5G Security Procedures
This 5G security procedures page groups the main procedures used in this part of the 5G signaling library so you can jump quickly into the right flow for learning, trace reading, or troubleshooting.
Quick Links
What This Covers
Describes authentication, NAS security activation, AS security setup, key derivation, and security mode related call flows in 5G.
These procedures are useful when you want a focused view of one 5G signaling family rather than the full 5G library.
Use this category page to jump into the main security procedures procedures without scanning the broader 5G call flow library.
Subscriber Authentication
Procedures that validate subscriber identity and allow protected continuation of 5G service.
- Authentication Procedure — UE authentication
- Re-Authentication / Identity Recovery Procedure — Later identity revalidation and security recovery
- EAP-AKA’ / Non-3GPP Access Authentication — Authentication for alternate non-3GPP access
Security Activation and Refresh
Procedures that activate or refresh the active NAS and access-side security context.
- NAS Security Mode Procedure — Activate NAS protection for later signaling
- AS Security Activation Procedure — Activate access-stratum radio security
- Security Context Update — Update encryption keys
Relay and Specialized Security
Procedures that handle relay-aware, sidelink-aware, or other non-basic security branches.
- Relay Key Procedure — Relay-specific NAS key and authentication exchange
- Relay / Sidelink Security Procedure — Security handling for relay-aware or sidelink use cases