How does LTE respond to UE identification requests for network authentication?


LTE (Long-Term Evolution) uses a robust authentication and key agreement procedure to ensure the security and identity verification of User Equipment (UE) accessing the network. The authentication process in LTE involves several steps, including the exchange of messages between the UE and the Evolved NodeB (eNB). Here is a detailed technical explanation of how LTE responds to UE identification requests for network authentication:

  1. Attach Procedure:
    • When a UE initially connects to the LTE network or reattaches after being in idle mode, it undergoes the attach procedure.
    • The UE sends an Attach Request message to the eNB, indicating its desire to connect to the network.
  2. Security Context Setup:
    • Before authentication, a security context needs to be established between the UE and the network. This involves the establishment of encryption keys and integrity protection keys.
    • The UE and the eNB exchange messages to set up this security context, known as the Security Mode Command and Security Mode Complete messages.
  3. Authentication Request (AUTN):
    • The eNB sends an Authentication Request message to the UE, which includes the Authentication Token (AUTN), Random Challenge (RAND), and the expected MAC (Message Authentication Code).
  4. UE Authentication:
    • The UE uses its stored secret key (Ki) to generate a response to the authentication challenge. This involves the use of the RAND, Ki, and the encryption algorithm (f1) and integrity protection algorithm (f1*) functions.
    • The UE generates a response called RES (Response), along with a MAC calculated using the expected MAC, and sends them back to the eNB in the Authentication Response message.
  5. Network Authentication:
    • The eNB forwards the received RES and MAC to the Authentication Center (AuC) in the core network.
    • The AuC uses the same algorithms and the stored Ki to independently calculate the expected RES and MAC.
    • If the calculated values match the received values from the UE, the network considers the UE authenticated.
  6. Security Activation:
    • If the authentication is successful, the eNB sends an Authentication Accept message to the UE, indicating that it is authenticated and can proceed with the establishment of a secure connection.
  7. Ciphering and Integrity Protection Activation:
    • The eNB and the UE activate the agreed-upon encryption and integrity protection algorithms using the established security context.
    • This ensures that the subsequent communication between the UE and the network is secure and protected from eavesdropping and tampering.
  8. Attach Accept:
    • After successful authentication and security context setup, the eNB sends an Attach Accept message to the UE, allowing it to access the LTE network and use its services.

In summary, LTE responds to UE identification requests through a secure and mutual authentication process involving the exchange of challenge-response messages, verification of the response at the network's Authentication Center, and subsequent activation of encryption and integrity protection for secure communication. This authentication process helps ensure the integrity and confidentiality of user data in LTE networks.