NR-AS Security Command


In 5G (New Radio or NR), the NR-AS (Access Stratum) Security Command is a signaling message used to manage and configure security-related parameters and procedures within the Access Stratum of the NR network. Access Stratum deals with the lower layers of communication and includes functionalities related to radio access, mobility management, and security. The NR-AS Security Command is crucial for ensuring secure communication between the User Equipment (UE) and the network. Let's explore the technical aspects of this command:

  1. Security Context Setup:The process begins with the establishment of a security context between the UE and the network. This involves setting up keys, algorithms, and other security parameters.
  2. Security Algorithm Negotiation:The network and the UE negotiate the security algorithms to be used for confidentiality, integrity protection, and authentication during communication.
  3. Generation of Security Keys:The network generates security keys, such as KeNB, KeNB*, and KeNB*, which are shared securely with the UE for securing the communication.
  4. Security Associations:The NR-AS Security Command configures and manages security associations between the UE and the network, establishing a secure context for data transmission.
  5. Ciphering Configuration:The command configures ciphering parameters, specifying the algorithms and keys to be used for encrypting and decrypting user data to ensure confidentiality.
  6. Integrity Protection Configuration:The command configures parameters for integrity protection, ensuring that the data remains intact and unaltered during transmission.
  7. MAC (Message Authentication Code) Generation:The network generates MACs for security verification, which are then shared with the UE. These MACs are used for integrity checking during communication.
  8. KeNB Update:The command may update the KeNB (Key for New Radio Bearer) to ensure that the security keys remain up to date and secure.
  9. Security Mode Command:In some instances, the NR-AS Security Command may be part of a broader Security Mode Command, which encompasses security-related configurations and updates.
  10. Security Activation:The UE activates the configured security mechanisms, including ciphering and integrity protection, based on the parameters received in the NR-AS Security Command.
  11. Confirmation and Acknowledgment:The UE acknowledges the successful application of security configurations, allowing for secure communication to commence.
  12. Security Context Maintenance:The UE and the network maintain the security context throughout the communication session, periodically updating keys and security parameters to ensure ongoing security.

In summary, the NR-AS Security Command is a critical component for establishing and configuring security-related parameters and procedures within the Access Stratum of the 5G NR network. This command plays a vital role in ensuring secure communication between the UE and the network.