tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top        in Index        Prev        Next

TR 33.879 (SA3)
Study on security enhancements for
Mission Critical Push To Talk (MCPTT) over LTE

|   ToC   |   3GPP‑Page   |   Help   |

(W-zip) V13.1.0    2016/06    88 p.


Rapporteur:  Mr. Haigh, Peter
See also:  MCPTT-related TS/TR    


The present document contains a study of the security aspects of the Mission-Critical Push-To-Talk (MCPTT) service and its interaction with the network. This includes an analysis of the threats to the service, the security requirements to mitigate those threats and an evaluation of possible technical solutions designed to meet the security requirements of the service.

This study will include consideration of relevant 3GPP specifications, particularly for ProSe and GCSE.

The focus of the present document is to support public-safety use of MCPTT as prioritised by SA#66 (SP-140870). Some features may not be applicable to MCPTT for commercial purposes (e.g. Ambient Listening).


 

Here        Top        None        None        Next
part:    1     2     3

 

1 Scope    2 References    3 Definitions and abbreviations    3.1 Definitions    3.2 Abbreviations    4 Overview of Mission Critical Push-to-Talk (MCPTT)    4.1 Introduction    4.2 Architecture    4.3 MCPTT identity definition and usage    5 List of assets    6 Security analysis of MCPTT    6.1 General security requirements    6.2 Key Issue # 1: Configuration & service access    6.3 Key Issue # 2: Group Key Management    6.4 Key Issue # 3: On-Network Operation: denial of service    6.5 Key Issue # 4: Ambient Listening    6.6 Key Issue # 5: Data communication security between MCPTT network entities    6.7 Key Issue # 6: On-Network Operation: impersonation    6.8 Key Issue # 7: On-Network Operation: manipulation    6.9 Key Issue # 8: On-network operation: traffic analysis    6.10 Key Issue # 9: On-network operation: interception of user traffic    6.11 Key Issue # 10: Key Stream Re-use    6.12 Key Issue # 11: Late Entry to Group Communication    6.13 Key Issue # 12: Private Call Confidentiality    6.14 Key Issue # 13: Off-network operation: denial of service    6.15 Key Issue # 14: Off-Network Operation: interception of user traffic    6.16 Key Issue # 15: Off-network operation: impersonation    6.17 Key Issue # 16: Off-network operation: manipulation    6.18 Key Issue # 17: Off-network operation: traffic analysis    6.19 Key Issue #18: Privacy of MCPTT identities   
...

 

1   Scope   Word-p. 8
2   References
3   Definitions and abbreviations   Word-p. 9
4   Overview of Mission Critical Push-to-Talk (MCPTT)
5   List of assets
6   Security analysis of MCPTT   Word-p. 15
6.1   General security requirements
6.2   Key Issue # 1: Configuration & service access
6.3   Key Issue # 2: Group Key Management      Up
6.4   Key Issue # 3: On-Network Operation: denial of service   Word-p. 17
6.5   Key Issue # 4: Ambient Listening
6.6   Key Issue # 5: Data communication security between MCPTT network entities
6.7   Key Issue # 6: On-Network Operation: impersonation
6.8   Key Issue # 7: On-Network Operation: manipulation      Up
6.9   Key Issue # 8: On-network operation: traffic analysis   Word-p. 20
6.10   Key Issue # 9: On-network operation: interception of user traffic
6.11   Key Issue # 10: Key Stream Re-use
6.12   Key Issue # 11: Late Entry to Group Communication   Word-p. 22
6.13   Key Issue # 12: Private Call Confidentiality      Up
6.14   Key Issue # 13: Off-network operation: denial of service
6.15   Key Issue # 14: Off-Network Operation: interception of user traffic
6.16   Key Issue # 15: Off-network operation: impersonation   Word-p. 24
6.17   Key Issue # 16: Off-network operation: manipulation
6.18   Key Issue # 17: Off-network operation: traffic analysis   Word-p. 25      Up
6.19   Key Issue #18: Privacy of MCPTT identities

Up        Top        ToC