This course provides a detailed overview of the security environment developed for LTE networks, including the LTE Authentication and Key Agreement (AKA) procedures and the provisions for Non-Access Stratum, Access Stratum, Access Network and Core Network security.
Who would benefit
This course is designed for engineers, managers and other personnel who have a need to acquire a technical overview of the security environment employed within LTE networks. It will also be of benefit to those in the wider technical community who have a need to understand the security protocols employed by cellular networks.
Attendance on this course assumes previous attendance on the LTE Engineering Overview course (LT3600) or equivalent basic LTE knowledge. An understanding of legacy 2G and 3G security procedures would be an advantage as would a basic understanding of LTE network architecture and functionality.
Topic areas include
- Security threats and mitigations
- 3GPP security strata and the LTE security architecture
- Non-Access Stratum, Access Stratum, Access Network and Core Network Security
- Overall AKA process
- Security contexts
- Subscriber and UE identifiers
- Authentication process, vectors and algorithms
- Key agreement procedures
- AKA keys and algorithms
- Key hierarchy, key sets and key set identifiers
- Key derivation functions
- KeNB chaining and the NH (Next Hop) key
- EEA and EIA security algorithms
- Security procedures
We can arrange classroom training, one to one training, or online training to suit your requirements. Learn more
We are pleased to be associated with some unique training locations in the UK and further afield. Learn more