5G AKA authentication process – (3GPP 33501)

5G AKA authentication process – (3GPP 33501)

Hello my readers today we will talk about two ways to authenticate a UE in 5G :-

5G AKA (Authentication Key Agreement)

EAP AKA

The below components in the 5G network architecture are instrumental in the authentication process

Step 1 – UE searches for the SN

UE – User equipment

SEAF – Security anchor function

AUSF – Authentication server function

UDM – Unified data management

You can consider AUSF as the MME/MSC and UDM as HSS / HLR of the older generation of 3GPP

Here is the step vise authentication process for the UE to the network and vice versa :-

  1. On the N1 interface UE send {N1 message with SUCI (if attach for 1st time) else 5G GUTI}
Step 2 – UE first time attach request to SEAF

Quick recap on the permanent and temporary identifier used during the attach request and subsequent network usage

2G,3G4G,5GType of subscriber identifierWhen is this used
IMSI Internation mobile subscriber identitySUPI Subscriber permanent identityPermanentIn order to avoid MITM, only during exceptional scenarios of first time attach Or When the network is unable to resolve SUPI from SUCI/GUTI
TMSI Temparory mobile subscriber identityGUTI Global unique temparory identifierTemporaryEach time location is updated or attach attempt is made or call is attempted or as set in the PLMN parameters
Step 3 – at SEAF

Step 4 – at AUSF

Step 5 – at UDM first time HEAV is derived

HEAV – Home environment authentication vector

Step 6 – at AUSF AV

AV – Authentication vector

 Step 7 – at SEAF
Step 8 – at UE [ the UE authentication is complete here]
Step 9 – at SEAF [ the serving network authentication is complete here]
Step 11 – at SEAF [ all the keys for that transactions are ready for use]

As you can see now the required keys for session to continue are derived for a session

Kseaf becomes the anchor key to derive Kamf, Knas, Kgnb,Knsiwf

Here the subscriber is successfully authenticated, serving network has been authenticated and the home network has been authenticated. This is the change from earlier generation and added layers of authentication have been added to safeguard the consumer

Do share you comments and let me know, was the article information and definitely i do welcome your comments to further improve the blog…… happy reading

About

I am a cyber security enthusiast and since last 14 years have seen how cyber security and specifically telecommunications have evolved from hardware to private and now public clouds. I like to express my thoughts and experiences in this blog and get your views as readers and contributors to the blog and touch base with people with similar interest. Happy reading ......

View all posts by

One thought on “5G AKA authentication process – (3GPP 33501)

Leave a Reply

Your email address will not be published. Required fields are marked *