lteinspector a systematic approach for adversarial testing ......lteinspector: a systematic approach...

37
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta Mehnaz*, Elisa Bertino* Purdue University*, University of Iowa†

Upload: others

Post on 10-Mar-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE

Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta Mehnaz*, Elisa Bertino*

Purdue University*, University of Iowa†

Page 2: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

2

Critical Infrastructure using Cellular Network

Page 3: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Security and Privacy Threats on Cellular Network

3

IMSI

No Service

No Service

No Service

No Service

IMSI = International Mobile Subscriber Identity

Page 4: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

4

NoSystematicApproach

Noadversary,justanalyzetheperformance,andreliability

Limitations of Existing Attack Finding Strategies for Cellular Networks

q  Is it possible to build a Systematic framework for adversarially analyzing the cellular network specification in order to find security and privacy related problems?

Page 5: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

5

Scope

5

Man-in-the-MiddleAttacker Spuriousbilling Lifethreateningrisks

Attach, Detach, Paging, Handover, VoLTE, SMS, etc.

Attach

Detach VoLTE

Paging Handover

SMS

Page 6: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings&AttackValidation

ResponsibleDisclosureandImpact

FutureWork

Conclusion

6

Page 7: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

q  Stateful procedures and multiple participants

q  4G LTE lacks formal specification

ü written in natural language

q  Closed system ü Proprietary

q  Legal barrier ü Licensed spectrum

Challenges

7

Page 8: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings&AttackValidation

ResponsibleDisclosureandImpact

FutureWork

Conclusion

8

Page 9: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

MME

HSS

SGW

PCRF

PGW

Evolved Packet Core (EPC)

Internet

UE

eNodeB

eNodeB

eNodeB

eNodeB

eNodeB

eNodeB

eNodeB

eNodeB

Background: LTE Architecture

Page 10: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Background (Attach)

10

Identification Authentication Securityalgorithmnegotiation

TMSIExchange

Attach Request (IMSI/IMEI, UE’s Security Capabilities)

Connection Setup

Challenge (LTE: Authentication Request)

Response (LTE: Authentication Response)

Select Security Algorithm (LTE: Security Mode Command)

Confirm Security Algorithm (LTE: Security Mode Complete)

Network accepts the attach and allocates temporary identity (LTE: Attach Accept)

Confirm Attach and new temporary identity(LTE: Attach Complete)

UE Core Network eNodeB

Page 11: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Background (Paging & Detach)

11

paging_request

Paging

UE MME eNodeB

detach_request

detach_accept

Page 12: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings&AttackValidation

ResponsibleDisclosureandImpact

FutureWork

Conclusion

12

Page 13: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Adversary Model

q Dolev-YaomodelØ EavesdropØ DropormodifyØ InjectØ Adherestocryptographicassumptions

q WhyDolev-Yaomodel?Ø PowerfuladversaryØ Automatictools(ProVerif,Tamarin)canleverage

13

Page 14: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Insight

q  Property characteristics§  Temporal ordering of events§  Cryptographic constructs§  Linear integer arithmetic and other predicates

q  Intuition: ü  Model checkerü  Cryptographic protocol verifier

14

How can we leverage reasoning power of these two?

temporal trace property

&Linear integer arithmetic

CryptographicConstructs

Page 15: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

LTEInspector

UEstatemachine Corenetworkstatemachine

Adversarialmodel ThreatinstrumentedabstractLTEecosystemmodel

Modelchecker

Desiredpropertiesfromstandard

Counter-example

Crypto.protocolverifier

Domainknowledge

Testbed

Attacks

Page 16: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Abstract LTE Model

16

Standard

attach_request∕

MME_sqn=MME_sqn+1, auth_request

1MME

waits for auth_response

MME authenticates

UE

auth_failure∕— 2

attach_request∕

MME_sqn =MME_sqn+1, auth_request

auth_response∧xres_matches_s

res∕

Security_mode_command

attach_request∕MME_sqn =

MME_sqn + 1, auth_request

34

5

6

MME disconnected

UE disconnected

mobile_restart

∕attach_request 1

auth_request∧

(¬mac_failure ∧

(UE_sqn≤xsqn≤UE_sqn

+ range))

∕UE_sqn = xsqn + 1,

auth_response

5

mobile_restart∕attach_request 8

auth_request∧

(mac_failure ∨

¬(UE_sqn ≤xsqn≤UE_sqn + range)) ∕ auth_failure

2

auth_request∧

(¬mac_failure ∧

(UE_sqn≤xsqn

≤UE_sqn + range))∕UE_sqn = xsqn+1,auth_response

7

𝑎𝑢𝑡ℎ_𝑟𝑒𝑗𝑒𝑐𝑡∨𝑑𝑒𝑡𝑎𝑐ℎ_𝑟𝑒𝑞𝑢𝑒𝑠𝑡∕— 6

auth_request∧

(mac_failure ∨ ¬(UE_sqn ≤xsqn≤UE_sqn + range))

∕ auth_failure

9𝑎𝑢𝑡ℎ_𝑟𝑒𝑗𝑒𝑐𝑡∨

𝑑𝑒𝑡𝑎𝑐ℎ_𝑟𝑒𝑞𝑢𝑒𝑠𝑡∕— 4

mobile_restart

∕attach_request

3

UE

waits for auth_request

UE authenticates

MME

UEDisconnected

UEwait for

auth request

UEauthenticates

MME

 mobile restart/attach request

Àauth request ^(mac failure _ ¬(ue sqn xsqn ue sqn+ range))

/auth failure

Ãmobile restart/attach request

Õ(auth reject _ detach request)/�

Œauth request ^(¬mac failure ^ (ue sqn xsqn

< ue sqn+ range)/ue sqn = xsqn+ 1, auth response

œ(auth reject _ detach request)/�

–auth request ^(¬mac failure ^ (ue sqn xsqn

< ue sqn+ range))/ue sqn = xsqn+ 1, auth response

—mobile restart/attach request

“auth request ^(mac failure _ ¬(ue sqn xsqn ue sqn+ range))

/auth failure

MMEDisconnected

MMEwait for

auth response

MMEauthenticates

UE

¿attach request/mme sqn = mme sqn+ 1,

auth request

¡auth failure/�

¬auth response ^¬xres matches sres/auth reject

√attach request/mme sqn = mme sqn+ 1, auth request

ƒauth response ^xres matches sres/

security mode command

≈attach request/mme sqn =mme sqn+ 1, auth request

Attacker controlledUE to MME

channel

Attacker controlledMME to

UE channel

UEDisconnected

UEwaitfor

authrequest

UEauthenticates

MME

 mobilerestart/attachrequest

Àauthrequest^(macfailure_¬(uesqnxsqnuesqn+range))

/authfailure

Ãmobilerestart/attachrequest

Õ(authreject_detachrequest)/�

Œauthrequest^(¬macfailure^(uesqnxsqn

<uesqn+range)/uesqn=xsqn+1,authresponse

œ(authreject_detachrequest)/�

–authrequest^(¬macfailure^(uesqnxsqn

<uesqn+range))/uesqn=xsqn+1,authresponse

—mobilerestart/attachrequest

“authrequest^(macfailure_¬(uesqnxsqnuesqn+range))

/authfailure

MMEDisconnected

MMEwaitfor

authresponse

MMEauthenticates

UE

¿attachrequest/mmesqn=mmesqn+1,

authrequest

¡authfailure/�

¬authresponse^¬xresmatchessres/authreject

√attachrequest/mmesqn=mmesqn+1,authrequest

ƒauthresponse^xresmatchessres/

securitymodecommand

≈attachrequest/mmesqn=mmesqn+1,authrequest

AttackercontrolledUEtoMME

channel

AttackercontrolledMMEto

UEchannelq SpecificationModelforNASlayer(UE-MME)interactions§  Propositionallogiclevel§ Modelmessagetypesonly,notmessagedata

§  Abstractawaycryptographicconstructs

§  Twounidirectionalchannels

Page 17: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Adversarial Model Instrumentor

17

𝑚↓𝑈𝐸  = attach_request

UEDisconnected

UEwait for

auth request

UEauthenticates

MME

 mobile restart/attach request

Àauth request ^(mac failure _ ¬(ue sqn xsqn ue sqn+ range))

/auth failure

Ãmobile restart/attach request

Õ(auth reject _ detach request)/�

Œauth request ^(¬mac failure ^ (ue sqn xsqn

< ue sqn+ range)/ue sqn = xsqn+ 1, auth response

œ(auth reject _ detach request)/�

–auth request ^(¬mac failure ^ (ue sqn xsqn

< ue sqn+ range))/ue sqn = xsqn+ 1, auth response

—mobile restart/attach request

“auth request ^(mac failure _ ¬(ue sqn xsqn ue sqn+ range))

/auth failure

MMEDisconnected

MMEwait for

auth response

MMEauthenticates

UE

¿attach request/mme sqn = mme sqn+ 1,

auth request

¡auth failure/�

¬auth response ^¬xres matches sres/auth reject

√attach request/mme sqn = mme sqn+ 1, auth request

ƒauth response ^xres matches sres/

security mode command

≈attach request/mme sqn =mme sqn+ 1, auth request

Attacker controlledUE to MME

channel

Attacker controlledMME to

UE channel

𝑚↓𝑎𝑑𝑣  = no_operation (drop)

𝑚↓𝑎𝑑𝑣  = detach_request (inject)

adversary_turn

ΥΕ ΜΜΕ

Dolev Yao Attacker attach_request

auth_response

sec_mode_command

attach_complete

auth_request

sec_mode_command

attach_accept

paging_request

Page 18: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Model Checker

q TemporaltracepropertiesØ Liveness–somethinggoodeventuallyhappensØ Safety–nothingbadhappens

q NuSMV

18

UE disconnected

mobile_restart

∕attach_request 1

auth_request∧

(¬mac_failure ∧

(UE_sqn≤xsqn≤UE_sqn

+ range))

∕UE_sqn = xsqn + 1,

auth_response

5

mobile_restart∕attach_request 8

auth_request∧

(mac_failure ∨

¬(UE_sqn ≤xsqn≤UE_sqn + range)) ∕ auth_failure

2

auth_request∧

(¬mac_failure ∧

(UE_sqn≤xsqn

≤UE_sqn + range))∕UE_sqn = xsqn+1,auth_response

7

𝑎𝑢𝑡ℎ_𝑟𝑒𝑗𝑒𝑐𝑡∨𝑑𝑒𝑡𝑎𝑐ℎ_𝑟𝑒𝑞𝑢𝑒𝑠𝑡∕— 6

auth_request∧

(mac_failure ∨ ¬(UE_sqn ≤xsqn≤UE_sqn + range))

∕ auth_failure

9𝑎𝑢𝑡ℎ_𝑟𝑒𝑗𝑒𝑐𝑡∨

𝑑𝑒𝑡𝑎𝑐ℎ_𝑟𝑒𝑞𝑢𝑒𝑠𝑡∕— 4

mobile_restart

∕attach_request

3

UE

waits for auth_request

UE authenticates

MME

𝞿↓1 : It is always the case that whenever UE is in the wait for auth request, it will eventually authenticate MME.

attach_request

authentication_reject

UE

waits for auth_request

UE authenticates

MME

Emergencycallsonly

MME Victim UE

Page 19: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Cryptographic Protocol Verifier

19

q Injective-correspondence(authentication)Everyauthentication_rejectmessagereceivedbyUEmustbesentbythecorenetwork

q ProVerif§  Secrecy§ Authenticity§ Observationalequivalence

Page 20: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Testbed Validation

20

q  Malicious eNodeB setup (USRP, OpenLTE, srsLTE)

q  Malicious UE setup (USRP, srsUE)

q  COTS smartphones

q  SIM cards of four major US carriers

q  Custom-built core network q USRP, OpenLTE, srsLTE, and USIM

Page 21: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings&AttackValidation

ResponsibleDisclosureandImpact

FutureWork

Conclusion

21

Page 22: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Findings

22

Attack Procedures Responsible NotableImpacts

AuthSync.Failure Attach 3GPP DoS

Traceability Attach carriers Coarse-grainedlocationtracking

Numbusingauth_reject Attach 3GPP,smartphones DoS

Authenticationrelay Attach 3GPP Locationspoofing

PagingChannelHijacking Paging 3GPP DoS

StealthyKicking-off Paging 3GPP DoS,coarse-grainedlocationtracking

Panic Paging 3GPP Artificialchaosforterroristactivity

EnergyDepletion Paging 3GPP Batterydepletion/DoS

Linkability Paging 3GPP Coarse-grainedlocationtracking

Targeted/Non-targetedDetach

Detach 3GPP DoS

q Uncovered10newattacks

q  Identified9priorattacks:IMSI-catching,DoS,Linkability,MitMin3Gand2G,etc.

Page 23: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Authentication Synchronization Failure Attack

23

attach_request (IMSI)

….

q Assumption:Ø  VictimUE’sIMSIØ  MaliciousUEsetup

𝑆𝑄𝑁↓𝑈𝐸 =𝑥

𝑆𝑄𝑁↓𝐶𝑁 =𝑥

𝑆𝑄𝑁↓𝐶𝑁 ++

attach_request (IMSI) 𝑆𝑄𝑁↓𝐶𝑁 ++

attach_request (IMSI) 𝑆𝑄𝑁↓𝐶𝑁 ++attach_request (MSI) 𝑆𝑄𝑁↓𝐶𝑁 ++UEandCNsequencenumbersgetdesynchronized

𝐼𝑀𝑆𝐼

Victim UE Core Network Malicious UE

Page 24: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Panic Attack

24

paging(ETWS)

Page 25: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Attack Chaining (Authentication Relay or Mafia Attack)

25

Connected

NIDAttach_request

Attach_request

Attach_requestAuthentication_request

Authentication_request

Authentication_requestAuthentication_response

Authentication_response

Authentication_response

Indiana

CaliforniaIndiana

Page 26: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings&AttackValidation

ResponsibleDisclosureandImpact

FutureWork

Conclusion

26

Page 27: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Responsible Disclosure and Impacts

q  Mobile network operators

q  Resolved the issue of using EEA0 (no encryption)

q  Other issues are in progress

27

Page 28: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings&AttackValidation

ResponsibleDisclosureandImpact

FutureWork

Conclusion

28

Page 29: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Future Work

29

NAS

RRC RRC RRC

NAS

RRC

UE MME eNodeB

PCCH-Message ::= SEQUENCE   +-message ::= CHOICE [c1]     +-c1 ::= CHOICE [paging]       +-paging ::= SEQUENCE [0110]         +-pagingRecordList ::= SEQUENCE OF OPTIONAL:Omit         +-systemInfoModification ::= ENUMERATED [true] OPTIONAL:Exist         +-etws-Indication ::= ENUMERATED [true] OPTIONAL:Exist         +-nonCriticalExtension ::= SEQUENCE OPTIONAL:Omit

Page 30: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings&AttackValidation

ResponsibleDisclosureandImpact

FutureWork

Conclusion

30

Page 31: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Conclusion Proposed a systematic approach for analyzing the specification

Uncovered 10 new attacks and 9 prior attacks

Validated most of the attacks in a testbed

https://github.com/relentless-warrior/LTEInspector

31

Page 32: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Questions

32

Page 33: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE

Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta Mehnaz*, Elisa Bertino*

Purdue University*, University of Iowa†

Page 34: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Cryptographic Protocol Verifier

34

q Injective-correspondence(authentication)Everyauthentication_rejectmessagereceivedbyUEmustbesentbythecorenetwork

q ProVerif§  Secrecy§ Authenticity§ Observationalequivalence(hyper-properties)

q WhynotProVerifonly?§  Richtemporaltraceproperties§ Constraintsonlinearintegerarithmetic

Page 35: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Traceability attack

35

attach_request

attach_complete

….

….

security_mode_command (MAC, nonce)

security_mode_complete

security_mode_command

security_mode_reject

security_mode_command

q Assumption:Ø  VictimUE’sIMSIØ  MaliciousUEsetupØ  secutity_mode_command

Page 36: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Numb Attack

q Assumption:maliciouseNodeBsetup•  LearnfromSystemInformationBlockmessages

ConnectedNIDauthentication_reject

tracking_area_update_request

Emergencycallsonly

Page 37: LTEInspector A Systematic Approach for Adversarial Testing ......LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Time

Time

Background (Attach)

37

Identification Authentication Securityalgorithmnegotiation

TMSIExchange

Attach Request (IMSI/IMEI, UE’s Security Capabilities)

Connection Setup

Time

Challenge (LTE: Authentication Request)

Response (LTE: Authentication Response)

Select Security Algorithm (LTE: Security Mode Command)

Confirm Security Algorithm (LTE: Security Mode Complete)

Network accepts the attach and allocates temporary identity (LTE: Attach Accept)

Confirm Attach and new temporary identity(LTE: Attach Complete)

UE MME eNodeB