From the course: NB-IoT (Narrowband IoT) Engineering: Deployment, Configuration, Call Flow Analysis
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
NAS authentication and security
From the course: NB-IoT (Narrowband IoT) Engineering: Deployment, Configuration, Call Flow Analysis
NAS authentication and security
After the three-step of RRC setup complete process, there is authentication and security procedure that comes into picture. Here we have three different steps that are being involved, starting with the identity request and response. The core network, which is MME, request the device permanent identity, which is IMSI, via an identity request. The device responds back with its EMSI in the identity response. Then comes the authentication procedure where the network sends an authentication request challenge. The device computes a response and sends back the authentication response, and this mutually authenticates the device and the network. Next is the security activation where the network sends a security mode command to activate the ciphering or encryption and integrity protection for all subsequent messages. The device confirms with security mode complete command from this point on all the nest messages are secured. Once the authentication and security part is complete the last part is…
Contents
-
-
-
-
-
-
-
-
(Locked)
How paging works in NB-IoT2m 41s
-
(Locked)
Configuring paging for power efficiency2m 58s
-
(Locked)
Initial registration flow of NB-IoT3m 29s
-
(Locked)
Network attach procedure overview4m 16s
-
(Locked)
Master information block (MIB-NB)2m 50s
-
(Locked)
System information block-1 (SIB1-NB)4m 17s
-
(Locked)
System information block-2 (SIB2-NB)4m 2s
-
(Locked)
RRC connection establishment overview1m 53s
-
(Locked)
NAS request4m 29s
-
(Locked)
RRC connection trilogy4m 10s
-
(Locked)
NAS authentication and security2m 5s
-
(Locked)
Registration and bearer setup4m 1s
-
(Locked)
Connection release and return to idle58s
-
(Locked)
-
-
-