Description
The Access Security Management Entity (ASME) is a pivotal logical security function defined within the 3GPP architecture, primarily specified in the 3GPP TS 33.401 series for the Evolved Packet System (EPS) and carried forward into 5G systems. It is not a standalone physical node but a functional role that can be implemented within a network entity. In LTE/EPC, this role is performed by the Mobility Management Entity (MME). In 5G Core (5GC), the corresponding function is integrated into the Access and Mobility Management Function (AMF). The ASME's core operation begins when a User Equipment (UE) attempts to attach to the network. The serving network's entity (MME or AMF), acting as the ASME, requests authentication vectors from the home network's Authentication Centre (AuC) via the Home Subscriber Server (HSS) in EPS or the Authentication Server Function (AUSF) and Unified Data Management (UDM) in 5GS. These vectors contain cryptographic keys and parameters, including the master session key (K_ASME in EPS, derived from CK/IK; or KAUSF in 5GS, derived from CK'/IK').
Upon receiving these authentication vectors, the ASME performs a crucial key derivation and management function. It uses the received master key to derive a hierarchy of subsequent keys specific to the access network. For example, in EPS, the ASME (MME) derives the K_eNB key from K_ASME. This K_eNB is then provided to the evolved NodeB (eNB) to secure the radio interface. The ASME ensures that the home network's long-term key material is never exposed outside the home domain; only derived, access-specific keys are shared with the serving network's radio access node. This architecture enforces key separation, meaning keys used in one access network (e.g., LTE) cannot be directly reused in another (e.g., 5G NR or non-3GPP access), enhancing overall system security.
The ASME's responsibilities extend beyond initial key derivation. It manages the key hierarchy during mobility events, such as handovers. When a UE moves between base stations, the ASME may trigger key derivation for new base stations (e.g., deriving a new K_eNB* for a target eNB in LTE handovers) based on existing keys and fresh parameters to maintain forward and backward security. Furthermore, the ASME handles security context management, storing the security context associated with a UE during its attached session. This context includes the master key (K_ASME), key set identifiers, and the associated security algorithms. If the security context needs to be established for a non-3GPP access (like trusted WLAN), the ASME also plays a role in facilitating the transfer of the necessary keying material to the appropriate network functions (e.g., the Trusted WLAN Access Gateway in EPS).
In 5G, the principles of the ASME function are preserved but enhanced within the service-based architecture. The AMF, acting as the ASME, interacts with the AUSF/UDM for primary authentication and receives the anchor key (KAUSF). The AMF then derives the subsequent key, K_AMF, which serves a similar role to K_ASME. From K_AMF, keys for the access network (K_gNB) and for NAS signaling protection are derived. The 5G system introduces enhanced key separation, explicitly separating keys for different network slices and service types. The ASME function, embodied by the AMF, is central to enforcing these separation policies, ensuring that the security of one slice does not compromise another. Its operation is fundamental to the 3GPP security architecture, providing a secure bridge between the home network's trust anchor and the volatile access network environment.
Purpose & Motivation
The ASME was introduced in 3GPP Release 8 with the Evolved Packet System (LTE/EPC) to address critical security shortcomings in previous 3GPP architectures and to establish a robust, scalable security framework for all-IP networks. In pre-Release 8 systems like UMTS, security key management was more tightly coupled between the core network and the radio network controller (RNC). The move to a flatter architecture in LTE, with the eNB directly handling radio security, created a new threat model: the eNB resides in a potentially less trusted domain (the access network) compared to the core. The primary purpose of the ASME is to resolve this trust issue by acting as a security mediator. It ensures that the long-term subscriber key, stored only in the home network, is never shared with the access network nodes. Instead, the ASME derives short-term, access-specific keys, limiting the impact of a potential compromise in the radio access network.
Another key problem the ASME solves is enabling secure mobility and interoperability across heterogeneous access networks. As networks evolved to include non-3GPP access (like WiFi) and later 5G New Radio, a mechanism was needed to provide consistent authentication and key agreement while maintaining key separation between different access technologies. The ASME provides this centralized key management point. It receives a single set of credentials from the home network and is responsible for deriving the appropriate keys for whatever access technology the UE is using, whether it's LTE, 5G NR, or a trusted WLAN. This design future-proofs the security architecture, allowing new access types to be integrated without redesigning the fundamental authentication process with the home network.
Furthermore, the ASME facilitates improved network efficiency and security context management. By centralizing the derivation and distribution of access keys, it simplifies handover procedures. During handovers, the ASME can efficiently compute new keys for the target cell without needing to re-authenticate with the home network, reducing latency and signaling load. The creation of the K_ASME (or K_AMF in 5G) as a middle-tier key in the hierarchy also allows for independent re-keying and cryptographic algorithm updates on the access link without affecting the core link to the home network. This layered approach to key management, orchestrated by the ASME, is a foundational concept that enables the advanced security features required for modern mobile broadband, massive IoT, and network slicing in 5G and beyond.
Key Features
- Centralized derivation of access-specific keys (e.g., K_eNB, K_gNB) from home network master keys
- Enforcement of key separation between different access network technologies and network slices
- Management of the security key hierarchy during initial attachment and handover procedures
- Acts as the security intermediary between the trusted home network and the less-trusted access network
- Stores and manages the UE's security context, including key set identifiers and cryptographic algorithms
- Facilitates authentication and key agreement for non-3GPP access networks (e.g., trusted WLAN)
Evolution Across Releases
Introduced as a core logical function within the EPS security architecture (TS 33.401). The ASME role was defined to be located in the MME. Its initial capabilities included receiving authentication vectors (containing CK, IK, AUTN, XRES, RAND) from the HSS, deriving the intermediate key K_ASME from CK and IK, and subsequently deriving the access network key K_eNB for distribution to the eNB to secure the LTE-Uu radio interface.
Enhanced the ASME's role in support of Cellular IoT (CIoT) and Machine-Type Communications. Introduced optimizations for infrequent small data transmission, where the ASME (in the MME) could manage and maintain security contexts for extended periods for power-constrained devices, supporting features like extended idle mode DRX and control plane CIoT EPS optimization.
The functional role of the ASME was seamlessly integrated into the 5G Core (5GC) architecture. The Access and Mobility Management Function (AMF) assumes the ASME responsibilities. Key enhancements included support for the new 5G Authentication and Key Agreement (5G-AKA) and EAP-AKA' protocols, derivation of the K_AMF key from the home network anchor key KAUSF, and explicit key separation for network slicing, where the ASME function ensures slice-specific key derivation from K_AMF.
Further strengthened the ASME's capabilities in 5G for integrated access and backhaul (IAB) and enhanced support for non-3GPP access (e.g., wireline). The ASME function in the AMF was refined to handle more complex key derivation scenarios for multi-hop IAB nodes and to manage security context transfer between 3GPP and non-3GPP access systems with improved efficiency and security assurance.
Extended ASME-related procedures to support new 5G use cases, including enhanced support for unmanned aerial systems (UAS) and sidelink communication (PC5 interface). The key management performed by the ASME (AMF) was adapted to provision and manage security keys for UE-to-UE direct communication services, ensuring end-to-end security across the new service layer.
Defining Specifications
| Specification | Title |
|---|---|
| TS 31.102 | 3GPP TR 31.102 |
| TS 31.121 | 3GPP TR 31.121 |
| TS 33.401 | 3GPP TR 33.401 |