tech-invite   World Map
3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search     Home
Top        in Index        Prev        Next

TS 33.180 (SA3)
Security of the mission critical service

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.1.0    2017/09    133 p.

Rapporteur:  Mr. Haigh, Peter
See also:  MCX-related TS/TR    

The present document specifies the security architecture, procedures and information flows needed to protect the mission critical service (MCX). The architecture includes mechanisms to protect the Common Functional Architecture and security mechanisms for mission critical applications. This includes Push-To-Talk (MCPTT), Video (MCVideo) and Data (MCData). Additionally, security mechanisms relating to on-network use, off-network use, roaming, migration, interconnection, interworking and multiple security domains are described.

This specification complements the Common Functional Architecture defined in TS 23.280, the functional architecture for MCPTT defined in 23.379, the functional architecture for MCVideo defined in 23.281 and the functional architecture for MCData defined in TS 23.282.

The MC service can be used for public safety applications and also for general commercial applications e.g. utility companies and railways. As the security model is based on the public safety environment, some security features may not be applicable to MCPTT for commercial purposes.


Here        Top        None        None        Next
part:    1     2     3     4



1   Scope   PDF-p. 10
2   References
3   Definitions and abbreviations   PDF-p. 12
4   Overview of Mission Critical Security   PDF-p. 13
5   Common mission critical security framework   PDF-p. 20
5.1   User authentication and authorization
5.2   Key management common elements   PDF-p. 30
5.3   User key management (KMS)
5.4   Key management from MC client to MC server (CSK upload)   PDF-p. 43
5.5   Key management between MCX servers (SPK)
5.6   Key management for one-to-one (private) communications (PCK)
5.7   Key management for group communications (GMK)   PDF-p. 44
5.8   Key management from MC server to MC client (Key download)   PDF-p. 45
5.9   Key management during MBMS bearer announcement   PDF-p. 46

Up        Top        ToC