCH = now

CRLC_SecurityMode_Config_REQ

startValue = value received in HANDOVER TO UTRAN COMPLETE

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = NULL

rb_DL_CiphActivationTimeInfo = now (RB1, RB2, RB3, RB4)

incHFN = Inc CRLC_Ciphering_Activate_REQ (CN domain concerned)

rb_UL_CipheringActivationTimeInfo = now (RB1, RB2, RB3, RB4)

incHFN = Inc

8.5.4.7.2 ciphering has been activated

ciphering has been started in the radio access technology from which inter RAT handover is performed. TM mode radio bearer will be established in the UTRAN.

1. Before sending HANDOVER TO UTRAN COMMAND

CRLC_SecurityMode_Config_REQ

startValue = "START" value included in the IE "UE security information" in the variable "INTER_RAT_HANDOVER_INFO_TRANSFERRED"

cipheringKey = value generated in authentication procedure in GRAN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = Start/Restart (algorithm in HANDOVER TO UTRAN COMMAND)

rb_DL_CiphActivationTimeInfo = now (RB1, RB2, RB3, RB4)

incHFN = NotInc

CRLC_Ciphering_Activate_REQ (CN domain concerned)

rb_UL_CipheringActivationTimeInfo = now (RB1, RB2, RB3, RB4)

incHFN = NotInc

CMAC_SecurityMode_Config_REQ

startValue = "START" value included in the IE "UE security information" in the variable "INTER_RAT_HANDOVER_INFO_TRANSFERRED"

cipheringKey = value generated in authentication procedure in GRAN

cn_DomainIdentity = CS or PS

CMAC_Ciphering_Activate_REQ (CN domain concerned)

incHFN = NotInc

cipheringModeCommand = Start/Restart (algorithm in HANDOVER TO UTRAN COMMAND)

activationTimeForDPCH = now

2. Sending HANDOVER TO UTRAN COMMAND in a RAT different from UTRAN

3. After receiving HANDOVER TO UTRAN COMPLETE message

CMAC_SecurityMode_Config_REQ

startValue = value received in the response message

cipheringKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CMAC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = Start/Restart (algorithm) in HANDOVER TO UTRAN COMMAND)

activationTimeForDPCH = value in "COUNT-C activation time"

incHFN = IncByOne_IncPerCFN_Cycle

CRLC_SecurityMode_Config_REQ

startValue = value received in HANDOVER TO UTRAN COMPLETE

cipheringKey = value generated in authentication procedure in GRAN

cn_DomainIdentity = CS or PS

CRLC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = Start/Restart (algorithm in HANDOVER TO UTRAN COMMAND)

rb_DL_CiphActivationTimeInfo = now (RB1, RB2, RB3, RB4)

incHFN = Inc

CRLC_Ciphering_Activate_REQ (CN domain concerned)

rb_UL_CipheringActivationTimeInfo = now (RB1, RB2, RB3, RB4)

incHFN = Inc

8.5.4.8 Hard handover

Ciphering is activated for any TM radio bearer;

"Downlink DPCH info for all RL" in a message performing timing re-initialized hard handover or;

"Downlink DPCH info for all RL" in a message other than RADIO BEARER SETUP transferring UE to Cell_DCH from non-Cell_DCH state.

1. Before sending the message

CMAC_SecurityMode_Config_REQ

startValue = value most recently received

cipheringKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CMAC_Ciphering_Activate_REQ (CN domain concerned)

incHFN = NotInc

cipheringModeCommand = Start/Restart (existing algorithm)

activationTimeForDPCH = now

2. Send the message for hard HO

3. After receiving the response message

CMAC_SecurityMode_Config_REQ

startValue = value received in the response message

cipheringKey = value maintained by TTCN

cn_DomainIdentity = CS or PS

CMAC_Ciphering_Activate_REQ (CN domain concerned)

cipheringModeCommand = Start/Restart (existing algorithm)

activationTimeForDPCH = value in "COUNT-C activation time"

incHFN = IncByOne_IncPerCFN_Cycle

8.5.5 Test USIM configurations

The default test USIM is defined in 3GPP TS 34.108 [3]. This clause specifies a number of specific test USIM configurations which are used for the concerned test cases.

8.5.5.1 Test USIM for Idle mode tests

The PLMN 1-12 identities used below have been defined in 3GPP TS 34.123-1 [1], table 6.2. Clause numbers refer to 3GPP TS 34.123-1 [1].

Test USIM is configured as bellow for PLMN selection of RPLMN, HPLMN, UPLMN and OPLMN in tc_6_1_1_1, tc_6_1_1_4, and tc_6_1_1_14.

Table 8.5.5.1.1

USIM field

Priority

PLMN

Access Technology Identifier

EFPLMNwAcT

1st

PLMN 3

UTRAN

2nd

PLMN 4

UTRAN

EFOPLMNwAcT

1st

PLMN 5

UTRAN

2nd

PLMN 6

UTRAN

EFFPLMN

PLMN 3

Test USIM is configured as bellow for PLMN selection of other PLMN with access technology combinations in tc_6_1_1_2.

Table 8.5.5.1.2

USIM field

Priority

PLMN

Access Technology Identifier

EFFPLMN

PLMN 10

Test USIM is configured as bellow for manual PLMN selection independent of RF level and preferred PLMN in TC_6_1_1_3.

Table 8.5.5.1.3

USIM field

Priority

PLMN

Access Technology Identifier

EFPLMNwAcT

1st

PLMN 3

UTRAN

The test USIM is configured as bellow in tc_6_1_1_8.

Table 8.5.5.1.4

USIM field

Priority

PLMN

EFPLMNwAcT

1st

PLMN 7

EFOPLMNwAcT

1st

PLMN 5

2nd

PLMN 6

EFFPLMN

PLMN 7

Test USIM is configured as bellow for manual PLMN selection in tc_6_1_1_9.

Table 8.5.5.1.5

USIM field

Priority

PLMN

EFPLMNwAcT

1st

PLMN 3

EFOPLMNwAcT

1st

PLMN 4

2nd

PLMN 5

EFFPLMN

PLMN 5

Test USIM is configured as bellow for manual PLMN selection in tc_6_1_1_10.

Table 8.5.5.1.6

USIM field

Priority

PLMN

EFPLMNwAcT

1st

PLMN 2

EFOPLMNwAcT

1st

PLMN 5

EFFPLMN

1st

PLMN 4

The test USIM is configured as bellow in tc_6_1_1_11.

Table 8.5.5.1.7

USIM field

Priority

PLMN

EFOPLMNwAcT

1st

PLMN 2

2nd

PLMN 3

3rd

PLMN 4

EFFPLMN

PLMN 2

Test USIMs are configured as bellow for manual PLMN selection in tc_6_1_1_12. Three test USIMs are needed for the test.

Table 8.5.5.1.8: USIM A

USIM field

Priority

PLMN

EFEHPLMN

1st

PLMN 4

2nd

PLMN 2

3rd

PLMN 1

EFUST

Service n°71 Equivalent HPLMN and Service n°73 Equivalent HPLMN Presentation Indication available

EFEHPLMNPI

’02’ – Display all the available EHPLMNs

Table 8.5.5.1.9: USIM B

USIM field

Priority

PLMN

EFEHPLMN

1st

PLMN 2

2nd

PLMN 3

3rd

PLMN 1

EFUST

Service n°71 Equivalent HPLMN and Service n°73 Equivalent HPLMN Presentation Indication available

EFEHPLMNPI

’01’ – Display the highest-priority available EHPLMN only

Table 8.5.5.1.10: USIM C

USIM field

Priority

PLMN

EFEHPLMN

1st

PLMN 3

2nd

PLMN 4

3rd

PLMN 1

EFUST

Service n°71 Equivalent HPLMN available

EFEHPLMNPI

Not present

Test USIMs are configured as bellow for manual PLMN selection in tc_6_1_1_13. Two test USIMs are needed for the test.

Table 8.5.5.1.11: USIM A

USIM field

LRPLMNSI

EFLRPLMNSI

01

Table 8.5.5.1.12: USIM B

USIM field

LRPLMNSI

EFLRPLMNSI

00

Table 8.5.5.1.13: Parameters common for USIM A & USIM B

USIM field

Priority

PLMN

EFEHPLMN

1st

PLMN 5

EFEHPLMN

2nd

PLMN 4

The test USIM is configured as bellow in tc_6_1_1_15. Two test USIMs are needed for the test.

Table 8.5.5.1.14: USIM A

USIM field

Priority

PLMN

EFEHPLMN

1st

PLMN 5

EFEHPLMN

2nd

PLMN 4

Test USIM is configured as below for emergency calls in tc_6_1_2_6.

Table 8.5.5.1.15

USIM field

Priority

PLMN

EFFPLMN

PLMN 3

The test USIM is configured in tc_6_1_2_9a with "Type A" EFACC.

The test USIM is configured in tc_6_1_2_9b with "Type B" EFACC.

Test USIMs are configured as bellow for Selection of the correct PLMN and associated RAT in tc_6_2_1_1. Two test USIMs are needed for the test.

Table 8.5.5.1.16: USIM A

USIM field

Priority

PLMN

Access Technology Identifier

EFHPLMNwAcT

1st

PLMN1

GSM

EFHPLMNwAcT

2nd

PLMN1

UTRAN

Table 8.5.5.1.17: USIM B

USIM field

Priority

PLMN

Access Technology Identifier

EFHPLMNwAcT

1st

PLMN2

UTRAN

2nd

PLMN2

GSM

Test USIMs are configured as bellow for Selection of RAT for HPLMN in tc_6_2_1_2. Two test USIMs are needed for the test.

Table 8.5.5.1.18: USIM A

USIM field

Priority

PLMN

Access Technology Identifier

EFLOCI

PLMN 1

EFHPLMNwAcT

1st

PLMN2

UTRAN

2nd

PLMN2

GSM

Table 8.5.5.1.19: USIM B

USIM field

Priority

PLMN

Access Technology Identifier

EFLOCI

PLMN 1

EFHPLMNwAcT

1st

PLMN2

UTRAN

2nd

PLMN2

Test USIMs are configured as bellow for Selection of RAT for HPLMN in tc_6_2_1_6. Two test USIMs are needed for the test.

Table 8.5.5.1.20: USIM A

USIM field

Priority

PLMN

Access Technology Identifier

EFHPLMNwAcT

1st

PLMN2

UTRAN

2nd

PLMN2

GSM

EFPLMNwAcT

1st

PLMN3

UTRAN

Table 8.5.5.1.21: USIM B

USIM field

Priority

PLMN

Access Technology Identifier

EFHPLMNwAcT

1st

PLMN2

UTRAN

2nd

PLMN2

EFPLMNwAcT

1st

PLMN3

UTRAN

Test USIM for Selection of RAT for UPLMN or OPLMN in tc_6_2_1_3, tc_6_2_1_4, tc_6_2_1_7, tc_6_2_1_8 and for Selection of Other PLMN with access technology combinations"; Automatic mode in tc_6_2_1_9.

Table 8.5.5.1.22

USIM field

Priority

PLMN

Access Technology Identifier

EFHPLMNwAcT

1st

PLMN2

UTRAN

2nd

PLMN2

GSM

EFPLMNwAcT

1st

PLMN 3

UTRAN

2nd

PLMN 4

GSM

EFOPLMNwAcT

1st

PLMN 5

UTRAN

2nd

PLMN 6

GSM

Test USIM are configured as bellow for manual selection of other PLMN with access technology combinations in tc_6_2_1_5.

Table 8.5.5.1.23

USIM field

Priority

PLMN

Access Technology Identifier

EFLOCI

PLMN 7

EFFPLMN

PLMN 8

PLMN 9

Test USIM for cell reselection if cell becomes barred or for cell reselection timings requires that the USIM does not contain any preferred RAT. This specific test USIM applies to tc_6_2_2_1, tc_6_2_2_2 and tc_6_2_2_3.