What is the interface between EIR and MME?

In 5G networks, there isn’t a direct interface between the Equipment Identity Register (EIR) and the Mobility Management Entity (MME) as found in older generation networks like 4G (LTE). Instead, the functionality related to subscriber authentication, authorization, and equipment identity management is distributed across various elements within the 5G core network. However, it’s important to note that certain aspects of equipment identity management in 5G, including aspects traditionally handled by the EIR, are now covered by the Authentication Server Function (AUSF) and the Authentication Management Function (AMF).

Here’s an overview of how equipment identity management is handled in 5G, including the relevant elements:

  1. Authentication Server Function (AUSF):
    • The AUSF is a key element in the 5G core network that plays a central role in subscriber authentication and authorization. It manages authentication vectors and provides authentication information to the network elements involved in the authentication process.
    • In 5G, the AUSF is responsible for generating and storing authentication vectors that include keys and other parameters necessary for securing the communication between the User Equipment (UE) and the network.
  2. Authentication Management Function (AMF):
    • The AMF is another critical element in the 5G core network responsible for managing authentication procedures. It interacts with the AUSF to obtain authentication vectors and performs the authentication of the UE during the initial registration and connection establishment.
    • The AMF is responsible for coordinating the authentication process, including generating challenges, verifying responses from the UE, and ensuring the security of communication.
  3. Subscriber Identity Handling:
    • In 5G, subscriber identity and authentication-related functions are distributed across the AUSF and AMF. The AUSF, in particular, manages subscriber-related authentication information and ensures that only authorized UEs can access the network.
  4. UE Authentication:
    • When a UE initiates a connection or registers with the network, the AMF interacts with the AUSF to obtain authentication vectors. These vectors are then used in the authentication process to verify the identity of the UE and establish a secure connection.
  5. No EIR Interface:
    • Unlike previous generations, such as 4G (LTE), where the EIR played a specific role in managing equipment identity and interacting with the MME, there isn’t a direct EIR interface in 5G. Instead, equipment identity-related functions are integrated into the authentication and security processes managed by the AUSF and AMF.
  6. Security Considerations:
    • The AUSF and AMF work together to ensure the security of the 5G network. This includes protecting against identity theft, unauthorized access, and other security threats. The use of secure authentication vectors and cryptographic mechanisms helps in safeguarding communication between the UE and the network.

In summary, in 5G networks, the equipment identity management functions traditionally associated with the EIR in previous generations are distributed across the AUSF and AMF. These elements work together to ensure secure authentication, subscriber authorization, and protection against identity-related security threats without a specific EIR interface with the MME as seen in 4G networks.