Você está na página 1de 4

Signaling Analysis Manual M900/M1800 Base Station Subsystem

Table of Contents

Table of Contents
Chapter 10 Ciphering Mode Setting Procedure ....................................................................... 10-1 10.1 Overview ........................................................................................................................ 10-1 10.2 Normal Procedure.......................................................................................................... 10-1 10.3 Internal Handling of BSC ............................................................................................... 10-2 10.4 Abnormal Cases ............................................................................................................ 10-3 10.4.1 Ciphering Rejected.............................................................................................. 10-3 10.4.2 MS Not Ciphered................................................................................................. 10-3

Huawei Technologies Proprietary i

Signaling Analysis Manual M900/M1800 Base Station Subsystem

Chapter 10 Ciphering Mode Setting Procedure

Chapter 10 Ciphering Mode Setting Procedure


10.1 Overview
The ciphering mode setting procedure is generally used in service requests such as location update, service access, inter-office handover, etc. It requires the support from GSM network equipment, especially BTS, and also depends on the encryption support capabilities of MS.

10.2 Normal Procedure


I. Signaling procedure
MS BTS BSC
Encryption Mode CMD (2) Ciphering Mode CMD (3) Ciphering Mode CMP (4) Cipher Mode CMP (5)

MSC
Cipher Mode CMD (1)

Figure 10-1 Normal ciphering mode setting procedure 1) MSC sends a CIPHER MODE COMMAND message to BSC, indicating whether ciphering shall be used or not, which algorithm and Kc to use, and whether MSC requests MS to include its IMEI in the CIPHER MODE COMPLETE message. 2) BSC decides which algorithm it shall adopt according to the encryption algorithm contained in the CIPHER MODE COMMAND message, the one allowed by BSC, and the one supported by MS, and then notifies BTS. 3) 4) BSC sends the command CIPHER MODE COMMAND to MS, notifying it about the selected encryption algorithm. Upon receipt of the command CIPHER MODE COMMAND, MS initiates the transmission in ciphered mode, and returns a CIPHER MODE COMPLETE message to BSC. 5) Upon receipt of the CIPHER MODE COMPLETE message, BSC forwards the message to MSC.
Huawei Technologies Proprietary 10-1

Signaling Analysis Manual M900/M1800 Base Station Subsystem

Chapter 10 Ciphering Mode Setting Procedure

II. Procedure explanation


1) Encryption algorithm A5

As specified in the GSM protocols, there are total 8 encryption algorithms, i.e. A5/0~A5/7. A5/0 indicates "Not ciphered". The ciphering mode setting procedure is always initiated by the network. The required encryption algorithm is specified in the encryption IE of the CIPHER MODE COMMAND message. 2) Encryption algorithm selection

When an MS initiates a call request, classmark 2 and classmark 3 may be contained in the CM SERVICE REQUEST message. In system information, when ECSC is equal to 1, the MS shall report classmark 3 in the CM SERVICE REQUEST message. When ECSC is equal to 0, the MS can report classmark 3 only by changing the classmark or through the classmark updating procedure. Therefore, it is recommended that ECSC be configured as "1", which contains the information about the encryption algorithm supported by MS. According to the ciphering data configuration, MSC delivers CIPHER MODE COMMAND to BSC. BSC comprehensively considers the encryption algorithm indicated in the command which is allowed by MSC, the encryption algorithm allowed in BSC data configuration and the one supported by MS which is indicated in the CM SERV REQ message, and selects the intersection. Then BSC selects an appropriate algorithm from the intersection by adopting the method of reverse order. In other words, algorithm selection priorities decline in the order of A5/7 > A5/6 > A5/5 > A5/4 > A5/4 > A5/3 > A5/2 > A5/1 > A5/0. 3) Encryption in the handover procedure

In the handover procedure, the HANDOVER REQUEST message contains an encryption IE, which indicates the to-be-used encryption algorithm and Kc. If either of the A interfaces of two BSSs is in Phase 1, due to the defect of the ETSI GSM Phase I protocol (There is no ciphering mode setting IE in the handover command), inter-BSC handover can be performed normally only when the two BSCs select the same algorithm (e.g. merely select A5/0, or A5/2). Otherwise, special processing is required in the destination MSC/BSC, or the originating MSC/BSC (e.g. modify the inter-BSC handover command). Therefore, in the interconnection of A interfaces under ciphered mode, the user should learn the difference of data configuration for the encryption function between different manufacturers. Unsuccessful interconnection has ever occurred during a to-BSC handover.

10.3 Internal Handling of BSC


The internal handling of the BSC in the ciphering mode setting procedure is given below:
Huawei Technologies Proprietary 10-2

Signaling Analysis Manual M900/M1800 Base Station Subsystem

Chapter 10 Ciphering Mode Setting Procedure

1)

Upon receipt of the CIPHER MODE COMMAND message from the MSC, the BSC checks the classmark of the MS and setting for the Encryption algorithm field in the [Cell configuration table].

2)

The BSC takes an intersection from the encryption algorithms supported in the CIPHER MODE COMMAND message from the MSC, that defined in the [Cell configuration table] and that specified in the CM SERVICE REQUEST message from the MS.

3)

The BSC selects an appropriate algorithm from the intersection in the reverse order of algorithm priority. Note that the normal algorithm priority order (from high to low) is described as A5/7 > A5/6 > A5/5 > A5/4 > A5/4 > A5/3 > A5/2 > A5/1 > A5/0. Then the BSC sends a CIPHER MODE COMMAND message to the BTS.

10.4 Abnormal Cases


10.4.1 Ciphering Rejected
BSS shall return a CIPHER MODE REJECT message to MSC, indicating that the encryption algorithm is not supported, if it does not support the encryption algorithm specified in the CIPHER MODE COMMAND message. A CIPHER MODE REJECT message shall also be returned if the MSC requests a change of ciphering algorithm when BSS ciphering is already active.

10.4.2 MS Not Ciphered


In the following cases, the CIPHER MODE COMMAND messages shall be considered valid:

MS in "not ciphered" mode receives a CIPHER MODE COMMAND message, indicating "start ciphering". MS in "not ciphered" mode receives a CIPHER MODE COMMAND message, indicating "no ciphering". MS in "ciphered" mode receives a CIPHER MODE COMMAND message, indicating "no ciphering".

In other cases, for example, MS in "ciphered" mode receives a CIPHER MODE COMMAND message, indicating "ciphering", it shall regard the CIPHER MODE COMMAND messages as erroneous, return an RR Status message with cause "Protocol error unspecified" and take no further action.

Huawei Technologies Proprietary 10-3

Você também pode gostar