From the course: NB-IoT (Narrowband IoT) Engineering: Deployment, Configuration, Call Flow Analysis

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

NAS authentication and security

NAS authentication and security

After the three-step of RRC setup complete process, there is authentication and security procedure that comes into picture. Here we have three different steps that are being involved, starting with the identity request and response. The core network, which is MME, request the device permanent identity, which is IMSI, via an identity request. The device responds back with its EMSI in the identity response. Then comes the authentication procedure where the network sends an authentication request challenge. The device computes a response and sends back the authentication response, and this mutually authenticates the device and the network. Next is the security activation where the network sends a security mode command to activate the ciphering or encryption and integrity protection for all subsequent messages. The device confirms with security mode complete command from this point on all the nest messages are secured. Once the authentication and security part is complete the last part is…

Contents