Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
2.- When VLR wants to perform AKA with the UE, it selects the next
Authentication Vector from the stored ordered array and sends the
parameters RAND and AUTN to the user.
4.- The procedure has been successful for the UE. It will retrieve the CK
and IK from the USIM and transfer it to the entities that perform
Ciphering (RLC and MAC) and Integrity (RRC) functions.
5.- When the VLR/SGSN receives the response RES, it compares it with
the expected response XRES. If they match then the procedure is
successful according to the VLR/SGSN. It will transfer the CK and IK to
the entities that will perform ciphering and integrity protection.
Step#1
In the beginning both the USIM and the Network are not authenticated. That
means USIM does not know whether the network is a real network and
network does not know whether the USIM is a valid Subscriber.
Step#2
Network starts the authentication procedure by sending the User
Authentication Request with the parameter RAND and AUTN.
Step#3
After UE receives RAND and AUTN, the USIM first computes the anonymity key and retrieves the SQN
After that UE computes XMAC and compares with MAC.
If both are different UE send user authentication reject back to the VLR/SGSN.
If the USIM finds the SQN is not in the correct range, it sends synchronization failure.
Step#4
UE sends expected response RES to the VLR/SGSN.
If RES = XRES, then the authentication procedure completes
During RRC Connection Establishment when UE sends
RRC Connection Setup complete message, it transfers
the UE capability as a part of this message.