Trusted environment and secure execution
All sensitive
functions used for device authentication, such
as operations involving the private key of the eNB,
must be ensured in such a way that they will never
leave the trusted environment
Another security feature,
autonomous validation, in which the network
is assured after successful authentication that only
an integrity-checked device could have performed