27.4 MS identification by long IMSI, TMSI updating and cipher key sequence number assignment
3GPP51.010-1Mobile Station (MS) conformance specificationPart 1: Conformance specificationTS
27.4.1 Definition
The IMSI and TMSI are used for identification of the MS by a GSM network. They are read from the SIM during the SIM/ME initialization procedure. Within the authentication procedure the network sends a cipher key sequence number to the MS. In addition the network may allocate a new TMSI to the MS. Cipher key sequence number and TMSI are stored in the SIM after call termination and/or at GSM session termination.
Test purpose 2) will only be verified if this test sequentially follows the previous test (27.3).
27.4.2 Conformance requirement
1. On the receipt of an IMMEDIATE ASSIGNMENT message the MS shall send PAGING RESPONSE containing the correct IMSI stored in the SIM.
3GPP TS 11.11, subclauses 11.2.1 and 11.4.2, 3GPP TS 04.08 / 3GPP TS 24.008, subclause 10.5.1.4.
2. After call termination the SIM shall contain the cipher key sequence number and TMSI received by the MS during the authentication and TMSI reallocation procedures.
3GPP TS 11.11, subclauses 11.2.2, 11.4.5 and 11.4.6, 3GPP TS 02.17, subclause 6.1.
27.4.3 Test purpose
1) To verify that the ME uses the IMSI stored in the SIM.
2) To verify that the ME does not respond to page requests containing a previous IMSI.
3) To verify that the ME can handle an IMSI of maximum length.
4) To verify that the ME correctly updates the cipher key sequence number at call termination.
5) To verify that the ME correctly updates the TMSI at call termination.
27.4.4 Method of test
27.4.4.1 Initial conditions
Prior to this test, the ME shall have been operated with a SIM containing IMSI "246813579". This will be achieved by executing the previous test (27.3) prior to this test. Only under this condition will this test be verified.
The SS transmits on the BCCH, with the following network parameters:
Attach/detach: disabled.
LAI-MCC: 246
LAI-MNC 81 or 813 (see Note 0)
LAI-LAC: 0001
Access control: unrestricted.
The default SIM is used with the following exception:
EFIMSI (IMSI)
Logically: 246811111111111 (2-digit MNC) or 246813111111111 (3-digit MNC) (see Note 0)
Coding:
B1 |
B2 |
B3 |
B4 |
B5 |
B6 |
B7 |
B8 |
B9 |
|
2-digit MNC |
08 |
29 |
64 |
18 |
11 |
11 |
11 |
11 |
11 |
3-digit MNC |
08 |
29 |
64 |
18 |
13 |
11 |
11 |
11 |
11 |
The SIM is installed into the ME and the MS is powered on.
27.4.4.2 Procedure
a) The SS sends PAGING REQUEST to the MS using the IMSI "246813579".
b) The SS sends PAGING REQUEST to the MS using the IMSI stored in the SIM.
c) After receipt of a CHANNEL REQUEST from the MS, the SS sends IMMEDIATE ASSIGNMENT to the MS.
d) After receipt of a PAGING RESPONSE from the MS, the SS sends AUTHENTICATION REQUEST to the MS containing cipher key sequence number set to binary 010.
e) After receipt of AUTHENTICATION RESPONSE from the MS, the SS sends TMSI REALLOCATION to the MS containing TMSI "32547698".
f) Within 5 s after receipt of TMSI REALLOCATION COMPLETE from the MS, the SS sends CHANNEL RELEASE to the MS.
g) To allow examination of the values in the SIM after call termination the MS shall not be soft powered down. If the test is performed with a SIM simulator, the simulation is stopped. If the test is performed with a SIM, the SIM is removed without soft powering down the MS. If this is not possible, the power supply of the ME is removed and then the SIM removed.
27.4.5 Test requirement
1) After step a) the MS shall not respond to the PAGING REQUEST.
2) After step c) the MS shall send PAGING RESPONSE to the SS containing the IMSI stored in the SIM.
3) After step e) the MS shall send TMSI REALLOCATION COMPLETE to the SS.
4) After step g) the SIM shall contain the following values.
EFLOCI (Location Information)
Logically: LAI-MCC: 246
LAI-MNC: 81 or 813 (See Note 0)
TMSI: "32547698"
Coding:
B1 |
B2 |
B3 |
B4 |
B5 |
B6 |
B7 |
B8 |
B9 |
B10 |
B11 |
|
2-digit MNC |
32 |
54 |
76 |
98 |
42 |
F6 |
18 |
xx |
xx |
xx |
xx |
3-digit MNC |
32 |
54 |
76 |
98 |
42 |
36 |
18 |
xx |
xx |
xx |
xx |
EFKc (Ciphering Key Kc)
Logically: Key Kc: xx (result of the authentication algorithm)
Sequence No: 2
Coding:
B1 |
B2 |
B3 |
B4 |
B5 |
B6 |
B7 |
B8 |
B9 |
xx |
xx |
xx |
xx |
xx |
xx |
xx |
xx |
02 |