top button
Flag Notify
    Connect to us
      Site Registration

Site Registration

What is the functionality of bootstrap server in telecom network ?

+3 votes
360 views
What is the functionality of bootstrap server in telecom network ?
posted Apr 5, 2016 by Harshita

Share this question
Facebook Share Button Twitter Share Button LinkedIn Share Button

1 Answer

0 votes

Hi Harshita,

First of all thanks to you for this wonderful question, which encourage me to look into this new concept. After reading from net I found the below information which I would like to share with Queryhome community.

enter image description here

The above information can be found from https://en.wikipedia.org/wiki/Bootstrapping_Server_Function

Introduction

A Bootstrapping Server Function (BSF) is an intermediary element in Cellular networks which provides application independent functions for mutual authentication of user equipment and servers unknown to each other and for 'bootstrapping' the exchange of secret session keys afterwards.

GBA/GAA Setup

The setup and function to deploy a generic security relation as described is called Generic Bootstrapping Architecture (GBA) or Generic Authentication Architecture (GAA). In short, it consists of the following elements.

  • user equipment (UE), e. g. a mobile cellular telephone; needs access
    to a specific service
  • application server (NAF: Network Application Function), e. g. for
    mobile TV; provides the service
  • BSF (Bootstrapping Server Function); arranges security relation
    between UE and NAF
  • mobile network operator's Home Subscriber Server (HSS); hosts user
    profiles.

In this case, the term 'bootstrapping' is related to building a security relation with a previously unknown device first and to allow installing security elements (keys) in the device and the BSF afterwards.

Workflow

The BSF is introduced by the application server (NAF), after an unknown UE device is trying to get service access: the NAF refers the UE to the BSF. UE and BSF mutually authenticate via 3GPP protocol AKA (Authentication and Key Agreement); additionally, the BSF sends related queries to the Home Subscriber Server (HSS). Afterwards, UE and BSF agree on a session key to be used for encrypted data exchange with the application server (NAF). When the UE again connects to the NAF, the NAF is able to obtain the session key as well as user specific data from the BSF and can start data exchange with the end device (UE), using the related session keys for encryption.

Thanks,
Chinmoy

answer Jul 5, 2016 by Chinmoy Padhi
Similar Questions
+2 votes

How NFV works in telecom network? or how it is going to replace old network system?

+3 votes

How it is measured and what it means in LTE?

+3 votes

It will help me more if anybody can explain it with Indian Telecommunication standards frequency bands and can have example with.

...