BSF

Bootstrapping Server Function

Security
Introduced in Rel-6
The Bootstrapping Server Function (BSF) is a core network function within the Generic Authentication Architecture (GAA). It provides a secure method for applications and network functions to dynamically obtain authentication credentials and cryptographic keys, eliminating the need for pre-shared secrets. This is crucial for securing service access and protecting user data.

Description

The Bootstrapping Server Function (BSF) is a central component of the 3GPP Generic Authentication Architecture (GAA), defined as a security framework for authentication and key agreement. It operates as a standalone network function that interfaces with the Home Subscriber Server (HSS) or Unified Data Management (UDM) to perform bootstrapping procedures. The core principle involves leveraging the existing, strong authentication between the User Equipment (UE) and the mobile network (via the Authentication and Key Agreement (AKA) protocol) to derive application-specific security credentials. This process, known as 'bootstrapping,' establishes a shared secret between the UE and a Network Application Function (NAF) without requiring a prior direct security association.

Architecturally, the BSF is a server-side entity that communicates with the UE (acting as a GAA client) and the NAF. The procedure begins when the UE contacts the BSF to initiate bootstrapping. The BSF then interacts with the HSS/UDM to fetch authentication vectors (e.g., quintets for UMTS AKA or vectors for EPS AKA/5G AKA). It challenges the UE using these vectors. Upon successful mutual authentication, both the BSF and the UE independently compute a shared, session-specific root key called the Bootstrapping Transaction Identifier (B-TID) and associated key material (Ks). This Ks is a long-term key derived from the AKA session.

The BSF's role is to act as a trusted key generator and distributor. After bootstrapping, when the UE needs to access a service provided by a specific NAF (e.g., a Multimedia Broadcast Multicast Service (MBMS) server, a location-based service, or a 3GPP application server), the UE presents the B-TID to the NAF. The NAF then queries the BSF, using the B-TID, to obtain the relevant key material (a NAF-specific key, Ks_NAF, derived from Ks) for that service session. This allows the NAF and UE to establish a secure channel. The BSF thus decouples the core network authentication from application-layer security, enabling a wide range of services to leverage the robust cellular authentication infrastructure.

Key interfaces for the BSF include the Ub interface towards the UE for the bootstrapping procedure, the Zn interface towards the NAF for key distribution, and the Zh interface towards the HSS or UDM for retrieving authentication data. In 5G systems, the BSF aligns with the service-based architecture, potentially exposing its capabilities as a Network Function (NF) service. Its implementation is critical for enabling secure, standardized, and scalable authentication for value-added services across 3GPP, 4G, and 5G networks, forming the backbone for many GAA-based security solutions.

Purpose & Motivation

The BSF was created to address the fundamental problem of how to securely authenticate users and devices to a multitude of application servers (NAFs) without requiring each application to manage its own separate credential database or establish a direct trust relationship with the cellular core network. Prior to GAA, applications either used weak, application-specific passwords or required complex, out-of-band provisioning of certificates or shared keys, which did not scale and were vulnerable to attacks. The BSF provides a standardized, network-operator-controlled method to reuse the strong, subscription-based authentication of the mobile network.

The primary motivation was to enable new, secure mobile services—such as broadcast/multicast content protection (MBMS), secure device management, financial transactions, and lawful interception—by providing them with a reliable source of cryptographic keys derived from the user's SIM/USIM authentication. The BSF solves the key distribution problem in a scalable way. It allows the mobile operator to act as a trusted third party, generating and providing session keys to authorized application providers, thereby creating a business-to-business security framework. This facilitated the secure commercialization of mobile services beyond basic voice and data.

Historically introduced in 3GPP Release 6 as part of GAA, the BSF addressed the security needs of emerging IP Multimedia Subsystem (IMS) services and other network applications. It provided a future-proof architecture that has evolved through 4G and into 5G, where its role remains essential for service-based security, especially in network exposure scenarios. It addresses the limitations of static, pre-configured security by enabling dynamic, on-demand key establishment that is tied to the live network authentication state of the user.

Key Features

  • Provides dynamic, on-demand derivation of application-specific cryptographic keys (Ks_NAF) from core network authentication (AKA).
  • Enables mutual authentication between the User Equipment (UE) and the Bootstrapping Server Function.
  • Acts as a trusted key distribution center for Network Application Functions (NAFs) via the Zn interface.
  • Supports both 3G (UMTS), 4G (EPS), and 5G authentication vectors through interfaces with HSS and UDM.
  • Decouples application-layer security from core network access security, promoting service innovation.
  • Forms the foundational element of the Generic Authentication Architecture (GAA) for securing a wide range of services.

Evolution Across Releases

Rel-6 Initial

Introduced as the core component of the Generic Authentication Architecture (GAA). Defined the initial bootstrapping procedure using UMTS AKA, establishing the Ub (UE-BSF) and Zh (BSF-HSS) interfaces. Provided the mechanism for a UE and a Network Application Function (NAF) to securely obtain a shared key (Ks_NAF) derived from the core network authentication, enabling secure service access without pre-shared secrets.

Defining Specifications

SpecificationTitle
TS 23.501 3GPP TS 23.501
TS 23.503 3GPP TS 23.503
TS 23.862 3GPP TS 23.862
TS 24.109 3GPP TS 24.109
TS 24.259 3GPP TS 24.259
TS 29.309 3GPP TS 29.309
TS 29.513 3GPP TS 29.513
TS 29.521 3GPP TS 29.521
TS 29.810 3GPP TS 29.810
TS 29.890 3GPP TS 29.890
TS 32.808 3GPP TR 32.808
TS 33.107 3GPP TR 33.107
TS 33.110 3GPP TR 33.110
TS 33.141 3GPP TR 33.141
TS 33.185 3GPP TR 33.185
TS 33.220 3GPP TR 33.220
TS 33.221 3GPP TR 33.221
TS 33.222 3GPP TR 33.222
TS 33.223 3GPP TR 33.223
TS 33.246 3GPP TR 33.246
TS 33.259 3GPP TR 33.259
TS 33.303 3GPP TR 33.303
TS 33.503 3GPP TR 33.503
TS 33.739 3GPP TR 33.739
TS 33.749 3GPP TR 33.749
TS 33.804 3GPP TR 33.804
TS 33.822 3GPP TR 33.822
TS 33.823 3GPP TR 33.823
TS 33.835 3GPP TR 33.835
TS 33.919 3GPP TR 33.919
TS 33.924 3GPP TR 33.924
TS 33.938 3GPP TR 33.938
TS 33.980 3GPP TR 33.980