Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   Next

TR 33.879 (SA3)
Study on security enhancements for
Mission Critical Push To Talk (MCPTT) over LTE

ToC   3GPP‑Page   Help    
V13.1.0 (Wzip)  2016/06  88 p.


Rapporteur:  Mr. Haigh, Peter
See also:  MCPTT-related TS/TR

The present document contains a study of the security aspects of the Mission-Critical Push-To-Talk (MCPTT) service and its interaction with the network. This includes an analysis of the threats to the service, the security requirements to mitigate those threats and an evaluation of possible technical solutions designed to meet the security requirements of the service.

This study will include consideration of relevant 3GPP specifications, particularly for ProSe and GCSE.

The focus of the present document is to support public-safety use of MCPTT as prioritised by SA#66 (SP-140870). Some features may not be applicable to MCPTT for commercial purposes (e.g. Ambient Listening).


 

Here   Top   None   None   Next
1…      7…   8…     

 

 

1  ScopeWord-p. 8
2  References
3  Definitions and abbreviationsWord-p. 9
4  Overview of Mission Critical Push-to-Talk (MCPTT)
5  List of assets
6  Security analysis of MCPTTWord-p. 15
6.1  General security requirements
6.2  Key Issue # 1: Configuration & service access
6.3  Key Issue # 2: Group Key ManagementUp
6.4  Key Issue # 3: On-Network Operation: denial of serviceWord-p. 17
6.5  Key Issue # 4: Ambient Listening
6.6  Key Issue # 5: Data communication security between MCPTT network entities
6.7  Key Issue # 6: On-Network Operation: impersonation
6.8  Key Issue # 7: On-Network Operation: manipulationUp
6.9  Key Issue # 8: On-network operation: traffic analysisWord-p. 20
6.10  Key Issue # 9: On-network operation: interception of user traffic
6.11  Key Issue # 10: Key Stream Re-use
6.12  Key Issue # 11: Late Entry to Group CommunicationWord-p. 22
6.13  Key Issue # 12: Private Call ConfidentialityUp
6.14  Key Issue # 13: Off-network operation: denial of service
6.15  Key Issue # 14: Off-Network Operation: interception of user traffic
6.16  Key Issue # 15: Off-network operation: impersonationWord-p. 24
6.17  Key Issue # 16: Off-network operation: manipulation
6.18  Key Issue # 17: Off-network operation: traffic analysisWord-p. 25Up
6.19  Key Issue #18: Privacy of MCPTT identities

Up   Top   ToC