blog.eventhelix.com
LTE security: encryption and integrity protection call flow
LTE security is based on a shared secret key K between the USIM and the HSS. The UE, the eNodeB and the MME derive keys for encryption and integrity protection from K. The derived keys are used for…