tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top          in Index          Prev          Next

TS 33.246 (SA3)
3G Security – Security of Multimedia Broadcast/Multicast Service (MBMS)

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.1.0    2017/06    78 p.
(P) V13.1.0    2015/12    76 p.
(P) V12.2.0    2014/12    76 p.
(P) V11.2.0    2013/06    72 p.
(P) V10.1.0    2012/12    71 p.
(P) V9.1.0    2012/12    71 p.
(P) V8.4.0    2009/06    70 p.
(P) V7.6.0    2007/12    66 p.

Rapporteur:  Dr. Escott, Adrian
See also:  MBMS-related TS/TR    

The security of MBMS provides different challenges compared to the security of services delivered over point-to-point services. In addition to the normal threat of eavesdropping, there is also the threat that it may not be assumed that valid subscribers have any interest in maintaining the privacy and confidentiality of the communications, and they may therefore conspire to circumvent the security solution (for example one subscriber may publish the decryption keys enabling non-subscribers to view broadcast content).

Countering this threat requires the decryption keys to be updated frequently in a manner that may not be predicted by subscribers while making efficient use of the radio network. The stage 1 requirements for MBMS are specified in TS 22.146.

The Technical Specification covers the security procedures of the Multimedia Broadcast/Multicast Service (MBMS) for 3GPP systems (UTRAN, GERAN and E-UTRAN). MBMS is a 3GPP system network bearer service over which many different applications could be carried. The actual method of protection may vary depending on the type of MBMS application.


Here          Top          None          None          Next
part:    1     2     3



1   Scope [R6]   PDF-p. 8
2   References [R6]
3   Definitions, abbreviations, symbols and conventions [R6]   PDF-p. 10
4   MBMS security overview [R6]
5   MBMS security functions [R6]   PDF-p. 16
6   Security mechanisms [R6]   PDF-p. 18
6.1   Using GBA for MBMS
6.2   Authentication and authorisation of a user   PDF-p. 19      Up
6.3   Key management procedures
6.4   MIKEY message creation and processing in the ME
6.5   Validation and key derivation functions in MGV-F   PDF-p. 36
6.6   Protection of the transmitted traffic   PDF-p. 37
6.7   Confidentiality protection of associated delivery procedures [R11]   PDF-p. 40

Up          Top          ToC