{"id":36,"date":"2020-11-19T04:38:39","date_gmt":"2020-11-19T04:38:39","guid":{"rendered":"http:\/\/cybersecinfinity.in\/?p=36"},"modified":"2020-12-29T15:10:01","modified_gmt":"2020-12-29T15:10:01","slug":"5g-aka-authentication-process-3gpp-33501","status":"publish","type":"post","link":"http:\/\/cybersecinfinity.in\/index.php\/2020\/11\/19\/5g-aka-authentication-process-3gpp-33501\/","title":{"rendered":"5G AKA authentication process \u2013 (3GPP 33501)"},"content":{"rendered":"\n<p><strong><u>5G AKA authentication process \u2013 (3GPP 33501)<\/u><\/strong><\/p>\n\n\n\n<p>Hello my readers today we will talk about two ways to authenticate a UE in 5G :-<\/p>\n\n\n\n<p>5G AKA (Authentication Key Agreement)<\/p>\n\n\n\n<p>EAP AKA<\/p>\n\n\n\n<p>The below components in the 5G network architecture are instrumental in the authentication process<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/1-1.png\" alt=\"\" class=\"wp-image-45\" width=\"843\" height=\"435\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/1-1.png 918w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/1-1-300x155.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/1-1-768x397.png 768w\" sizes=\"auto, (max-width: 843px) 100vw, 843px\" \/><figcaption>Step 1 \u2013 UE searches for the SN<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>UE \u2013 User equipment<\/p>\n\n\n\n<p>SEAF \u2013 Security anchor function<\/p>\n\n\n\n<p>AUSF \u2013 Authentication server function<\/p>\n\n\n\n<p>UDM \u2013 Unified data management<\/p>\n\n\n\n<p>You can consider AUSF as the MME\/MSC and UDM as HSS \/ HLR of the older generation of 3GPP<\/p>\n\n\n\n<p>Here is the step vise authentication process for the UE to the network and vice versa :-<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>On the N1 interface UE send {N1 message with SUCI (if attach for 1st time) else 5G GUTI}<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/2-1.png\" alt=\"\" class=\"wp-image-47\" width=\"902\" height=\"437\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/2-1.png 1016w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/2-1-300x146.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/2-1-768x373.png 768w\" sizes=\"auto, (max-width: 902px) 100vw, 902px\" \/><figcaption>Step 2 \u2013 UE first time attach request to SEAF<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Quick recap on the permanent and temporary identifier used during the attach request and subsequent network usage<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>2G,3G<\/strong><\/td><td><strong>4G,5G<\/strong><\/td><td><strong>Type of subscriber identifier<\/strong><\/td><td><strong>When is this used<\/strong><\/td><\/tr><tr><td>IMSI Internation mobile subscriber identity<\/td><td>SUPI Subscriber permanent identity<\/td><td>Permanent<\/td><td>In order to avoid MITM, only during exceptional scenarios of first time attach Or When the network is unable to resolve SUPI from SUCI\/GUTI<\/td><\/tr><tr><td>TMSI Temparory mobile subscriber identity<\/td><td>GUTI Global unique temparory identifier<\/td><td>Temporary<\/td><td>Each time location is updated or attach attempt is made or call is attempted or as set in the PLMN parameters<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/3-1.png\" alt=\"\" class=\"wp-image-48\" width=\"952\" height=\"506\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/3-1.png 1012w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/3-1-300x160.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/3-1-768x409.png 768w\" sizes=\"auto, (max-width: 952px) 100vw, 952px\" \/><figcaption>Step 3 \u2013 at SEAF<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/4-1.png\" alt=\"\" class=\"wp-image-49\" width=\"1006\" height=\"461\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/4-1.png 952w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/4-1-300x138.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/4-1-768x353.png 768w\" sizes=\"auto, (max-width: 1006px) 100vw, 1006px\" \/><figcaption>Step 4 \u2013 at AUSF<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/5-1.png\" alt=\"\" class=\"wp-image-50\" width=\"1016\" height=\"473\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/5-1.png 1018w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/5-1-300x140.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/5-1-768x358.png 768w\" sizes=\"auto, (max-width: 1016px) 100vw, 1016px\" \/><figcaption>Step 5 \u2013 at UDM first time HEAV is derived<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>HEAV \u2013 Home environment authentication vector<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/6.png\" alt=\"\" class=\"wp-image-51\" width=\"1041\" height=\"449\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/6.png 1018w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/6-300x129.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/6-768x331.png 768w\" sizes=\"auto, (max-width: 1041px) 100vw, 1041px\" \/><figcaption>Step 6 \u2013 at AUSF AV<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>AV \u2013 Authentication vector<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/7.png\" alt=\"\" class=\"wp-image-52\" width=\"1055\" height=\"476\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/7.png 993w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/7-300x136.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/7-768x347.png 768w\" sizes=\"auto, (max-width: 1055px) 100vw, 1055px\" \/><figcaption>&nbsp;Step 7 \u2013 at SEAF<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/11-1024x533.png\" alt=\"\" class=\"wp-image-54\" width=\"1052\" height=\"547\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/11-1024x533.png 1024w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/11-300x156.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/11-768x400.png 768w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/11.png 1027w\" sizes=\"auto, (max-width: 1052px) 100vw, 1052px\" \/><figcaption>Step 8 \u2013 at UE [ the UE authentication is complete here]<br><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/8-1.png\" alt=\"\" class=\"wp-image-55\" width=\"1067\" height=\"513\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/8-1.png 1025w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/8-1-300x144.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/8-1-768x369.png 768w\" sizes=\"auto, (max-width: 1067px) 100vw, 1067px\" \/><figcaption>Step 9 \u2013 at SEAF [ the serving network authentication is complete here]<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-gallery aligncenter columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"457\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/9-1-1024x457.png\" alt=\"\" data-id=\"58\" data-full-url=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/9-1.png\" data-link=\"http:\/\/cybersecinfinity.in\/?attachment_id=58\" class=\"wp-image-58\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/9-1-1024x457.png 1024w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/9-1-300x134.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/9-1-768x343.png 768w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/9-1.png 1052w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul><figcaption class=\"blocks-gallery-caption\">Step 10 \u2013 at AUSF [ the home network authentication is complete here]<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/10-1-1024x481.png\" alt=\"\" class=\"wp-image-59\" width=\"1062\" height=\"498\" srcset=\"http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/10-1-1024x481.png 1024w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/10-1-300x141.png 300w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/10-1-768x361.png 768w, http:\/\/cybersecinfinity.in\/wp-content\/uploads\/2020\/11\/10-1.png 1033w\" sizes=\"auto, (max-width: 1062px) 100vw, 1062px\" \/><figcaption>Step 11 \u2013 at SEAF [ all the keys for that transactions are ready for use]<\/figcaption><\/figure>\n\n\n\n<p>As you can see now the required keys for session to continue are derived for a session <\/p>\n\n\n\n<p>Kseaf becomes the anchor key to derive Kamf, Knas, Kgnb,Knsiwf<\/p>\n\n\n\n<p>Here the subscriber is successfully authenticated, serving network has been authenticated and the home network has been authenticated. This is the change from earlier generation and added layers of authentication have been added to safeguard the consumer <\/p>\n\n\n\n<p>Do share you comments and let me know, was the article information and definitely i do welcome your comments to further improve the blog&#8230;&#8230; happy reading  <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>5G AKA authentication process \u2013 (3GPP 33501) Hello my readers today we will talk about two ways to authenticate a UE in 5G :- 5G AKA (Authentication Key Agreement) EAP AKA The below components in the 5G network architecture are instrumental in the authentication process UE \u2013 User equipment SEAF \u2013 Security anchor function AUSF<a class=\"sup-readmore\" href=\"http:\/\/cybersecinfinity.in\/index.php\/2020\/11\/19\/5g-aka-authentication-process-3gpp-33501\/\">Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-36","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/cybersecinfinity.in\/index.php\/wp-json\/wp\/v2\/posts\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/cybersecinfinity.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cybersecinfinity.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cybersecinfinity.in\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/cybersecinfinity.in\/index.php\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":6,"href":"http:\/\/cybersecinfinity.in\/index.php\/wp-json\/wp\/v2\/posts\/36\/revisions"}],"predecessor-version":[{"id":66,"href":"http:\/\/cybersecinfinity.in\/index.php\/wp-json\/wp\/v2\/posts\/36\/revisions\/66"}],"wp:attachment":[{"href":"http:\/\/cybersecinfinity.in\/index.php\/wp-json\/wp\/v2\/media?parent=36"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cybersecinfinity.in\/index.php\/wp-json\/wp\/v2\/categories?post=36"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cybersecinfinity.in\/index.php\/wp-json\/wp\/v2\/tags?post=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}