4.2.2.1.10 Bidding down prevention in X2-handovers |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 33216-j00 → 33216-j10 | |
| Test Name | ||
| Threat Reference | TBA |
|
| Requirement Name | ||
| Requirement Reference | TS 33.401 [3], clause 7.2.4.2.2 |
|
| Requirement Description | "In the path-switch message, the target eNB shall send the UE EPS security capabilities received from the source eNB to the MME." as specified in TS 33.401 [3], clause 7.2.4.2.2." |
|
| Test Purpose | Verify that bidding down is prevented in X2-handovers. |
|
| Pre-Conditions | Test environment with source eNB and target eNB, and the source eNB may be simulated. |
|
| Execution Steps | The target eNB sends the path-switch message to the MME. |
|
| Expected Results | The UE EPS security capabilities are in the path-switch message. |
|
| Expected Format of Evidence | Snapshots containing the result |
|
| PDFs | adb6abf31da212fe31a4a9f85653d505 | |
4.2.2.1.11 AS protection algorithm selection in eNB change |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 33216-j00 → 33216-j10 | |
| Test Name | ||
| Threat Reference | TBA |
|
| Requirement Name | AS protection algorithm selection in eNB change. |
|
| Requirement Reference | TS 33.401 [3], clause 7.2.4.2.2, and clause 7.2.4.2.3 |
|
| Requirement Description | "The target eNB shall select the algorithm with highest priority from the UE EPS security capabilities according to the prioritized locally configured list of algorithms (this applies for both integrity and ciphering algorithms). The chosen algorithms shall be indicated to the UE in the handover command if the target eNB selects different algorithms compared to the source eNB" as specified in TS 33.401 [3], clause 7.2.4.2.2, and clause 7.2.4.2.3. |
|
| Test Purpose | Verify that AS protection algorithm is selected correctly. |
|
| Pre-Conditions | Test environment with source eNB, target eNB and MME. Source eNB and MME may be simulated. |
|
| Execution Steps | Test Case 1: Source eNB transfers the ciphering and integrity algorithms used in the source cell to the target eNB in the handover request message. Target eNB verifies the algorithms and selects AS algorithms which have the highest priority according to the ordered lists. Target eNB includes the algorithm in the handover command. Test Case 2: MME sends the UE EPS security capability to the Target eNB. The target eNB selects the AS algorithms which have the highest priority according to the ordered lists in the HANDOVER COMMAND. The above test cases assume that the algorithms selected by the target eNB are different from the ones received from the source eNB. |
|
| Expected Results | For both test cases:
|
|
| Expected Format of Evidence | Snapshots containing the result. |
|
| PDFs | 6bf18199dbc6a4194c885755c28b58ea | |
4.2.2.1.12 RRC and UP downlink ciphering at the eNB |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 → 33216-j00 → 33216-j10 | |
| Test Name | TC_eNB_DL_Cipher | |
| Threat Reference | TBA |
|
| Requirement Name | RRC and UP downlink ciphering at the eNB. |
|
| Requirement Reference | TS 33.401 [3], clause 7.2.4.5 |
|
| Requirement Description | "The eNB shall start RRC and UP downlink ciphering after sending the AS security mode command message" . |
|
| Test Purpose | To verify that the eNB performs RRC and UP downlink ciphering after sending the AS security mode command message. |
|
| Pre-Conditions |
|
|
| Execution Steps |
Case 1: If the parameters refer to null ciphering algorithm, the tester verifies that the downlink packets filtered in step 3 are unciphered. Case 2: If the parameters refer to algorithms such as SNOW, AES, ZUC, the tester verifies that the downlink packets filtered in step 3 are ciphered. The tester also checks if the packets are ciphered in accordance with the selected algorithm stated in the AS SMC command message.
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot contains the operation results. |
|
| PDFs | 67314f0573727263b9e9a887d770cc2c | |
4.2.2.1.13 Map a UE NR security capability |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 → 33216-j00 33216-j10 | |
| Test Name | TC_MAP_NR_SEC_CAP | |
| Threat Reference | TBA |
|
| Requirement Name | Map a UE NR security capability |
|
| Requirement Reference | TS 33.401 [3], clause E.3.10.2 |
|
| Requirement Description | " The MeNB that does not have the UE NR security capabilities shall create them as follow:
|
|
| Test Purpose | To verify that the eNB creates mapped UE NR security capabilities. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The SN Addition Request Message contains UE NR security capabilities, i.e. NEA0, 128-NEA1, 128-NEA2, 128-NEA3, NIA0, 128-NIA1, 128-NIA2, 128-NIA3 |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot contains the operation results. |
|
| PDFs | f44665f618e89dc524e4a575e6378a2b | |
4.2.2.1.14 UE NR security capability is only sent to a SgNB |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 → 33216-j00 33216-j10 | |
| Test Name | TC_NR_SEC_CAP_SENT | |
| Threat Reference | TBA |
|
| Requirement Name | UE NR security capability is only sent to a SgNB |
|
| Requirement Reference | TS 33.401 [3], clause E.3.4.3 |
|
| Requirement Description | "When adding SgNB while establishing an EN-DC connection, the MeNB shall send these created UE NR security capabilities to the SgNB. Other than for adding an SgNB, the created UE NR security capabilities shall not be sent from the MeNB." as specified in TS 33.401 [3], clause E.3.4.3. |
|
| Test Purpose | To verify that the UE NR security capabilities are only sent to a SgNB. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The UE NR security capabilities are only sent to the SgNB. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot contains the operation results. |
|
| PDFs | 107dea8ce0cb0a2ba1cfdb0f3670d3e1 | |
4.2.2.1.15 Bidding down prevention in X2-handovers when target eNB receives a NR security capability |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 33216-j00 33216-j10 | |
| Test Name | TC_BID_DOWN_X2 | |
| Threat Reference | TBA |
|
| Requirement Name | ||
| Requirement Reference | TS 33.401 [3], clause E.3.4.3 |
|
| Requirement Description | " A target eNB that has received the UE NR security capabilities during handover shall include the UE NR security capabilities in the S1-PATH SWITCH-REQUEST message." as specified in TS 33.401 [3], clause E.3.4.3." |
|
| Test Purpose | Verify that bidding down is prevented in X2-handovers when target eNB receives a NR security capability. |
|
| Pre-Conditions | Test environment with source eNB and target eNB, and the source eNB may be simulated. |
|
| Execution Steps | The target eNB sends the path-switch message to the MME. |
|
| Expected Results | The UE NR security capability is in the path-switch message. |
|
| Expected Format of Evidence | Snapshots containing the result. |
|
| PDFs | 35e9febf2f21ee8409537138a4839886 | |
4.2.2.1.16 Integrity protection of user data between the UE and the eNB |
Home → eNB → 18.0.0 |
|  33216-i00 → 33216-i10 → 33216-j00 33216-j10 | |
| Test Name | TC-UP-DATA-INT_eNB | |
| Threat Reference | TBD |
|
| Requirement Name | Integrity protection of user data between the UE and the eNB. |
|
| Requirement Reference | TS 33.401 [3], clause 5.1.4. |
|
| Requirement Description | "User plane packets between the eNB and the UE may be integrity protected on the Uu interface. " in clause 5.1.4 |
|
| Test Purpose | To verify that the user data packets are integrity protected over the Uu interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Any user plane packets sent between UE and eNB over the Uu interface after eNB sending RRCConnectionReconfiguration is integrity protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | 9cf284582d645d1350f11a25457944aa | |
4.2.2.1.17 Local UP integrity protection configuration |
Home → eNB → 18.0.0 |
|  33216-i00 → 33216-i10 → 33216-j00 33216-j10 | |
| Test Name | TC_LOCAL_UP_INTEGRITY_PROTECTION_CONFIGURATION | |
| Threat Reference | TBD |
|
| Requirement Name | Select the right UP integrity protection policy. |
|
| Requirement Reference | TS 33.401 [2] clause 7.3.3 |
|
| Requirement Description | " The eNB shall be locally configured with UP integrity protection policy. " in clause 7.3.3 |
|
| Test Purpose | To verify that the eNB is locally configured with a UP integrity protection policy |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Any user plane packets sent between UE and eNB over the Uu interface after eNB sending RRCConnectionReconfiguration is integrity protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | b2c1e32fb16d32e8e23da38d06645b4e | |
4.2.2.1.18 UP IP policy selection |
Home → eNB → 18.0.0 |
|  33216-i00 → 33216-i10 → 33216-j00 → 33216-j10 | |
| Test Name | TC_ UP_IP_POLICY_Selection | |
| Threat Reference | TBD |
|
| Requirement Name | Select the right UP IP policy. |
|
| Requirement Reference | TS 33.401 [2] clause 7.3.3 |
|
| Requirement Description | " If the eNB receives UP integrity protection policy from the MME, the eNB shall use the received UP integrity protection policy, otherwise, the eNB shall use the locally configured UP integrity protection policy if EIA7 in the EPS security capability indicates that the UE supports user plane integrity protection with EPC. " in clause 7.3.3 |
|
| Test Purpose | To verify that the eNB has a locally configured UP IP policy |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Any user plane packets sent between UE and eNB over the Uu interface after eNB sending RRCConnectionReconfiguration is integrity protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | 16a0c361bbc28b102986042b89b3d6de | |
4.2.2.1.19 UP IP policy selection in S1 Handover |
Home → eNB → 18.0.0 |
|  33216-i00 → 33216-i10 → 33216-j00 → 33216-j10 | |
| Test Name | TC_ UP_IP_POLICY_Selection_S1_Handover | |
| Threat Reference | TR 33.926 [4], clause C.2.2.[a]{.mark}, UP integrity protection policy selection |
|
| Requirement Name | Select the right UP IP policy in S1 handover. |
|
| Requirement Reference | TS 33.401 [2] clause 7.3.3 |
|
| Requirement Description | " At an S1-handover, the source MME shall send the UE's UP integrity protection policy and the UE EPS security capability to the target eNB via the target MME. Besides, the source eNB shall also send the UE's UP integrity protection policy if received from the source MME to the target eNB in a source-to-target container. The target eNB shall use the UE capability indicating support of UP IP in EPS together with the UP integrity protection policy received from the MME and ignore the UP integrity protection received in the source-to-target container. If the target eNB does not receive the UP integrity protection policy from the MME, the target eNB shall use the UE capability indicating support of UP IP in EPS together with the UP integrity protection policy received from the source eNB. If both policies from MME and source eNB are absent, but EIA7 in the EPS security capability indicates that the UE supports use of user plane protection with EPC, the eNB shall use locally configured UP integrity protection policy." in clause 7.3.3 |
|
| Test Purpose | To verify that the eNB has correct selection on UP IP policy in S1 handover |
|
| Pre-Conditions |
|
|
| Execution Steps | Test Case 1:
Test Case 2:
Test Case 3:
|
|
| Expected Results | For test case 1 and 2, any user plane packets sent between UE and eNB over the Uu interface after eNB sending RRCConnectionReconfiguration is integrity protected. For test case 3, any user plane packets sent between UE and eNB over the Uu interface after eNB sending RRCConnectionReconfiguration is not integrity protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | 34198bbf9a7fd8c9d1e43e77fd8d677a | |
4.2.2.1.20 Bidding down prevention for UP IP Policy |
Home → eNB → 18.0.0 |
|  33216-i00 → 33216-i10 → 33216-j00 → 33216-j10 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4], clause C.2.2.a, bidding down for UP IP Policy |
|
| Requirement Name | ||
| Requirement Reference | TS 33.401 [3], clause 7.3.3 |
|
| Requirement Description | "Further, in the Path-Switch message, the target eNB shall send the UE's UP integrity protection policy and corresponding E-RAB ID to the MME. The sent UP integrity protection policy can either be the one received from source eNB or the locally configured one if the target eNB does not receive it from the source eNB, but the EIA7 in the EPS security capability indicates that the UE supports user plane integrity protection with EPC. " as specified in TS 33.401 [3], clause 7.3.3. |
|
| Test Purpose | Verify that bidding down for UP IP policy is prevented in X2-handovers. |
|
| Pre-Conditions |
|
|
| Execution Steps | Test Case 1:
Test Case 2:
|
|
| Expected Results | For test case 1, the UP IP policy with REQUIRED is in the path-switch request message. For test case 2, the UP IP policy with NOT NEEDED is in the path-switch request message. |
|
| Expected Format of Evidence | Snapshots containing the result. |
|
| PDFs | e510d4afba83f0c7bfa743b81bd27c4e | |
4.2.2.1.3 User plane data ciphering and deciphering at the eNB |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 → 33216-j00 33216-j10 | |
| Test Name | TC-DATA-CIP-eNB-Uu | |
| Threat Reference | TR 33.926 [4], clause C.2.2.3 -- User plane data ciphering and deciphering at eNB. |
|
| Requirement Name | User plane data ciphering and deciphering at eNB |
|
| Requirement Reference | TS 33.401 [3], clause 5.3.4 |
|
| Requirement Description | "The eNB shall cipher and decipher user plane packets between the Uu reference point and the S1/X2 reference points." as specified in TS 33.401 [3], clause 5.3.4. |
|
| Test Purpose | To verify that the user data packets are confidentiality protected over the air interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | User plane packets sent by the eNB after eNB sending AS SMC is ciphered. |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | f09e49465bd197ba5eb67cbf167fa90a | |
4.2.2.1.3(2) User plane data ciphering and deciphering at the eNB |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 → 33216-j00 33216-j10 | |
| Test Name | TC-DATA-CIP-eNB-S1/X2 | |
| Threat Reference | TR 33.926 [4], clause C.2.2.3 -- User plane data ciphering and deciphering at eNB. |
|
| Requirement Name | User plane data ciphering and deciphering at eNB |
|
| Requirement Reference | TS 33.401 [3], clause 5.3.4 |
|
| Requirement Description | "The eNB shall cipher and decipher user plane packets between the Uu reference point and the S1/X2 reference points." as specified in TS 33.401 [3], clause 5.3.4. |
|
| Test Purpose | To verify that the user data packets are confidentiality protected over the air interface. |
|
| Pre-Conditions | ||
| Execution Steps | ||
| Expected Results | ||
| Expected Format of Evidence | ||
| PDFs | 2083daa5f6687041c1fd055c2e0a98be | |
4.2.2.1.5 AS algorithms selection |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 33216-j00 → 33216-j10 | |
| Test Name | ||
| Threat Reference | TBA |
|
| Requirement Name | AS algorithms selection |
|
| Requirement Reference | TS 33.401 [3], clause 7.2.4.1; TS 33.401 [3], clause 7.2.4.2.1 |
|
| Requirement Description | " The serving network shall select the algorithms to use dependent on: the UE security capabilities of the UE, and the configured allowed list of security capabilities of the currently serving network entity." as specified in TS 33.401 [3], clause 7.2.4.1". "Each eNB shall be configured via network management with lists of algorithms which are allowed for usage. There shall be one list for integrity algorithms, and one for ciphering algorithms. These lists shall be ordered according to a priority decided by the operator." as specified in TS 33.401 [3], clause 7.2.4.2.1. |
|
| Test Purpose | Verify that the eNB selects the algorithms with the highest priority in its configured list. |
|
| Pre-Conditions | Test environment with the eNB has been pre-configured with allowed security algorithms with priority. |
|
| Execution Steps |
|
|
| Expected Results | The eNB initiates the SECURITY MODE COMMAND message that includes the chosen algorithm with the highest priority according to the ordered lists and is contained in the UE EPS security capabilities. The MAC in the AS SECURITY MODE COMPLETE message is verified, and the AS protection algorithms are selected and applied correctly. |
|
| Expected Format of Evidence | Sample copies of the log files. |
|
| PDFs | 6a8a53ae0b588586a9963fed1cdc0735 | |
4.2.2.1.6 Verify RRC integrity protection |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 33216-j00 → 33216-j10 | |
| Test Name | ||
| Threat Reference | ||
| Requirement Name | The check of RRC integrity |
|
| Requirement Reference | TS 33.401 [3], clause 7.4.1 |
|
| Requirement Description | " The supervision of failed RRC integrity checks shall be performed both in the ME and the eNB. In case of failed integrity check (i.e. faulty or missing MAC-I) is detected after the start of integrity protection, the concerned message shall be discarded. " as specified in TS 33.401 [3], clause 7.4.1. Security Objective References: TBA |
|
| Test Purpose | Verify that the message is discarded in case of failed integrity check (i.e. faulty or missing MAC-I). |
|
| Pre-Conditions | Test environment with RRC Protection is activated at the eNB. |
|
| Execution Steps | Positive: The eNB receives a RRC message with a right MAC-I. Negative: The eNB receives a RRC message with a wrong MAC-I or missing MAC-I. |
|
| Expected Results | The RRC message is discarded in the negative test. |
|
| Expected Format of Evidence | Sample copies of the log files. |
|
| PDFs | c0329e2d7e58c4de5dd1c866f8f4685d | |
4.2.2.1.7 The selection of EIA0 |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 → 33216-j00 → 33216-j10 | |
| Test Name | ||
| Threat Reference | TBA |
|
| Requirement Name | The selection of EIA0 |
|
| Requirement Reference | TS 33.401 [3], clause 5.1.4.2 |
|
| Requirement Description | " EIA0 is only allowed for unauthenticated emergency calls " as specified in TS 33.401 [3], clause 5.1.4.2. |
|
| Test Purpose | Verify that AS NULL integrity algorithm is used correctly. |
|
| Pre-Conditions | Test environment with a UE . The UE may be simulated. The vendor shall provide documentation describing how EIA0 is disabled or enabled. |
|
| Execution Steps | Positive:
Negative:
|
|
| Expected Results | EIA0 is only selected in the Positive test. |
|
| Expected Format of Evidence | Sample copies of the log files. |
|
| PDFs | 913de142147959ad9d759ddc8634bcb7 | |
4.2.2.1.8 Key refresh at the eNB |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 33216-j00 → 33216-j10 | |
| Test Name | TC_ENB_KEY_REFRESH_ PDCP_COUNT | |
| Threat Reference | TR 33.926[4], clause C.2.3.1 -- Key reuse for eavesdropping Test Case 1: |
|
| Requirement Name | Key refresh at the eNB |
|
| Requirement Reference | TS 33.401 [3], clause 7.2.9.1; TS 36.331 [5], clause 5.3.1.2. |
|
| Requirement Description | "Key refresh shall be possible for K~eNB~, K~RRC-enc~, K~RRC-int~, K~UP-int~, and K~UP-enc~ and shall be initiated by the eNB when a PDCP COUNTs is about to be re-used with the same Radio Bearer identity and with the same K~eNB~. " as specified in TS 33.401 [3], clause 7.2.9.1. Moreover, "The eNB is responsible for avoiding reuse of the COUNT with the same RB identity and with the same K~eNB~, e.g. due to the transfer of large volumes of data, release and establishment of new RBs. In order to avoid such re-use, the eNB may e.g. use different RB identities for successive RB establishments, trigger an intra cell handover or by triggering a transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED." as specified in TS 36.331 [x], clause 5.3.1.2. |
|
| Test Purpose | Verify that the eNB performs K~eNB~ refresh when PDCP COUNTs are about to wrap around. |
|
| Pre-Conditions | The UE may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | The eNB triggers an intra-cell handover and takes a new K~eNB~ into use. |
|
| Expected Format of Evidence | Part of log that shows the PDCP COUNT wraping around and the intra-cell handover. This part can be presented, for example as a screenshot. Test Case 2: |
|
| PDFs | 1fecc99ece23935adfe92312259dcc06 | |
4.2.2.1.8(2) Key refresh at the eNB |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 33216-j00 → 33216-j10 | |
| Test Name | TC_ENB_KEY_REFRESH_DRB_ID | |
| Threat Reference | TR 33.926[4], clause C.2.3.1 -- Key reuse for eavesdropping Test Case 1: |
|
| Requirement Name | Key refresh at the eNB |
|
| Requirement Reference | TS 33.401 [3], clause 7.2.9.1; TS 36.331 [5], clause 5.3.1.2. |
|
| Requirement Description | "Key refresh shall be possible for K~eNB~, K~RRC-enc~, K~RRC-int~, K~UP-int~, and K~UP-enc~ and shall be initiated by the eNB when a PDCP COUNTs is about to be re-used with the same Radio Bearer identity and with the same K~eNB~. " as specified in TS 33.401 [3], clause 7.2.9.1. Moreover, "The eNB is responsible for avoiding reuse of the COUNT with the same RB identity and with the same K~eNB~, e.g. due to the transfer of large volumes of data, release and establishment of new RBs. In order to avoid such re-use, the eNB may e.g. use different RB identities for successive RB establishments, trigger an intra cell handover or by triggering a transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED." as specified in TS 36.331 [x], clause 5.3.1.2. |
|
| Test Purpose | Verify that the eNB performs K~eNB~ refresh when DRB-IDs are about to be reused under the following conditions:
|
|
| Pre-Conditions | The UE and MME may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | Before DRB ID reuse, the eNB takes a new K~eNB~ into use by e.g. triggering an intra-cell handover or triggering a transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED. |
|
| Expected Format of Evidence | Part of log that shows all the DRB identities and the intra-cell handover or the transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED. This part can be presented, for example, as a screenshot. |
|
| PDFs | 02830906a954d0584bc50bc40cd48a58 | |
4.2.2.1.9 AS Security Mode Command Procedure |
Home → eNB → 18.0.0 |
| 33216-h00  33216-i00 33216-i10 33216-j00 → 33216-j10 | |
| Test Name | ||
| Threat Reference | TBA |
|
| Requirement Name | AS integrity algorithm selection |
|
| Requirement Reference | TS 33.401 [3], clause 7.4.2 |
|
| Requirement Description | The eNB shall protect the SECURITY MODE COMMAND message with the integrity algorithm, which has the highest priority according to the ordered lists. |
|
| Test Purpose | Verify that AS integrity protection algorithm is selected and applied correctly. |
|
| Pre-Conditions | Test environment with UE. UE may be simulated. |
|
| Execution Steps | The eNB sends the SECURITY MODE COMMAND message. The UE replies with the SECURITY MODE COMPLETE message. |
|
| Expected Results |
|
|
| Expected Format of Evidence | Snapshots containing the result. |
|
| PDFs | 32d8db1a3259e79ca47286b2ad73484f | |