5G Authentication And Key Agreement

5G Authentication And Key Agreement

(1) Upon receipt of the aggregate authentication requirement and the aggregate MAC, i.e. Element 3, the M.M. transmits this request to the HSS at the same time as its service network SN_ID. (2) The HSS receives this aggregated message authentication requirement for the MME group and authenticates the entire MAC aggregate group: (a) HSS verifies the aggregate MAC (see (7)). b) The HSS uses a random number to calculate a temporary group key and generates an authentication disk that will be used by the MTCD to authenticate the HSS because (c)Next generates HSS for each MTCD in the group, as well as the expected XRES response to the random challenge that the HSS sends to MTCD to enable MTCD authentication via MME. calculation and XRES for all members of the group in the form of a table called the Key Index Group (ICC). The CCI for the group is presented as shown in Table 2. (d) HSS sends CCIs and (from (11) to MME. (2) Ms. receives them from the HSS and stores CCI. It is transmitted to each MTCD in the group. (3) For each MTCD, upon receipt of the authentication challenge, one obtains: (a) MTCDs authenticate the HSS of this challenge by checking the calculation (with (9), (10)).

b) Each MTCD in the group also calculates a response to the HSS challenge Group members send their response to the tier 2 element that aggregates the response in the same way as for MAC. The aggregate RES is sent to Tier 3, which regroups the response and sends it in aggregate response to the group. The procedure is the same as the aggregate mac ration. (4) The MME receives the response from the aggregate and performs the authentication as follows: (a) The MME checks whether xor xor …… b) If the audit is successful, the MTCDs are authenticated in the group. At the end of the authentication phase and the key agreement, the MTCDs generated their own s as a common secret key between each MTCD and the MME.