SIMalliance LTE UICC Profile V1.0 PDF
SIMalliance LTE UICC Profile V1.0 PDF
SIMalliance LTE UICC Profile V1.0 PDF
This document is a collection of requirements for optimal support of LTE/EPS networks by UICC
Secure element architects for today’s generation SIMalliance LTE UICC profile 2
Document History
Table of Contents
1. Introduction .............................................................................................. 5
1.1 Document Purpose .......................................................................................................... 5
1.2 Terminology..................................................................................................................... 5
1.3 Document scope ............................................................................................................. 6
1. Introduction
1.1 Document Purpose
This document is the technical illustration of the SIMalliance UICC LTE whitepaper available
here: http://www.simalliance.org/en/resources/white_papers/
Enclosed in the following pages readers will find a collection of requirements for optimal UICC
support for LTE/EPS networks. The document uses ETSI SCP and 3GPP standards as its
baseline and aims to clarify which parts are mandatory and which are optional, in addition to
addressing key implementation issues.
This document also refers to relevant specifications provided by OMA, OMTP, Global Platform
and GSMA SmartSIM.
Since publication in 2012, the previous version of this document has been downloaded many
thousands of times, demonstrating the interest that LTE players have in ensuring that their
strategic card deployment takes full advantage of the technical recommendations contained
herein. Selecting the right UICC technologies at the outset will guarantee a smooth transition to
LTE and optimize the deployment of value added services, both for the Mobile Network
Operator (MNO) and the end user.
1.2 Terminology
Readers should note that SIMalliance is not a technical standards body. It is therefore only
appropriate for this document to provide recommendations regarding how the technical
standards should be implemented. In order to impart the significance of each, however, this
document also classifies its recommendations, using the following terms and meanings:
Mandatory
Optional
UICC1 UICC2
Feature
(Recommended) (Premium)
i-WLAN access X
Generic bootstrapping
X
architecture (GBA)
NFC X
Others features - X
The standard TS 22.278 clearly specifies “Release 99 or later Releases’ USIM application on the
UICC is required to authenticate a user in an Evolved Packet System“. As a consequence 2G only
SIMs are forbidden to access to LTE network.
A Legacy USIM. This is a USIM used for UTRAN technology, where the EMM parameter storage and
EPS location information files are not present in the file structure.
A Release 8 USIM (or LTE USIM). This is a USIM which includes LTE files specified in the Release 8
of the 3GPP 31.102 specification. The USIM files system supports:
EMM parameters storage
And EPS location information
SIMalliance recommends using a Release 8 USIM to store EPS security context instead of ME
storage because from a security point of view, the storage of the UICC security context on the card is
safer (it is protected by a PIN). This allows fast reconnection to the LTE network at switch on thus
providing a quality end user experience. Moreover, storing LTE location information on the card
enables the development of advanced roaming UICC based applications.
The TS 31.102 Release 8 and TS 33.401 specifications describe a new set of files dedicated for
LTE authentication.
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
USIM Service Table Informs the ME that the UICC is able to store the E-UTRAN
X
Service N°85 Security Context.
3. GSM/UMTS Authentication
Because UMTS provides a solution for the weaknesses of GSM security and also adds security
features for new 3G radio access networks and services, it is possible to have GSM and UMTS
authenticated access to an LTE USIM. This maximizes the compatibility between GSM and UMTS for
LTE subscribers roaming across GSM and UMTS networks.
The full backward compatibility feature of the LTE UICC offers GSM secure access to subscribers.
Since it also allows authentication to UMTS networks, the USIM is a mandatory secure element in the
LTE environment, ensuring safe and protected access to mobile LTE and IMS networks.
3G security, when 3G authentication vectors (RAND, XRES, CK, IK, AUTN) are available (i.e. the
UE is located in the UTRAN, or in a GSM radio access network which is connected to a 3G or 3G
capable VLR/SGSN).
GSM security, when only GSM authentication data is available (i.e. the UE is located in the GSM
radio access network which is connected to a non-3G capable VLR/SGSN).
To gain GSM access, the USIM provides GSM c2 and c3 conversion functions. These functions
derive the required GSM parameters (SRES, cipher key Kc) from available 3G parameters.
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
Containing:
- TMSI: Temporary Mobile Subscriber Identity;
Location Information: EFLOCI X
- LAI: Location Area Information;
- Location update status.
Voice over LTE is performed over IMS (IP Multimedia Subsystem). This is a recommendation from the
One Voice initiative, detailed in a document cosigned by AT&T, Orange, Telefonica, TeliaSonera,
Verizon, Vodafone, Alcatel-Lucent, Ericsson, Nokia Siemens Networks, Nokia, Samsung and Sony
Ericsson.
Now that voice is over IMS, a secure way to authenticate to the IMS layer is
required. For voice services, user name and password authentication is
insufficient. One Voice recommends utilizing the ISIM application on the UICC
for this purpose: “The IMS core network shall support the procedures for ISIM
based authentication. Support for ISIM based authentication in the UE is
mandatory.” This one Voice Initiative has now been renamed Voice over LTE
(VoLTE) and integrated within the GSMA group.
Once the IMS network is deployed over LTE other services can then be offered to the end user. This
is the case with Rich Communication Services (RCS) that enable users to perform video calls, for
example, share their desktop while on a call, or share a dash board. The Generic Bootstrapping
Architecture (GBA, see section 10) enables these third party IMS based services to be deployed
securely. Here, the MNO can act as the identity and authorization manager for the service provider.
Moreover, the GBA can offer an extra and applicative level of authentication to the service itself, in
addition to the authentication already applied to the access gateway for the overall IMS infrastructure.
This model makes a lot of sense when considering how to manage secure authentication most
effectively for these applications.
There is clear momentum for carriers supporting voice over LTE and the RCS. In
January 2013 many operators are actually deploying Voice over LTE, with a host
of others also deploying RCS under different names, such as ‘joyn’, for example.
GBA
IMS Servers
ISIM
Signalling
Data
USIM
IP Cellular network
LTE, 3G or 2G IMS Media Gateways
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
ISIM Release 5 X
ADF ISIM Stores ISIM file system X
ADF ISIM\EF IMPI (IMS private user identity)
X
Contains the private user identity of the user.
ADF ISIM\EF Domain (Home Network Domain Name)
X
Contains the home operator’s network domain name
(IMS public user identity)
ADF ISIM\EF IMPU X
Contains one or more public user identity of the user
ADF ISIM\EF AD Mode of operation (normal, type approval …) X
ADF ISIM\EF ARR Contains the access rules for files located under the ISIM ADF X
Mutual Authenticate
ISIM performs an AKA scheme to access IMS services X
3G in IMS context
ISIM Release 6 X
(ISIM Service Table)
ADF ISIM\EF IST X
Table of ISIM related services
(P-CSCF Address)
For non 3GPP devices, not able to get the IMS proxy address
ADF ISIM\ EFP-CSCF X
from the access network procedures (GRPS PDP context
activation or DHCP)
(GBA Bootstrapping Parameters)
Contains the AKA Random challenge (RAND) and
ADF ISIM\ EF GBABP X
Bootstrapping Transaction Identifier (B-TID) associated with a
GBA bootstrapping procedure
(GBA NAF list)
Contains the list of NAF_ID (Network Application Function –
ADF ISIM\ EF GBANL X
i.e: web service) and B-TID associated to a GBA NAF
derivation procedure
Mutual Authenticate in GBA
(Bootstrapping mode) ISIM performs a dedicated AKA for GBA. X
security context
Mutual Authenticate in GBA
(NAF derivation) security ISIM derives results of the bootstrap using IMPI value. X
context
Mutual Authentication HTTP ISIM furnishes response/session key to a realm/nonce/cnonce
X
Digest security context challenge according RFC2617
ISIM Release 7 X
(ISIM Service Table)
ADF ISIM\EF IST X
Service n°4: GBA-based Local Key Establishment Mechanism
UICC usage
Parameter/Comment Support
requirements
(NAF Key Center Address)
ADF ISIM\EF NAFKCA X
Contains one or more NAF Key Center Addresses.
Security context Local Key Establishment (Key derivation
Mutual Authenticate mode)” and “(Key availability check mode)” for GBA new key X
establishment procedure.
ISIM Release 8 X
(ISIM Service Table)
Service n°5: Support of P-CSCF discovery for IMS Local
ADF ISIM\EF IST X
Break Out. A 3GPP device can now use EFP-CSCF in case of
IMS local break Out
5. I-WLAN Access
Thanks to its unlicensed spectrum and low-cost hardware, WiFi can play an important role in relieving
the pressure on the cellular networks, complementing them with fast data connections that are
capable of delivering an excellent customer experience, resulting in strong user satisfaction.
By turning WiFi networks into seamless extensions of the LTE network, the Interworking Wireless LAN
(I-WLAN) technique achieves this objective. I-WLAN enables the integration of WiFi technology with
LTE networks providing subscribers a secure WiFi connection into the core network of the mobile
operator so that they can "roam" onto unlicensed and untrusted IP access networks.
The UICC-based approach towards the integration of WiFi technology with LTE networks has a
twofold advantage. On the one hand it allows MNOs to quickly re-use their existing network
infrastructure and securely authenticate users with their UICC credentials, which reduces CAPEX in
infrastructure and increases service availability and ARPU. On the other hand, it enables MNOs to
offer an elegantly simple and portable solution, after the selection of the access point, users are
automatically connected to the WiFi hotspot, uninhibited by the need to enter a username and
password.
The TS 31.102 Release 8 specification describes the set of files dedicated for I-WLAN
authentication.
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
6. 3GPP/3GPP2 interworking
Some 3GPP2 MNOs require a UICC capable of supporting both LTE and CDMA. In these instances,
the below requirements shall be adhered to.
In order to manage the interworking between 3GPP (2G, 3G, 4G …) and 3GPP2 (CDMA2000, HRPD,
WiMAX) networks the 3GPP2 C.S0074-A V1.0 and 3GPP TS31.102 R9 specifications define a set of
files that allow the UICC to store MNO preferences about the selection of the radio access technology.
This is known as Multi Mode System Selection (MMSS).
Indeed, according to MNO business rules, the device has to select the most appropriate type of radio
network; either 3GPP or 3GPP2. Once 3GPP or 3GPP2 has been selected, the UE follows the
standard network selection procedure for the corresponding system in order to acquire a network
attachment.
Operators may differentiate between voice only networks and networks that allow both voice and data
depending on end user location.
The main benefit for the MNO here is the ability to manage roaming agreements between 3GPP and
3GPP2 partner networks. It also enables the MNO to deliver the utmost end user experience.
The UICC shall be CSIM compatible, as described in 3GPP2 C.S0065-B, and support OTASP/PA
stack to interact with CSIM for PRL and NAM parameters download, as described in 3GPP2 C.S0016-
D.
The CSIM application is a Network Access Application coexisting with the USIM and hosted by the
UICC providing access to CDMA2000/EVDO networks. The CSIM application supplies an extensive
list of features and functionalities required to operate independently on legacy CDMA and EVDO
networks.
The following UICC parameters take precedence over those present in the terminal. When
multiple systems are available, the multi mode device shall be able to automatically select the
most preferred system.
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
DF MMSS X
(MMSS Location Associated Priority List)
List of grouping based on location specific information.
EF MLPL
Defines regions where system selection priorities are X
needed
MSPL Parameters:
SYS_TYP: CDMA, UMTS, LTE …
PRI_CLASS: Allows for selection priority based on
EF MSPL operator preference while roaming
X
SYS_PRI: Indicates relative priority of technologies within
the MSPL record
HIGHER_PRI_SRCH_TIME: Set to the time between
searches of higher priority systems of other radio access
technologies
NETWORK_CAP: Allows operators to specify the
preference for “voice + data” network
USIM Application Toolkit (USAT) is a major Value Added Service (VAS) enabler since it helps mobile carriers
to develop new revenue streams, differentiate from competitors, enhance their customers’ experience and
reduce churn. With the introduction of LTE, the communication protocol between the card and the handset
has been enhanced with the introduction of proactive commands and events:
Providing full management of the LTE access technology
Allowing the integration of WiFi and femtocell offload strategies
Enabling the deployment of GPS-based services with monitored Quality of Service (QoS)
By relying on standard capabilities which are available on all mobile handsets, the UICC allows the same
application to run on any mobile device, regardless of manufacturer, and be used on every available network
(2G, 3G and LTE). The LTE UICC capabilities include (but are not limited to):
Getting the location data from a GPS-enabled handset in order to enhance the information of menu-
based browsers, enabling the definition of “geo fences” for location-based advertising, etc.
Enabling sophisticated “femtozone” services when the end user enters or leaves a defined femtocell.
Proactively detecting, diagnosing and solving issues caused by connection problems or
unsubscribed services.
Ensuring a high quality of service has become a real challenge for MNOs seeking to acquire and retain
customers who are increasingly accustomed to anytime, anywhere, seamless and transparent access to
mobile services.
The LTE UICC can be utilized as a tool to provide tailored, real-time solutions to the issues that affect the
customer experience when accessing LTE networks and services. For example, if a subscriber hasn’t
activated their mobile data option when roaming, the LTE UICC could detect this and, upon user
confirmation, activate it to ensure mobile internet remains available to the subscriber.
Figure 4: The LTE UICC can intelligently detect and activate services to enhance the user’s experience
Femtocells offer an efficient and cost-effective way of offloading the traffic from the macro-cellular networks
and therefore improve the experience of users in terms of high-quality coverage. In addition to carrying the
femtocell access control parameters, the LTE UICC could also give MNOs the ability to manage subscriber
devices remotely by triggering a device management session when entering a defined femtocell. This
service would give subscribers the possibility to regularly and automatically backup their phonebook, receive
appropriate new services, etc.
Figure 5: How MNO’s could use the LTE UICC to trigger device management sessions via a femtocell
The ETSI TS 102 223 Release 8, the 3GPP TS 31.111 Release 8 and the 3GPP2 C.S0035
specifications describe the enhancements to the USIM Application Toolkit (USAT).
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
EPS support for OPEN Bearer Type eUTRAN must be supported in addition to legacy
X
CHANNEL BIP command modes (GPRS, UTRAN, etc…)
Location Information :
ME provides to UICC information on MNC,
MCC, LAC/TAC, Cell ID, extended cell ID
Provide Local information E-UTRAN cell ID
X
extended to support LTE. Network measurement result:
extended to E-UTRAN
Current access technology:
extended to E-UTRAN
LTE will multiply the range of services offered to end users and will therefore also increase the
number of applications on the UICC that require OTA administration.
At the same time, LTE introduces an all-IP environment suitable for OTA exchanges for administration
between the UICC and Server which can be done through HTTP (as it is described in Global Platform
2.2 Amendment B: “Remote Application Management over HTTP”). Each card acts as an HTTP client
and the OTA platform as an HTTP server.
LTE networks provide increased bandwidth, downloading success rates and low latency for
transmissions.
The addition of the polling mechanism, which allows applications to connect periodically to OTA server
and check for updates, is another benefit provided by this kind of advanced OTA platform.
LTE provides great potential for OTA applications to meet the new expectations of subscribers:
Automatic and immediate access to LTE voice and multimedia services (ISIM personalization with
end user public identities)
SCWS services personalization and administration
Traffic preferences
Remote applet and file management (banking applications, NFC services, etc)
The OTA over HTTPS process starts by sending a PUSH SMS (step 1, figure 6, below) embedding
the OTA server connection data. This information is needed by the UICC to open a BIP channel and
then a TCP/IP connection with the OTA server (step 2, figure 6, below).
TLS is widely deployed in the IP world to establish secure TCP communications and, combined with
HTTP protocol, makes HTTP secure (HTTPS). In fact, PSK TLS (Pre-Shared Key TLS) allows mutual
authentication between the UICC (HTTPS Client) and OTA server (HTTP Server); both share a secret
key. The authentication procedure is called PSK TLS Handshake (step 3).
sends a HTTPS Response with an encapsulated remote command APDU to the UICC. RAM and RFM
applications (ETSI 102 226) from UICC then process this command information and administrate or
upgrade a corresponding file or application. The UICC will then inform the OTA server of the
administration command success by sending a HTTPS Request (POST command) with an embedded
R-APDU.
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
As has been mentioned in previous chapters, the increase in both the number and sophistication of
new mobile services inevitably gives rise to new technical challenges. One such challenge is mobile
user credentials management. Subscribers are already known to struggle with the need to manage a
large number of unique passwords, with many resorting to reusing the same password (or a close
variant) across numerous services, thus compromising the effectiveness of the overall model.
Generic Bootstrapping Architecture (GBA) benefits users by authenticating them across several
services by utilizing their valid user identity. This valid identity shall be also located in the Home
Location Register (HLR) or a Home Subscriber Server (HSS), both in the MNO’s infrastructure. In this
way, operators can benefit by acting as an identity or authorization verifier to service providers over
the internet or over IMS.
The user authentication is achieved by AKA authentication, i.e. a shared secret between the smart
card inside the mobile phone and the HLR/HSS, by making a network component challenge to the
SIM card and verifying that the answer is identical to the one expected by the HLR/HSS.
GBA refers to an architecture/network which implements several procedures and performs different
methods of authentication. The network components required for GBA are:
- User Equipment (UE): The user is subscribed to a set of services (data traffic, IP multimedia
services such as Mobile TV, streaming, VoLTE, etc.)
- Bootstrapping Server Function (BSF) and HSS/HLR: Both are responsible for the
authenticating bootstrapping process; this means the authentication of the UE to the home
network and the creation of session keys for the user.
- NAF (Network Application Functions): Session keys derived from authenticating bootstrapping
process allow users to communicate with NAF and enjoy subscribed services.
The usage of GBA can be divided in to three steps (see figure 7 above):
1) User Equipment wants to use a subscribed service but it does not know if the NAF requires GBA
authentication for this. UE contacts NAF and the latter indicates a bootstrapping initiation is required.
2) User Equipment starts the authentication bootstrapping procedure.
3) User Equipment starts the bootstrapping usage procedure.
The user starts introducing the identity. Then, secure communication between mobile web
browser and BSF is achieved through HTTP Digest. A great advantage here is that usually Web
servers and device browsers have already implemented HTTP Digest, making this solution easy
to deploy for GBA infrastructures.
The usage of session keys (Ks_NAF derived from Ks) and received B-TID allow the mobile user to request
an application NAF. After this NAF authenticates itself to BSF in order to purchase session keys. BSF will
return derived Ks_NAF. Finally, UE and NAF are authenticated and subscribed services can be requested
from UE to NAF.
The 3GPP TS 33.220 (Release 8) specifications describe a set of features to enable Generic
Bootstrapping Architecture in the UICC.
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
Having the EAP implemented on the UICC has several advantages compared to an implementation
that is split between the device and the UICC:
It becomes less device dependent and leverages one key benefit of the UICC: that it is
removable and can be ported onto other devices with associated user credentials.
EAP AKA cannot be implemented onto the device. This version of EAP leverages the USIM
capabilities, offering better security.
The ETSI TS 102 310 v9.0.0 specifications document defines additional features that shall be
provided by the UICC to support EAP authentication capabilities.
The goal of these features is to adapt the UICC to provide support for different EAP methods,
ensuring interoperability between the UICC and any terminal, independent of their respective
manufacturers.
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
11. NFC
Near Field Communications (NFC) moves the game on yet further. Often running in tandem with LTE
roll-outs, NFC’s ability to allow a mobile device to securely ‘talk’ to a similarly connected neighbouring
device held within a proximity of four or five centimeters has opened up a host of contactless payment
opportunities that have already found their way onto the high street.
Also, by integrating NFC technologies in the UICC, the operator is able to offer its subscriber a
seamless experience between the virtual and real worlds.
NFC technology transforms the mobile phone into a universal and secure remote control to access
multiple localized and contextualized services. Without doubt, NFC will revolutionize the way we
interact with our environment. And with LTE migration and NFC roll-outs coinciding in many markets, it
makes sense to examine the possibilities of the technologies together.
The role of the UICC is to provide relevant information to the device in order to select and try to get
access to the most appropriate Femtocell according to business rules defined either by the operator or
by the end user’s preferences. The UICC doesn’t control the access; this is managed by the MNO’s
back end.
The following UICC information takes precedence over that which is stored in the Mobile Equipment:
Allowed Closed Subscriber Group lists: list of members, that are allowed to access to the
Femtocell
Close Subscriber Group Type: gives indication on billing type
Home eNodeB Name: human readable name to be associated with CSG ID
Please also refer to the SIM Toolkit enhancement related to event and proactive commands for
Femtocells in Chapter 7.
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
In addition to User H(e)B parameters the TS 31.102 Release 9 defines the same parameters for
the MNO.
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
As 3GPP TS 31.102 and 3GPP TS 23.122 indicates, at mobile device and UICC initialization time,
the USIM checks the content of listed PLMNs to be accessed. In addition, “PLMN Lists with Access
Technology” files contains radio access technologies, i.e. the way the device shall connect (GSM,
UTRAN, etc.) to the MNO network. LTE (E-UTRAN) has been introduced in the list of reachable
radio technologies in those files.
PLMNs with Access Technologies are given in a preferred order (roaming preferences) and are
selected in priority order (if the network is available). By setting up these files, MNOs can provide
the same data connectivity or access technology to users on other visited networks as they do on
their Home network.
Services for reading PLMN files execute at initialization time. Firstly Home PLMNs are checked (EF
HPLMNwAct). Then, visited network may be selected (e.g. roaming). In Figure 12, below, an
example of usage of EF HPLMNwAct and EF OPLMNwAct is shown when the user leaves the
country of the Home Network (“Country1”) and moves to another country (“Country2”). Once the user
powers on the mobile and the UICC, USIM application checks that Home Network is not reachable
and discovers E-UTRAN visited network called “Network1”. Following the roaming agreement, if E-
UTRAN is not reachable, the user can connect to another MNO (“Network3”) by UTRAN.
If the operator delivers a UICC with EFPLMNwAct activated and service nº20 enabled, it lets the user to
configure the list of preferred PLMNs. On the next initialization process PLMNs from this file will be read by
the USIM again.
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
Note 1: EFPLMNwAct and EFOPLMNwAct shall manage at least 80 networks and preferably
100 in their list of networks
14. Appendix
14.1 Other useful features
UICC usage
Parameter/Comment Support
requirements
Mandatory
Optional
Features
15. Abbreviations
For the purposes of the present document, the following abbreviations apply:
Abbreviation Description
ADF Application Dedicated File
APDU Application Protocol Data Unit
ATR Answer To Reset
BIP Bearer Independent Protocol
CAT Card Application Toolkit
CCA CDMA Card Application Toolkit
CLK Clock signal
CSFB Circuit Switch Fallback
CSIM CDMA Subscriber Identity Module
EAP Extensible Authentication Protocol
EF Elementary File
eMBMS evolved Multicast Broadcast Multimedia Service
EPC Evolved Packet Core
EPS EPC + E-UTRAN
GND Ground
GSM Global System for Mobile communications
IMEI International Mobile Station Equipment Identity
IMEISV International Mobile Station Equipment Identity Software Version
IMS IP Multimedia Subsystem
ISIM IP Multimedia Services Identity Module
ISO International Organization for Standardization
LAC Location Area Code
LTE Long Term Evolution
MCC Mobile Country Code
ME Mobile Equipment
MEID Mobile Equipment Identifier
MNC Mobile Network Code
MS Mobile Station
NAA Network Access Application
NAS Non Access Stratum
NFC Near Field Communication
NVM Non Volatile Memory
OMH Open Market Handset
PPS Protocol and Parameter Selection
RAM Remote Applet Management
RFM Remote File Management
SAC Secure Authenticated Channel
SCWS Smart Card Web Server
SIM Subscriber Identity Module
SIP Session Initiation Protocol
SMS Short Message Service
SMS-PP Short Message Service – Point to Point
SWP Single Wire Protocol
UICC Universal Integrated Circuit Card
USIM Universal Subscriber Identity Module
VCC Voice Call Continuity