LTE Security / Edition 1

Hardcover (Print)
Not Available on


Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms employed to meet these requirements.

Whilst the industry standards inform how to implement systems, they do not provide readers with the underlying principles behind security specifications. LTE Security fills this gap by providing first hand information from 3GPP insiders who explain the rationale for design decisions.

Key features:

  • Provides a concise guide to the 3GPP/LTE Security Standardization specifications
  • Authors are leading experts who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPP
  • Shows how GSM and 3G security was enhanced and extended to meet the requirements of fourth generation systems
  • Gives the rationale behind the standards specifications enabling readers to have a broader understanding of the context of these specifications
  • Explains why LTE security solutions are designed as they are and how theoretical security mechanisms can be put to practical use
Read More Show Less

Editorial Reviews

From the Publisher
"It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic." (Headsets, 16 February 2011)
Read More Show Less

Product Details

  • ISBN-13: 9780470661031
  • Publisher: Wiley, John & Sons, Incorporated
  • Publication date: 11/2/2010
  • Edition number: 1
  • Pages: 298
  • Product dimensions: 6.80 (w) x 9.90 (h) x 0.90 (d)

Meet the Author

Dan Forsberg received a M.Sc. degree in Computer Science (software engineering and telecommunications software) from the Helsinki University of Technology, Finland, in March 2000. He was a core member and developer of The Dynamics - HUT Mobile IP software. He worked in Nokia Research Center in Helsinki from 2000 to 2009. At Nokia Dan was involved in and led many research projects focused on mobility and security for future mobile devices. He was active in IETF and authored some Internet-Drafts and one standards track RFC in the area of user to network interfaces (EAP, AAA, PANA). In recent years, the main focus of his work has been on the SAE/LTE security standardization in the 3GPP security group (SA3). Dan led the SAE/LTE security standardization in Nokia from around 2005 to 2009. He was also nominated as one of the Nokia top inventors in 2007-2008. Dan began his PhD studies while working at Nokia and has published several scientific papers in the area of "improving and distributing session key management for mobile networks". He joined Helsinki University of Technology in 2009 to finalize his PhD studies. Dan is also a skilled software engineer, a Unix and network administration expert and established his own company in 2010 for consulting on security and software development.

Günther Horn received a PhD (Dr.rer.nat.) degree in Mathematics from the University of Tübingen, Germany, in 1985. He served as an Assistant Professor of Mathematics at the University of California at Irvine in 1985. He joined the Corporate Technology Labs of Siemens AG in Munich in 1986. In 2007, he joined Nokia Siemens Networks. He has been engaged in research on and standardization of new telecommunications systems, including security in mobile networks, fraud control, and mobile applications security. He has been active in many collaborative research projects sponsored by the European Union. In recent years, the focus of his work has been on the standardization of 3G security and SAE/LTE security in the 3GPP security group (SA3), of which he has been a member since it started in 1999. Before this, he contributed to ETSI SMG. He has published on communications security in conference proceedings, journals, and books.

Wolf-Dietrich Moeller studied Physics and Electrical Engineering in Berlin, Glasgow and Munich. With his research work on semiconductor device technology at Technische Universität München (TUM) he received his Dr.-Ing. degree in 1977. In the same year he joined the Corporate Technology Labs of Siemens AG in Munich. After leading a research group on microprocessor architectures and VLSI chip design from 1983 until 1993, in recent years his main subject has been research in security for mobile communications, device integrity and security hardware. He has been active in European and German collaborative research projects, and contributes to the standardisation of mobile security in 3GPP. Since 2007 he has worked at Nokia Siemens Networks Research and Technology Labs in research, standardisation and systems engineering for fixed and mobile networks. Recently he contributed to the book Selected Topics in Communication Networks and Distributed Systems (forthcoming).

Valtteri Niemi received a PhD degree in Mathematics from the University of Turku, Finland in 1989. After serving in various positions at University of Turku, he became an Associate Professor in Mathematics at the University of Vaasa, Finland, during 1993-97. He joined Nokia Research Center (NRC), Helsinki in 1997 where he has contributed in several roles for Nokia research in the wireless security area, including cryptological aspects. In 2008, he moved to the new NRC laboratory in Lausanne, Switzerland, where his main focus is on privacy-enhancing technologies. He was nominated as a Nokia Fellow in January 2009. He has participated to the 3GPP SA3 (security) standardization group from the beginning. During 2003-2009 he was the chairman of the group.
Before 3GPP, Niemi took part in ETSI SMG 10 for GSM security work. He has published more than 40 scientific articles and he is a co-author of three books.

Read More Show Less

Table of Contents

1 Overview of the Book

2 Background

2.1 Evolution of Cellular Systems

2.2 Basic Security Concepts

2.3 Basic Cryptographic Concepts

2.4 Introduction to LTE Standardization

2.5 Notes on Terminology

3 GSM Security

3.1 Principles of GSM Security

3.2 The Role of the SIM

3.3 Mechanisms of GSM Security

3.4 GSM Cryptographic Algorithms

4 3G Security (UMTS)

4.1 Principles of 3G Security

4.2 3G Security Mechanisms

4.3 3G Cryptographic Algorithms

4.4 Interworking between GSM and 3G security

4.5 Network Domain Security

5 3G-WLAN Interworking

5.1 Principles of 3G-WLAN Interworking

5.2 Security Mechanisms of 3G-WLAN Interworking

5.3 Cryptographic Algorithms for 3G-WLAN Interworking

6 EPS Security Architecture

6.1 Overview and Relevant Specifications

6.2 Requirements and Features of EPS Security

6.3 Design Decisions for EPS Security

6.4 Platform Security for Base Stations

7 EPS Authentication and Key Agreement

7.1 Identification

7.2 The EPS Authentication and Key Agreement Procedure

7.3 Key Hierarchy

7.4 Security Contexts

8 EPS Protection for Signalling and User Data

8.1 Security Algorithms Negotiation

8.2 NAS Signalling Protection

8.3 AS Signalling and User Data Protection

8.4 Security on Network Interfaces

8.5 Certificate Enrolment for Base Stations

8.6 Emergency Call Handling

9 Security in Intra-LTE State Transitions and Mobility

9.1 Transitions to and from Registered State

9.2 Transitions between Idle and Connected States

9.3 Idle State Mobility

9.4 Handover

9.5 Key Change on the Fly

9.6 Periodic Local Authentication Procedure

9.7 Concurrent Run of Security Procedures

10 EPS Cryptographic Algorithms

10.1 Null Algorithms

10.2 Ciphering Algorithms

10.3 Integrity Algorithms

10.4 Key Derivation Algorithms

11 Interworking Security between EPS and Other Systems

11.1 Interworking with GSM and 3G Networks

11.2 Interworking with Non-3GPP Networks

12 Security for Voice over LTE

12.1 Methods for Providing Voice over LTE

12.2 Security Mechanisms for Voice over LTE

13 Security for Home Base Station Deployment

13.1 Security Architecture, Threats and Requirements

13.2 Security Features

13.3 Security Procedures Internal to the Home Base Station

13.4 Security Procedures between Home Base Station and Security Gateway

13.5 Security Aspects of Home Base Station Management

13.6 Closed Subscriber Groups and Emergency Call Handling

14 Future Challenges

14.1 Near-term Outlook

14.2 Far-term Outlook


3GPP TRs and TSs


Further References



Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted November 4, 2014



    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)