Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   Next

TS 33.246 (SA3)
3G Security – Security of Multimedia Broadcast/Multicast Service (MBMS)

ToC   3GPP‑Page   ETSI‑search   Help    
V15.0.0 (PDF)2018/06  77 p.
V14.2.0  2017/09  78 p.
V13.1.0  2015/12  76 p.
V12.2.0  2014/12  76 p.
V11.2.0  2013/06  72 p.
V10.1.0  2012/12  71 p.
V9.1.0  2012/12  71 p.
V8.4.0  2009/06  70 p.
V7.6.0  2007/12  66 p.

Rapporteur:  Dr. Escott, Adrian
See also:  MBMS-related TS/TR

The security of MBMS provides different challenges compared to the security of services delivered over point-to-point services. In addition to the normal threat of eavesdropping, there is also the threat that it may not be assumed that valid subscribers have any interest in maintaining the privacy and confidentiality of the communications, and they may therefore conspire to circumvent the security solution (for example one subscriber may publish the decryption keys enabling non-subscribers to view broadcast content).

Countering this threat requires the decryption keys to be updated frequently in a manner that may not be predicted by subscribers while making efficient use of the radio network. The stage 1 requirements for MBMS are specified in TS 22.146.

The Technical Specification covers the security procedures of the Multimedia Broadcast/Multicast Service (MBMS) for 3GPP systems (UTRAN, GERAN and E-UTRAN). MBMS is a 3GPP system network bearer service over which many different applications could be carried. The actual method of protection may vary depending on the type of MBMS application.


Here   Top   None   None   Next
1…      A…   G…     



1  Scope [R6]PDF-p. 8
2  References [R6]
3  Definitions, abbreviations, symbols and conventions [R6]PDF-p. 10
4  MBMS security overview [R6]
5  MBMS security functions [R6]PDF-p. 16
6  Security mechanisms [R6]PDF-p. 18
6.1  Using GBA for MBMS
6.2  Authentication and authorisation of a userPDF-p. 19Up
6.3  Key management procedures
6.4  MIKEY message creation and processing in the ME
6.5  Validation and key derivation functions in MGV-FPDF-p. 36
6.6  Protection of the transmitted trafficPDF-p. 37
6.7  Confidentiality protection of associated delivery procedures [R11]PDF-p. 40

Up   Top   ToC