USS

User Security Settings

Security
Introduced in Rel-7
A subset of the Generic User Security Settings (GUSS) containing security-related subscription data for a user. It is used for authentication and key agreement procedures, enabling secure access to network services. Its management is crucial for subscriber security and service continuity.

Description

User Security Settings (USS) is a critical component within the 3GPP security architecture, specifically defined as part of the Generic User Security Settings (GUSS) framework. It represents a collection of security-related subscription parameters associated with a specific user. These settings are stored in the user's home network, typically within the Home Subscriber Server (HSS) or a Unified Data Management (UDM) function in 5G systems. The USS contains essential data required for authentication and key agreement (AKA) procedures, such as the long-term secret key (K), authentication algorithms (e.g., MILENAGE, TUAK), and key derivation parameters. When a user attempts to access the network, the serving network (e.g., VLR, SGSN, MME, AMF) requests authentication vectors from the home network. The home network uses the USS to generate these vectors, which include a random challenge (RAND), an expected response (XRES), a cipher key (CK), an integrity key (IK), and an authentication token (AUTN). The serving network then uses these vectors to challenge the user equipment (UE) and establish secure ciphering and integrity protection keys for the session.

The architecture for USS management involves interfaces between the HSS/UDM and other network functions. In legacy systems, the USS is accessed via the MAP or Diameter-based interfaces (e.g., Cx, S6a, S6d). In 5G, the UDM provides USS data to the Authentication Server Function (AUSF) and the Access and Mobility Management Function (AMF) via the Nudm service-based interface. The USS is not a monolithic block but can be structured to support different authentication methods and services. For instance, it may contain separate settings for 3G/4G AKA and 5G AKA, or for authentication to the IP Multimedia Subsystem (IMS). This modularity allows the network to apply appropriate security mechanisms based on the access technology and requested service.

The role of USS in the network is foundational for subscriber security. It ensures that each user is uniquely authenticated and that subsequent communications are protected. The integrity and confidentiality of the USS data are paramount, as compromise would allow impersonation and eavesdropping. Network functions never receive the long-term secret key (K) itself; instead, they receive derived authentication vectors, following the principle of never exposing the root secret outside the home domain. The USS also supports features like key freshness and sequence number management to prevent replay attacks. Its proper configuration and synchronization across network elements are essential for preventing authentication failures and service disruptions.

Purpose & Motivation

The USS exists to provide a standardized, secure, and manageable repository for user-specific security credentials within 3GPP networks. Prior to its formalization within the GUSS concept, security settings were often tightly coupled with other subscriber data, making it difficult to manage authentication for multiple services (e.g., circuit-switched, packet-switched, IMS) independently. This could lead to inefficiencies and potential security gaps when introducing new authentication methods or services. The USS framework was created to decouple security settings from other subscription data, enabling more flexible and robust security management.

The primary problem it solves is the need for a consistent and reliable source of truth for user authentication parameters across different network domains and generations. It addresses the challenge of supporting heterogeneous access technologies (2G, 3G, 4G, 5G, non-3GPP) and service platforms (IMS, MMTEL) with a unified security data model. By having a dedicated USS, operators can update security algorithms or key materials for a user or a service without affecting other aspects of the subscription. This is crucial for phased rollouts of new security standards (e.g., moving from 4G EPS-AKA to 5G AKA) and for providing service-specific authentication, enhancing overall network security posture.

Historically, as networks evolved from single-service voice to multi-service converged IP networks, the limitations of monolithic subscriber data management became apparent. The creation of USS, particularly as part of GUSS from 3GPP Release 7 onwards, was motivated by the need for a modular, future-proof security substrate. It allows the network to authenticate a user once and then leverage those credentials for access to multiple services (single sign-on concept for network access), improving user experience while maintaining stringent security. It forms the bedrock for secure mobility and service continuity in modern cellular networks.

Key Features

  • Stores long-term secret key (K) and authentication algorithm configuration
  • Used to generate authentication vectors (RAND, AUTN, XRES, CK, IK) for AKA procedures
  • Supports multiple authentication methods (e.g., 3G AKA, EPS-AKA, 5G AKA, EAP-AKA')
  • Enables service-specific security settings within a single user subscription
  • Accessed by network functions via standardized interfaces (e.g., Cx, S6a, Nudm)
  • Foundational for ciphering and integrity key derivation in 3GPP systems

Evolution Across Releases

Rel-7 Initial

Initially introduced as a component of the Generic User Security Settings (GUSS) framework. It provided a structured way to store and manage user-specific security parameters separately from other subscription data, primarily to support authentication for the IP Multimedia Subsystem (IMS) and other services beyond traditional circuit/packet-switched access.

Defining Specifications

SpecificationTitle
TS 22.843 3GPP TS 22.843
TS 23.255 3GPP TS 23.255
TS 23.256 3GPP TS 23.256
TS 23.700 3GPP TS 23.700
TS 23.755 3GPP TS 23.755
TS 24.109 3GPP TS 24.109
TS 24.257 3GPP TS 24.257
TS 24.301 3GPP TS 24.301
TS 24.501 3GPP TS 24.501
TS 27.007 3GPP TS 27.007
TS 28.853 3GPP TS 28.853
TS 29.109 3GPP TS 29.109
TS 29.255 3GPP TS 29.255
TS 29.256 3GPP TS 29.256
TS 29.257 3GPP TS 29.257
TS 29.274 3GPP TS 29.274
TS 29.309 3GPP TS 29.309
TS 29.502 3GPP TS 29.502
TS 31.121 3GPP TR 31.121
TS 32.808 3GPP TR 32.808
TS 33.110 3GPP TR 33.110
TS 33.220 3GPP TR 33.220
TS 33.223 3GPP TR 33.223
TS 33.256 3GPP TR 33.256
TS 33.259 3GPP TR 33.259
TS 33.854 3GPP TR 33.854
TS 33.924 3GPP TR 33.924
TS 33.980 3GPP TR 33.980
TS 38.213 3GPP TR 38.213
TS 38.523 3GPP TR 38.523