Page 191 - From GMS to LTE
P. 191

Universal Mobile Telecommunications System (UMTS) and High-Speed Packet Access (HSPA)  177

               monitoring attacks. The values of the expiry timers are variable and are sent to the
               mobile device during connection establishment. Upon expiry, a new set of ciphering
               and IKs are generated with a reauthentication between the mobile device and the
               network.
                Authentication, ciphering and integrity checking are performed independently for
               circuit‐switched and packet‐switched connections. This is because the MSC handles
               circuit‐switched calls while the SGSN is responsible for packet sessions. As these
               devices are independent they have to use different sets of authentication vectors and
               sequence numbers.
                UMTS also introduces new algorithms to calculate the different parameters used for
               authentication, ciphering and integrity checking. These are referred to as f0–f9. Details
               on the purpose and use of these algorithms can be found in 3GPP TS 33.102 [9].
                On the user side all actions that require the secret key are performed on the SIM card,
               to protect the secret key. As older GSM SIM cards cannot perform the new UMTS
               authentication procedures, a backward compatibility mode has been specified to enable
               UMTS‐capable mobile devices to use UMTS networks with an old GSM SIM card. The
               UMTS ciphering and IKs are then computed by the mobile device based on the GSM
               CK (note: not the secret key!) that is returned by the SIM card. A drawback of this fall-
               back method is, however, that although the network can still properly authenticate the
               mobile device, the reverse is not possible as the validation of the AUTN on the user’s
               device requires the secret key, which is only stored in the SIM card. On the network
               side, the HLR is aware that the subscriber uses a non‐UMTS‐capable SIM card and
               generates an adapted authentication vector without an AUTN.



               3.10   High‐Speed Downlink Packet Access (HSDPA) and HSPA+

               UMTS networks today no longer use DCHs for high‐speed packet transfer. With 3GPP
               Release 5, HSDPA was introduced to allow more flexibility for bursty data transmis-
               sions and to deliver much higher datarates per cell and per user than before. Datarates
               that could be achieved in practice at first ranged between 1 and 8 Mbit/s depending on
               the radio signal conditions and distance to the base station. With further extensions to
               HSDPA in the subsequent versions of the 3GPP specifications described in this chapter
               and used in practice today, even higher datarates are possible, exceeding 30 Mbit/s
               under ideal radio signal conditions.
                Important standards documents that were created or enhanced for HSDPA are the
               overall system description Stage 2 in 3GPP TS 25.308 [10], the physical layer descrip-
               tion TR 25.858 [11], physical layer procedures in TS 25.214 [12], Iub and Iur interface
               enhancements in TR 25.877 [13], RRC extensions in TS 25.331 [2] and signaling proce-
               dure examples in TS 25.931 [14].

               3.10.1  HSDPA Channels
               Figures 3.38 and 3.39 show how HSDPA combines the concepts of dedicated and shared
               channels. For user data in the downlink direction one or more High‐Speed Physical
               Downlink Shared Channels (HS‐PDSCH) are used. These can be shared between
                 several users. Hence, it is possible to send data to several subscribers simultaneously or
   186   187   188   189   190   191   192   193   194   195   196