Figure 1 | Overview of the security architecture |
Figure 2 | Overview of the ME registration and connection principles within UMTS for the separate CN architecture case when the CN consists of both a CS service domain with evolved MSC/VLR, 3G_MSC/VLR, as the main serving node and an PS service domain with evolved SGSN/GGSN, 3G_SGSN and 3G GGSN, as the main serving nodes (Extract from TS 23.121 - Figure 4-8) |
Figure 3 | TMSI allocation |
Figure 4 | Identification by the permanent identity |
Figure 5 | Authentication and key agreement |
Figure 6 | Distribution of authentication data from HE to VLR/SGSN |
Figure 7 | Generation of authentication vectors |
Figure 8 | Successful UMTS Authentication and Key Agreement |
Figure 9 | User authentication function in the USIM |
Figure 10 | Construction of the parameter AUTS |
Figure 11 | Distribution of IMSI and temporary authentication data within one serving network domain |
Figure 12 | Resynchronisation mechanism |
Figure 13 | Reporting authentication failure from VLR/SGSN to HLR |
Figure 14 | Local authentication and connection set-up |
Figure 15a | RNC periodic local authentication procedure |
Figure 16 | Derivation of MAC-I (or XMAC-I) on a signalling message |
Figure 16a | The structure of COUNT-I |
Figure 16b | Ciphering of user and signalling data transmitted over the radio access link |
Figure 16c | The structure of COUNT-C for all transmission modes |
Figure 18 | Authentication and key agreement of UMTS subscribers |
Figure 19 | Authentication and key agreement for GSM subscribers |
Figure 20 | SRVCC handover from GERAN to HSPA |
Figure J.1-1 | Construction of the parameter AUTS with a f5** function |