What are some key points of UMTS?
What are the components of the UMTS system architecture?
What are some differences between GSM and UMTS, regarding the architecture?
What are the components of the UMTS authentication vector?
What are the components of the UMTS authentication token and why are they used?
AUTN := SQN ⊕ AK || AMF || MAC
What happens if the SQN received by the UE is out of range? (UMTS)
How is traffic encryption handled in UMTS?
How is integrity protection handled in UMTS?
How is UMTS protected agains bidding-down attacks?
The RNC includes the received security capabilities in security mode command, which is integrity protected with IK. If the received capabilities differs, from the sended cap. the UE drops the connection.
How is the key usage time limited in UMTS?
Home provider specific THRESHOLD is set on USIM, to restrict key lifetime. UE uses START value = max (COUNTER-C, COUNTER-I). When START value reaches THRESHOLD, new AKA is triggered by UE.
How is security context handover handled in UMTS?
What components are relevant for 2G/ 3G inter-working?
How does a UE/ USIM handle an AKA with a 2G network?
How does a UE/ 2G SIM handle an AKA in a 3G network?
How does a UE/ USIM handle an AKA in 2G RAN with 3G core?
How does a UE/ SIM handle an AKA with 2G RAN with 3G core?
How can an attack against a 3G be carried out?