Sunteți pe pagina 1din 7

M900/M1800 Base Station Subsystem

Signaling Analysis Manual Contents

Contents

7 Ciphering Procedure..................................................................................................................7-1
7.1 Overview of Ciphering..................................................................................................................................7-2
7.2 Ciphering Procedure......................................................................................................................................7-2
7.2.1 Signaling Procedure .............................................................................................................................7-2
7.2.2 Description of the Procedure................................................................................................................7-3
7.3 Changing the Ciphering Mode ......................................................................................................................7-3
7.4 Signaling Procedure in the BSC....................................................................................................................7-4
7.5 Abnormal Cases and Troubleshooting...........................................................................................................7-4
7.5.1 Ciphering Rejected...............................................................................................................................7-4
7.5.2 MS Not Ciphering................................................................................................................................7-5

Issue 02 (2007-06-30) Huawei Technologies Proprietary i


M900/M1800 Base Station Subsystem
Figures Signaling Analysis Manual

Figures

Figure 7-1 Ciphering procedure .........................................................................................................................7-2

ii Huawei Technologies Proprietary Issue 02 (2007-06-30)


M900/M1800 Base Station Subsystem
Signaling Analysis Manual 7 Ciphering Procedure

7 Ciphering Procedure

About This Chapter

Generally, the ciphering takes place at the service requests, such as location updating, service
access, and inter-BSC handover. The ciphering requires the support of the GSM network
equipment, especially the BTS, and also depends on the encryption support capacity of the
MS.
The following table lists the contents of this chapter.

Section Describes

7.1 Overview of Ciphering The overview of ciphering


7.2 Ciphering Procedure The ciphering procedure
7.3 Changing the Ciphering Mode The changing of the ciphering mode
7.4 Signaling Procedure in the BSC The internal processing procedure of the BSC
7.5 Abnormal Cases and The abnormal procedure and corrective procedure
Troubleshooting

Issue 02 (2007-06-30) Huawei Technologies Proprietary 7-1


M900/M1800 Base Station Subsystem
7 Ciphering Procedure Signaling Analysis Manual

7.1 Overview of Ciphering


The features of radio transmission may affect the privacy and benefit of an MS. Wiretapping
and stealthy use affects the analog mobile communication. The data transmission of the GSM
can get good privacy.
Ciphering is used to secure the information exchange between an MS and a BTS. The
information includes signaling information and user information. The user information
includes user data and user voice.
The radio resource management (RR) determines whether the ciphering mode is used. The
network initiates ciphering and the BTS performs ciphering. To cipher the user data, you must
enter the corresponding parameters into the ciphering program. The AUC generates the
ciphering key Kc. The Kc exists in the MSC/VLR. Then it is sent to the BTS before ciphering.
For details about the ciphering procedure, refer to the 3GPP Rec.24008.

7.2 Ciphering Procedure


7.2.1 Signaling Procedure
Figure 7-1 Ciphering procedure

MS BTS BSC MSC

Ciphering Mode
Encryption Mode Command(1)
Ciphering Mode Command(2)
Command(3)
SDCCH
Ciphering Mode
Complete(4)
Ciphering Mode
SDCCH
Complete(5)

In the ciphering mode setting procedure, the MSC sends a Cipher Mode Command message
to the BSC. The message contains the required ciphering algorithm, the ciphering key Kc
(including the requirement for deciphering), and the information about whether an MS is
required to contain an international mobile subscriber identity (IMSI) in a Cipher Mode
Complete message. :
According to the ciphering algorithm in the Cipher Mode Command sent by the MSC, the
ciphering algorithm allowed by the BSC, and the ciphering algorithm supported by the MS,
the BSC determines which algorithm is used, and then the BSC sends the decision to the BTS.
The BTS sends the Cipher Mode Command message to the MS to inform the MS of the
chosen ciphering algorithm.

7-2 Huawei Technologies Proprietary Issue 02 (2007-06-30)


M900/M1800 Base Station Subsystem
Signaling Analysis Manual 7 Ciphering Procedure

Upon receipt of the Cipher Mode Complete message, the MS starts to send the ciphering
mode, and then the MS responds with a Cipher Mode Complete message to the BSS.
Upon receipt of the Cipher Mode Complete message from the MS, the BSC informs the MSC
of the completion of the ciphering.

7.2.2 Description of the Procedure


z A5 ciphering algorithm
As specified in the GSM protocol, there are eight ciphering algorithms, A5/0–A5/7. A5/0
indicates "not ciphered." The network initiates the ciphering mode setting procedure. The
required ciphering algorithm is indicated in the Ciphering Information unit of the Cipher
Mode Command message.
z The selection of ciphering algorithms
When an MS initiates a call request, classmark 2 and classmark 3 are contained in the
Configuration Management Service Request message (In system information, when
ECSC=1, the MS reports classmark 3 in the Configuration Management Service Request
message. When ECSC = 0, the MS can report classmark 3 only by changing the
classmark or in the process of updating the classmark. Therefore, Huawei recommends
that ECSC be configured as "1" in ciphering). The Configuration Management Service
Request message contains the information about the support of the ciphering algorithms
by the MS. According to the ciphered data configuration, the MSC sends the Cipher
Mode Command message. The BSC comprehensively considers the ciphering algorithm
allowed in the Cipher Mode Command that is sent by the MSC, the ciphering algorithm
allowed in the BSC data configuration, and the one supported by the MS and is reported
in the Configuration Management Service Request. Huawei integrates the situations of
the MSC, the BTS, and the MS. Then Huawei selects their intersection. Then the BSC
selects an applicable algorithm from the intersection in reverse order, that is, the priority
of the algorithm selection for the BSC is A5/7 > A5/6 > A5/5 > A5/4 > A5/4 > A5/3 >
A5/2 > A5/1 > A5/0.
z The ciphering in the handover procedure
If one of A interfaces of two BSSs is in PHASE I, because of the defective ETSI GSM
PHASE I protocol (without ciphering mode setting information unit in handover
command), they can cooperate normally (The inter-BSC handover is normal.) only when
they choose the same ciphering algorithm. (For example, they can choose only A5/0 or
A5/2.) Otherwise, according to the specific situation of the opposite party, the destination
MSC or the destination BSC (or the source MSC or the source BSC) has to make a
special processing, such as the handover command used to modify the inter-BSC
handover. Therefore, in the interconnection of A interfaces under ciphered mode, you
must know whether the BSCs and the MSCs of different manufacturers requires a special
data configuration for the ciphering function. Then the unsuccessful inter-BSC
interconnection and handover can be avoided.

7.3 Changing the Ciphering Mode


If the ciphering mode is changed, the system performs the following steps:
Step 1 The transmission of the BTS is configured in old mode and the reception of the BTS is
configured in new mode.
Step 2 The MS is configured in a completely new mode, including transmission and reception.
Step 3 The BTS is configured in a completely new mode.

Issue 02 (2007-06-30) Huawei Technologies Proprietary 7-3


M900/M1800 Base Station Subsystem
7 Ciphering Procedure Signaling Analysis Manual

----End

The BTS completes and manages the ciphering, not the BSC. The completion of ciphering
requires the configuration of the BTS and the configuration of the MS. In fact, the ciphering
mode made by the MSC changes the command and the BTS completes the operation. :

7.4 Signaling Procedure in the BSC


Step 1 After receiving the Cipher Mode Command from the MSC, the BSC checks the classmark of
the MS and “Encryption Algorithm” in “Cell Configuration Data Table.”
Step 2 The BSC comprehensively considers the ciphering algorithm allowed in the Cipher Mode
Command that is sent by the MSC, the ciphering algorithm allowed in the BSC data
configuration, and the ciphering algorithm that is supported by the MS and is reported in the
Configuration Management Service Request. :
Step 3 The BSC selects an applicable algorithm from the intersection in reverse order, that is, the
priority of the algorithm selection for the BSC is A5/7 > A5/6 > A5/5 > A5/4 > A5/4 > A5/3
> A5/2 > A5/1 > A5/0.
----End

7.5 Abnormal Cases and Troubleshooting


7.5.1 Ciphering Rejected
Case Description
The BSS sends the Cipher Mode Reject message to the MSC.

Probable Causes
The abnormal procedure is caused by the following causes:
z When the BSS does not support the ciphering algorithm indicated in the Cipher Mode
Command message, the BSS responds with a Cipher Mode Reject message to the MSC
with the cause "ciphering algorithm not supported." :
z When the MSC requires changing the ciphering algorithm, the BSS starts ciphering.
Then the BSS should respond with a Cipher Mode Reject message to the MSC.

Troubleshooting
z Cause (1)
Check whether the ciphering algorithm indicated in the Cipher Mode Command message
is supported on the BSS side.
z Cause (2)
Check whether the BSS starts ciphering.

7-4 Huawei Technologies Proprietary Issue 02 (2007-06-30)


M900/M1800 Base Station Subsystem
Signaling Analysis Manual 7 Ciphering Procedure

7.5.2 MS Not Ciphering


Case Description
After the MS receives the Ciphering Mode Command message, no further action is taken.

Probable Causes
A valid Ciphering Mode Command message is defined to be one of the following:
z One that indicates "start ciphering" and is received by the MS in the "not ciphered" mode
z One that indicates "no ciphering" and is received by the MS in the "not ciphered" mode
z One that indicates "no ciphering" and is received by the MS in the "ciphered" mode
Other Ciphering Mode Command messages shall be regarded as erroneous. For example, the
message that indicates "start ciphering" and is received by the MS in the "ciphered" mode. An
RR Status message with a cause "Protocol error unspecified" shall be returned by the MS. No
further action is taken.

Troubleshooting
Check the mode that the MS is in and the Ciphering Mode Command message.

Issue 02 (2007-06-30) Huawei Technologies Proprietary 7-5

S-ar putea să vă placă și