Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 22.837  Word version:  19.3.0

Top   Top   Up   Prev   Next
0…   4   5…   5.2…   5.3…   5.4…   5.5…   5.6…   5.7…   5.8…   5.9…   5.10…   5.11…   5.12…   5.13…   5.14…   5.15…   5.16…   5.17…   5.18…   5.19…   5.20…   5.21…   5.22…   5.23…   5.24…   5.25…   5.26…   5.27…   5.28…   5.29…   5.30…   5.31…   5.32…   6…   7…

 

6  Considerationsp. 87

6.1  Considerations on confidentiality, integrity and privacyp. 87

6.1.1  Generalp. 87

When introducing sensing technology, new aspects on confidentiality, integrity, and privacy need to be considered, to ensure that these aspects are considered already when proposing service requirements.
For instance, with sensing technology by-standers can be affected in a completely new way, previously only UEs have been able to be tracked but now sensing capabilities may enable tracing and potentially identification of anything in the environment, including humans that do not carry a UE, or any objects. This has implications for privacy. Obviously humans should have a right to privacy.
For privately owned areas, respective permission is required for sensing operation from such as the homeowner for in-home sensing or the building management for the in-building sensing.
For public areas, such as a public road, park and airport, it is required to obtain the permission of the respective public area management.
It is important to have the user consent before the network uses UEs in providing sensing service. If the sensing results and user ID are brought together for further processing, user consent is also needed.
Of course, factors such as resolution, updating frequency, and type of application influence the security implications.
Requirements to minimize the risk of unwanted usage and awareness of the usage needs to be considered in stage 1. These are captured in the next chapter.
Up

6.1.2  Potential New Requirementsp. 87

A set of general new requirements can be identified:
[PR 6.1.2-1]
The 5G system shall limit sending the sensing results only to third party authorized to receive that sensing results.
[PR 6.1.2-2]
The 5G system shall support encryption and integrity protection of the sensing result, to protect the data inside the 5G system and when used.
[PR 6.1.2-3]
The 5G system shall support appropriate level of sensing for both situations where consent can be obtained from the sensing targets, and where it cannot.
[PR 6.1.2-4]
Subject to regulation, the 5G system shall obtain user consent when sensing results and user identification are brought together for further processing.
Up

6.2  Considerations on Regulatory, Mission Critical and other priority servicesp. 88

6.2.1  Generalp. 88

The sensing operation in Operator's network can support commercial services (e.g. use case described in section 5.8 on sensing assisted automotive manoeuvring and navigation). There could be areas where the network resources are limited and prioritization (according to operator's decision) would be needed among the resources used for sensing service and resources used for other services (e.g. communication service).
In addition, sensing operation could also be used to support services such as MCS (e.g. public safety, Utilities, Railways) and MPS with requirements for priority treatment. The 5G system can provide flexible means for priority treatment to the users of sensing services subject to regional/national regulatory rules and operator policy.
Up

6.2.2  Potential New Requirementsp. 88

[PR 6.2.2-1]
Subject to regulation and operator's policy, 5G system shall provide prioritization among sensing services.

Up   Top   ToC