Tech-invite   World Map
3GPPspecs     Glossaries     IETF     RFCs     Groups     SIP     ABNFs
Top        in Index        Prev        Next

TR 33.888 (SA3)
Study on security issues to support
Group Communication System Enablers (GCSE) for LTE

ToC      3GPP‑Page      Help       
V12.1.0 (Wzip)    2014/09    44 p.

Rapporteur:  Mr. Merkel, Jürgen
See also:  GCSE_LTE-related TS/TR    

To position LTE as technology for critical communications such as public safety, security for Group Communication (GC) needs to be considered. Group Communication function complements its sibling communication feature of Proximity-based Services (ProSe).

The present document studies the security aspects of the Group Communication Service Enabler for LTE (GCSE_LTE) and gives an evaluation of possible technical security solutions supporting such an Enabler. The present document looks at security from system perspective and defines functional security requirements for all entities. Stage 1 requirements for these services are defined in TS 22.468.

Different possible Stage 2 solutions for GCSE have been studied in TR 23.768. TS 23.468 provides the stage 2 description for the 3GPP system provided enablers to support GC services using E-UTRAN in Rel-12.

Based on the work done in TS 22.468, TR 23.768, and TS 23.468 the objectives of the present document are to identify the threats and deduce security requirements, develop GCSE_LTE security solutions, and determine which solution(s) from the present document (Study/TR phase) should be converted into normative specifications for Rel-12.


Here        Top        None        None        Next
1…      6.4…     



1   Scope   Word-p. 6
2   References   Word-p. 7
3   Definitions and abbreviations   Word-p. 8
4   Overview of Group Communication Service Enabler (GCSE)   Word-p. 9
5   GCSE security architecture   Word-p. 11
6   Key issues for GCSE security   Word-p. 12      Up
6.1   Key issue: Security in critical communication scenarios
6.2   Key issue: Interaction with ProSe security   Word-p. 14
6.3   Key issue: Security across Unicast and Multicast modes   Word-p. 18
6.3.1   Key issue details
6.3.2   Security threats
6.3.3   Security requirements
6.3.4   Solutions
6.3.5   Evaluation

Up        Top        ToC