Tech-invite   World Map
3GPPspecs     Glossaries     IETF     RFCs     Groups     SIP     ABNFs
Top        in Index        Prev        Next

TR 33.860 (SA3)
Study on EGPRS access security enhancements
with relation to Cellular Internet of Things (CIoT)

ToC      3GPP‑Page      Help       
V13.1.0 (Wzip)    2016/06    46 p.

Rapporteur:  Mr. Torvinen, Vesa
See also:  CIoT-related TS/TR    

The present document contains a study of the EGPRS (Enhanced General Packet Radio Service) access security in relation to cellular IoT, and an evaluation of possible technical security enhancements needed to support such services. Different possible deployment scenarios for Cellular IoT, and related stage 2 solutions are being studied in TR 45.820. The scope of this study is limited to investigate the feasibility of improving the access security aspects of Gb mode. In more detail, the scope includes:
  1. Investigate potential security threats, such as man in the middle attacks.
  2. Investigate potential security enhancements between the UE and SGSN to mitigate said threats.
  3. Define what security procedures and security algorithms that are recommended to be used by for Cellular IoT devices in Gb mode. This may be procedures and algorithms already specified in earlier 3GPP releases or it could be new procedures and algorithms being introduced as part of this feasibility study.
  4. The potential security enhancements as part of this study item should aim at minimising the impacts to the GPRS core network.


Here        Top        None        None        Next
1…      A…     



1   Scope   Word-p. 7
2   References
3   Definitions and abbreviations   Word-p. 8
4   Cellular IoT
5   Key Issues      Up
6   Solutions   Word-p. 14
6.1   Solution #1: Integrity protection of signalling and algorithm negotiation
6.2   Solution #2: Data efficient rekeying   Word-p. 17      Up
6.3   Solution #3: Algorithms for ciphering and integrity protection   Word-p. 19
6.4   Solution #4: Protection for CIoT enhanced GPRS Layer 3 - GMM messages   Word-p. 22
6.5   Solution #5: Activating integrity protection for user data in bearer layer   Word-p. 25
6.6   Solution #6: Authenticated encryption
6.7   Solution #7: GIA with INPUT-I and CONSTANT-F
6.8   Solution #8: Implementation of integrity protection in LLC protocol      Up
7   Evaluation   Word-p. 29
8   Conclusions   Word-p. 30

Up        Top        ToC