Security is an important essential requirement for 4G:
- Security requirements on ME (Mobile Equipment)/USIM (Universal Subscriber Identity Module):
- Protection of integrity of the hardware, software and OS in mobile platform.
- Data control access in ME/USIM.
- Maintenance of confidentiality and integrity of data stored in the ME/USIM or transported on the interface between ME and USIM.
- User identity privacy retention to ME.
- Security requirements on radio interface and network operator:
- Entity authentication: mutual authentication between user and network shall be implemented to ensure secure service access and provision.
- Ensure confidentiality of data including user traffic and signaling data on wired or wireless interface.
- Ensure integrity and origin authentication of user traffic, signaling data and control data.
- Security of user identity: It shall protect user identity confidentiality, user location confidentiality and user untraceability.
- Lawful interception: It shall be possible for law enforcement agencies to monitor and intercept every call in accordance with national laws.
- Security visibility, configurability and scalability:
- Transparency of security features of the visited network to the user.
- Ability to negotiate acceptable security lever with the visited network when user roams outside HE (home environment).
- Scalability of the security mechanism to support increase of user and/or network elements.
No comments:
Post a Comment