Description
The Signalling Protection Key Identifier (SPK-ID) is a security parameter defined within the 3GPP architecture, specifically for protocols like the NASCON (NAS Security Context) and procedures involving the IP Multimedia Core Network Subsystem (IMS). It is not a key itself but a reference or label that points to a specific cryptographic key context established between a User Equipment (UE) and a network entity, such as the Access and Mobility Management Function (AMF) in 5G or the Mobility Management Entity (MME) in 4G. This key context is used for applying integrity protection and, optionally, encryption to Non-Access Stratum (NAS) signalling messages or other sensitive control plane communications. The SPK-ID allows the network and the UE to unambiguously identify which set of security keys and algorithms should be applied to a particular signalling session or procedure, enabling efficient key management and context switching.
The architecture involving SPK-ID is integrated into the security procedures of the core network. When a security context is established—for example, during an Authentication and Key Agreement (AKA) procedure—the network assigns an SPK-ID along with the derived keys (like the integrity key (IK) and ciphering key (CK)). This identifier is then stored in the UE's security context and the corresponding network function. During subsequent signalling exchanges, the SPK-ID may be included in message headers or implicitly referenced, allowing both ends to quickly retrieve the correct cryptographic material without renegotiating security parameters. This mechanism is vital for services that require persistent, secure sessions, such as IMS registration and call setup, where signalling integrity is paramount to prevent spoofing and man-in-the-middle attacks.
Key components in the SPK-ID ecosystem include the UE's Universal Subscriber Identity Module (USIM), which participates in the AKA to generate root keys, and core network functions like the Security Anchor Function (SEAF) and Authentication Server Function (AUSF) in 5G, or the Home Subscriber Server (HSS) in 4G/IMS. The SPK-ID's role is to act as a lightweight index within the larger key hierarchy, which includes the K_{ASME} in EPS or the K_{SEAF} in 5G. By using an identifier, the system avoids transmitting full keys over the air and supports multiple concurrent security contexts for different services on the same UE. Its specification across documents like TS 24.380 (IMS) and TS 29.380 (5G system) ensures interoperability between UE and network implementations from different vendors.
Purpose & Motivation
The SPK-ID was introduced to address the growing need for robust and manageable signalling security in evolving 3GPP networks, particularly with the rise of all-IP services like Voice over LTE (VoLTE) and IMS. Prior to its formalization, signalling protection mechanisms existed but often relied on implicit key associations or less granular identifiers, which could lead to ambiguities in key selection during handovers or service transitions. This was especially problematic in IMS, where SIP signalling requires strong integrity protection to prevent fraud and service abuse. The SPK-ID provides a standardized way to tag and reference specific keying material, solving the problem of efficiently managing multiple security contexts for a single UE.
Historically, as networks transitioned from circuit-switched to packet-switched cores, signalling attacks became more feasible due to the increased exposure of control plane traffic over IP networks. The creation of SPK-ID was motivated by the requirement in 3GPP Release 14 to enhance the security framework for IMS and later the 5G Core, ensuring that signalling protection could scale with new use cases like network slicing and edge computing. It addresses limitations of previous approaches by enabling explicit binding between a key and its usage context, which improves security clarity and aids in troubleshooting and auditing. Without such an identifier, networks might struggle with key synchronization issues during mobility events or when a UE accesses multiple simultaneous services, each with distinct security requirements.
Key Features
- Uniquely identifies a signalling protection key context for a UE
- Enables integrity protection and confidentiality for NAS and IMS signalling
- Supports efficient key management and retrieval during session handovers
- Allows multiple concurrent security contexts for different services
- Integrates with 3GPP Authentication and Key Agreement (AKA) procedures
- Specified across core network and IMS protocol specifications for interoperability
Evolution Across Releases
Introduced the SPK-ID concept primarily within IMS specifications (TS 24.380) to provide a clear identifier for keys used in IMS signalling protection. Established its role in binding security contexts to IMS sessions, enabling enhanced integrity protection for SIP messages as part of the broader IMS security enhancements in this release.
Defining Specifications
| Specification | Title |
|---|---|
| TS 24.380 | 3GPP TS 24.380 |
| TS 24.582 | 3GPP TS 24.582 |
| TS 29.380 | 3GPP TS 29.380 |
| TS 29.582 | 3GPP TS 29.582 |