USIM in 5G Era
Mireille Pauliac
Department of Standardization and Technology, Thales, France
E-mail: mireille.pauliac@thalesgroup.com
Received 01 November 2019; Accepted 28 November 2019; Publication 04 January 2020
If you ask anybody what is the name of the card inside his mobile phone, he will for sure answer SIM card, without knowing it is an acronym for Subscriber Identity Module. But, what about the USIM (Universal Subscriber Identity Module)? The USIM plays a key role in the mobile telecommunication services since it brings a host of fundamental features that are now perfected for 5G.
This paper gives an overview of the new functionalities offered by the USIM in 5G system including new authentication schemes, subscriber privacy, Steering of Roaming, UE Parameters Update over NAS, and Long Term Key Update Procedure.
Keywords: 5G USIM, UICC, smart card, OTA, authentication, AKA, 5G-AKA, EAP-AKA′, primary authentication, secondary authentication, network slice authentication, privacy, subscriber privacy, IMSI, SUPI, SUCI, key update, long term key update, LTKUP, steering of roaming, SoR, UE parameters update.
In mobile telecommunications systems specified by the 3rd Generation Partnership Project (3GPP), the User Equipment consists of a Mobile Equipment (ME) and a Universal Integrated Circuit Card (UICC), where the UICC is a tamper-resistant entity designed to resist software and hardware attacks. The UICC can contain several applications and one of this application is the USIM.
The USIM securely stores and handles all the sensitive data related to the subscriber and the home network. The USIM is under the control of the home network operator: the home network operator chooses the data to be provisioned in the USIM before the issuance of the UICC and administrates remotely the USIM in the user equipment thanks to Over-The-Air (OTA) mechanisms. The USIM is a trust anchor in the user equipment.
This paper describes the new functionalities offered by the USIM for 5G system.
In 5G Phase 1 (Rel-15), primary authentication has been defined to be used over both 3GPP-access and non-3GPP access, while the secondary authentication has been defined to allow a user equipment to access an external data network.
The introduction of network slicing in 5G made necessary the definition of a network slice-specific authentication. It is done in 5G Phase-2 (Rel-16).
These authentications are described below. They are specified in 3GPP TS 33.501 [1].
A detailed overview of primary authentications is given in “3GPP 5G security” paper [2].
The primary authentication is a mandatory procedure to allow a user equipment to access 3GPP networks or non-3GPP networks. EAP-AKA′ or 5G-AKA are the only authentication methods allowed for primary authentication, and the subscription credentials are always stored in the USIM when the terminal supports 3GPP access capabilities.
For AKA-based primary authentication, the mutual authentication performed in the USIM and the generation of key material (the integrity key IK and the confidentiality key CK) sent by the USIM to the ME remain unchanged compared to 3G, 4G and fulfil 3GPP TS 33.102 specification [3].
The changes in the USIM for 5G primary authentication consist of the storage of new security contexts and additional key materials in the USIM depending on the configuration of the USIM. If the USIM supports the storage of 5G parameters, then the ME stores in the USIM the new 5G security context and new keys defined for 5G key hierarchy (i.e. KAUSF, KSEAF and KAMF). The USIM can store one 5G security context for 3GPP access networks and one 5G security context for non-3GPP access networks. The storage of security contexts and key material in the USIM guarantees faster reconnections in case of plastic roaming where the UICC is moved from one ME to another one.
In case of private networks (named standalone non-public networks), the authentication can rely on the EAP framework supported by 5G system. The user equipment and the serving network may support 5G AKA, EAP-AKA′, or any other key-generating EAP authentication method:
A detailed overview of secondary authentications is given in “3GPP 5G security” paper [2].
The secondary authentication is an optional authentication based on EAP and takes place between the user equipment and an external data network (DN). The choice of the EAP authentication method and the credentials is out of the scope of 3GPP. Nevertheless, an external Data Network can take the decision to secure the access to its DN by performing strong authentication thanks to EAP-AKA′ or EAP-TLS authentication methods with the presence of a USIM on a UICC in the user equipment to securely store and handle the credentials used to access the DN.
The use of a network slice-specific authentication between a user equipment and an AAA (Authentication, Authorization and Accounting) server to access a network slice is optional. The network slice-specific authentication is based on EAP framework with a User ID and credentials distinct from the 3GPP subscription credentials. It takes place after the mandatory primary authentication. The stakeholder deploying a slice can decide to have a USIM on a UICC in the user equipment to ensure a high level of security to access his slices and prevent presence of unauthorized users.
A major evolution in 5G system is the protection of the subscriber privacy.
With subscriber privacy mechanism, it is now possible to never send in clear the Subscription Permanent Identity (SUPI) on the radio interface. The SUPI in 5G is the equivalent of the IMSI (International Mobile Subscriber Identity) in 4G. The SUPI takes the format of an IMSI or a NAI (Network Access Identifier). To counteract privacy-related attacks such as false base station attack, the user equipment computes and sends the SUCI: a privacy preserving identifier containing the concealed SUPI. However, the sending of the SUCI instead of the SUPI is not mandatory, the use of the subscriber privacy mechanism depends on the home network operator decision taking into national regulations. Thanks to the USIM configuration chosen by the home network operator, the ME knows whether a SUCI has to be sent rather than the SUPI and whether the computation of the SUCI takes place in the USIM or in the ME. The Home Network Public Key used to conceal the SUPI is always provisioned and stored only in the USIM.
5G introduced the Steering of Roaming (SoR) enabling the home network to send a list of preferred PLMNs over NAS when the user equipment is in a visited network. The preferred PLMN list is dynamically built for the presence of the subscriber in this particular visited network. The target of the SOR list in the user equipment could the ME or the USIM:
In a 5G system the home network could decide to modify UE parameters over NAS (Non-Access Stratum) such as the routing indicator in the USIM. In order to secure the update of the data in the USIM over NAS, the home network operator encapsulates the routing information in secured packet as defined in 3GPP TS 31.115 [4].
There are scenarios where the mobile network operator would have interest in replacing the long term key used in the USIM for subscriber authentication. This is the Long Term Key Update Procedure (LTKUP) described in 3GPP TR 33.935 [5].
One of the solution for the LTKUP is to perform a key rotation in the USIM, as described in 3GPP TR 33.935 [5] with Solution #5 “Multiple sets of parameters on the USIM” The solution relies on the presence of several sets of parameters (K/OPc or K/TOPc) stored in the USIM. Only one set of parameters is active at a time in the USIM. The decision to launch the procedure to replace the long term key K in the USIM is taken by the home network operator. The solution requires steps when the UICC is in the personalisation centre and then when the UICC is in the field.
For each UICC, several sets of parameters (K/OPc or K/TOPc) are generated and provisioned in a USIM. But, only one set of parameters is active at a time in this USIM.
The personalisation centre sends to the network operator an output file, which contains only one single set of parameters (K and eventually OPc or TOPc). This set of parameters is provisioned in the network operator backend. The other sets of parameters generated may be retrieved on demand from the personalisation centre.
The OTA command sent to the USIM/UICC is secured thanks to secured packet mechanism specified in 3GPP TS 31.115 [4]. Optionally, a shared key called “replacement mechanism protection” key is provisioned in the UICC in order to protect in integrity the payload of the OTA command. This “replacement mechanism protection” key offers an additional level of security due to the sensitivity of the procedure. This “replacement mechanism protection” key, if present, is securely stored in the personalisation centre and never exits the personalisation centre.
Once the UICC is in a User Equipment in the field, the network operator can launch when he wants the replacement procedure as follows:
The procedure to replace the long term key K works as follows:
This paper describes the new functionalities of the USIM in 5G era. Due to the fact that the Rel-16 is not yet finished some other uses of the USIM are under discussion and will be available in the near future.
[1] 3GPP TS 33.501, “Security architecture and procedures for 5G System”, Rel-15.
[2] Anand R. Prasad, Sivabalan Arumugam, Sheeba B and Alf Zugenmaier, 3GPP 5G Security, River Publishers, May 2018.
[3] 3GPP TS 33.102, “3G security; Security architecture”, Rel-15.
[4] 3GPP TS 31.115, “Secured packet structure for (Universal) Subscriber Identity Module (U)SIM Toolkit applications”, Rel-15.
[5] 3GPP TR 33.935, “Detailed long term key update solutions”, Rel-16.
Mireille Pauliac is security expert at Thales (former Gemalto/Gemplus) and belongs to the Standardization and Technology Department. After an engineering degree in computer science from “Ecole Supérieure d’Ingénieurs en Génie Electrique” (ESIGELEC) in France, she started working in 1996 as smart card operating system developer and then joined the security experts team. She has participated in numerous projects in banking and telecommunications areas to design and review the security protocols, and leaded security evaluations for ITSEC and Common Criteria certifications. She has contributed to telecommunications standardization with active participation in security of 3GPP, TISPAN, ETSI M2M, oneM2M, LoRa Alliance, and ETSI ITS.
Journal of ICT, Vol. 8_1, 29–40. River Publishers
doi: 10.13052/jicts2245-800X.813
This is an Open Access publication. © 2020 the Author(s). All rights reserved.