This section presents all the standalone security functionalities. Security aspects related to other features are reported in the relevant section.
UID |
Name |
Acronym |
WG |
WID |
WI rapporteur name/company |
890030 | Authentication and key management for applications based on 3GPP credential in 5G | AKMA | | SP-190711 | Xiaoting Huang, China Mobile |
850021 | SA3 aspects of AKMA | AKMA | S3 | SP-190711 | Xiaoting Huang, China Mobile |
890008 | CT aspects of AKMA | AKMA-CT | ct | CP-203107 | Huang Zhenning (China Mobile) |
890031 | CT1 aspects of AKMA | AKMA-CT | C1 | CP-203107 | Huang Zhenning (China Mobile) |
890032 | CT3 aspects of AKMA | AKMA-CT | C3 | CP-203107 | Huang Zhenning (China Mobile) |
890033 | CT4 aspects of AKMA | AKMA-CT | C4 | CP-203107 | Huang Zhenning (China Mobile) |
Summary based on the input provided by China Mobile in SP-220289.
Authentication and key management for applications based on 3GPP credential in 5G (AKMA) is a cellular-network-based delegated authentication system specified for the 5G system, helping establish a secure tunnel between the end user and the application server. Using AKMA, a user can log in to an application service only based on the 3GPP credential which is the permanent key stored in the user's tamper-resistant smart card UICC. The application service provider can also delegate the task of user authentication to the mobile network operator by using AKMA.
The AKMA architecture and procedures are specified by SA3 in
TS 33.535, with the related study showing how its general principles are derived documented in
TR 33.835. The AKMA feature introduces a new Network Function into the 5G system, which is the AKMA Anchor Function (AAnF). Its detailed services and API definitions are specified by CT3 in
TS 29.535. Earlier generations of cellular networks include two similar standards specified by SA3, which are generic bootstrapping architecture (GBA) and battery-efficient security for very low throughput machine type communication devices (BEST). Since the AKMA feature is deemed as a successor of these systems, the work is launched by SA3 without the involvement of stage 1.
References
[16.2-1]
TS 33.535: "Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)"
[16.2-2]
TR 33.835: "Study on authentication and key management for applications based on 3GPP credential in 5G"
[16.2-3]
TS 29.535: "5G System; AKMA Anchor Services; Stage 3"
UID |
Name |
Acronym |
WG |
WID |
WI rapporteur name/company |
950043 | AKMA TLS protocol profiles | AKMA_TLS | S3 | SP-210424 | Escott, Adrian, Qualcomm |
920027 | Security aspects of AKMA_TLS | AKMA_TLS | S3 | SP-210424 | Escott, Adrian, Qualcomm |
950010 | CT aspects of AKMA_TLS | AKMA_TLS | C1 | CP-220307 | Chaponniere, Lena, Qualcomm Incorporated |
Summary based on the input provided by Qualcomm in SP-220620.
The work on AKMA TLS protocol profiles provides the details on how to use the newly introduced AKMA key (see [4]) to provide secure TLS connection between the UE and an Application Function (AF) in the network.
The AKMA WID [4] introduced a method of generating keys for use between a UE and an Application Function (AF) in the network. These keys are generated from a key derived by an authentication run over the 5G core (see [2]). The
"AKMA TLS protocol profiles" work item specifies how to use these AKMA key to provide secure TLS connections, either using certificate-based TLS and HTTP Digest with the AKMA key in the TLS tunnel or using symmetric key TLS using the AKMA key. The specification of the profiles is based on the methods standardised to utilise GBA keys in
TS 33.222 and
TS 24.109.
The stage 2 of the AKMA TLS protocol profiles work is specified in
TS 33.535 while the stage 3 is contained in
TS 24.109.
References
[16.3-1]
TS 33.222: "Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS)"
[16.3-2]
TS 33.535: "Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)"
[16.3-3]
TS 24.109: "Bootstrapping interface (Ub) and network application function interface (Ua); Protocol details"
[16.3-4]
Authentication and key management for applications based on 3GPP credential in 5G (SP-190711)
UID |
Name |
Acronym |
WG |
WID |
WI rapporteur name/company |
910025 | User Plane Integrity Protection for LTE | UPIP_SEC_LTE | S3 | SP-210105 | Evans, Tim, Vodafone |
820006 | Study on User Plane Integrity Protection | FS_UP_IP_Sec | S3 | SP-181035 | Evans, Tim, Vodafone |
890012 | Enhancements to User Plane Integrity Protection Support in 5GS | eUPIP_SEC | S3 | SP-200719 | Anand Palanigounder, Qualcomm |
Summary based on the input provided by Vodafone in RP-221340.
Release 15 NR and 5G Core enabled optional support for the integrity protection of user plane data. In Release 16, it was made mandatory for UEs to support User Plane Integrity Protection (UPIP) in NR at the full data rate that the UE supports in both the Uplink and Downlink. This provides protection against certain security attacks but only for NR capable devices while using NR and the 5G Core.
In Release 17, the SA 3 work item
"User Plane Integrity Protection for LTE" was agreed in SP-210105 with the intention of protecting LTE devices from these security attacks. Subsequently, in RP-213669, TSG-RAN agreed the Building Block WID
"User Plane Integrity Protection support for EPC connected architectures" to enable full data rate Uu interface UPIP for EPS, but only on EN-DC capable devices. This provides useful protection to NR capable smartphones in case they are, for example, forced off NR and onto an E-UTRA-only connection or an EN-DC connection.
The overall security architecture is specified in
TS 33.401 and system architecture details are specified in
TS 23.501 and
TS 23.401.
The UE indicates its support for EPS UPIP in the UE Network Capability sent in NAS signalling (
TS 24.301) from the UE to the MME. The MME stores this UPIP support information and sends it to the eNB in the S1AP Initial Context Setup Request and Handover Request messages. The eNB uses this indication (and not any information in the UE Radio Access Capabilities IE) to determine whether the UE supports EPS UPIP.
The SMF+PGW-C may supply the MME with a security policy (UPIP required/preferred/not needed). The MME stores this policy information and passes it onto the eNB on a per-EPS bearer basis in the Security Indication IE. If the eNB does not receive any security policy, the eNB can be configured with a default UPIP policy to use (e.g.
"UPIP preferred").
X2AP (
TS 36.423), and S1AP (
TS 36.413) signalling supports UPIP continuity at handover. X2AP supports the use of UPIP in the SgNB when EN-DC is in use. E1AP interface signalling (
TS 37.483) supports UPIP when the eNB is split into eNB-Control Plane and eNB-User Plane functions.
At X2, S1 (intra and inter-MME) and inter-RAT handovers, mechanisms are specified in X2AP and S1AP to ensure that EPS bearers with a security policy of
"UPIP required" are not handed over to eNBs that do not support UPIP.
RRC signalling (
TS 36.331 and
TS 38.331) enables the use of UPIP with the UE in both EN-DC and LTE-only configurations. As described in the LS from RAN2 to SA3 in R2-2203663:
UPIP for the EPC connected architectures uses NR PDCP and is configured in following way:
-
(as is done for legacy LTE UE) an LTE algorithm code point is configured in field integrityProtectionAlgorithm in IE SecurityAlgorithmConfig in the TS 36.331 SecurityModeCommand message, and this is used to derive KUPint (and also to derive KUPEnc, as for legacy LTE UE).
-
The NR algorithm code point (corresponding to the LTE algorithm code point used in the SecurityModeCommand) indicated by the integrityProtAlgorithm included in the securityConfig in the TS 38.331 RadioBearerConfig is used to configure the UP IP algorithm applied by NR PDCP to perform integrity protection.
-
The integrityProtection indicated in pdcp-Config in the DRB-ToAddMod(list) in the TS 38.331 RadioBearerConfig is used to activate the UP IP for a DRB using the configured algorithm, which can be done only at DRB setup. Consequently, UP IP activation/deactivation for a DRB can be changed only by DRB-release-and-add.
References
UID |
Name |
Acronym |
WG |
WID |
WI rapporteur name/company |
950040 | Non-Seamless WLAN offload authentication in 5GS | NSWO_5G | S3 | SP-211358 | Ranganathan Mavureddi Dhanasekaran, Nokia |
910091 | Study on Non-Seamless WLAN offload authentication in 5GS using 3GPP credentials | FS_NSWO_5G | S3 | SP-210262 | Nair, Suresh, Nokia |
940011 | Security aspects of NSWO | NSWO_5G | S3 | SP-211358 | Ranganathan Mavureddi Dhanasekaran, Nokia |
950041 | CT1 aspects of NSWO | NSWO_5G | C1 | CP-220095 | Wiehe, Ulrich, Nokia |
950002 | CT4 aspects of NSWO | NSWO_5G | C4 | CP-220095 | Wiehe, Ulrich, Nokia |
950042 | CT6 aspects of NSWO | NSWO_5G | C6 | CP-220095 | Wiehe, Ulrich, Nokia |
Summary based on the input provided by Nokia in SP-220426 (which replaced CP-220150).
Non-seamless WLAN offload (NSWO) is an optional capability of a UE supporting WLAN radio access. A UE supporting non-seamless WLAN offload may, while connected to WLAN access, route specific IP flows via the WLAN access without traversing the 3GPP core network.
For authentication 5G NSWO uses EAP-AKA' as specified in IETF RFC 5448.
A new network function, called NSWOF, supports authentication for NSWO in 5GS. The NSWOF interfaces the WLAN access network via SWa and the AUSF via the Nausf service-based interface (SBI). The AUSF retrieves NSWO-specific authentication information from the UDM via the Nudm service-based interface. In addition, the USIM and/or ME can be configured to use 5G NSWO.
5G NSWO co-existence with EPS NSWO is considered. Also, different configurations for NSWO roaming are described.
References
UID |
Name |
Acronym |
WG |
WID |
WI rapporteur name/company |
910090 | Integration of Generic Bootstrapping Architecture (GBA) into 5GC | GBA_5G | | SP-190714 | Vlasios Tsiatsis, Ericsson |
850023 | Security aspects of Integration of GBA into 5GC | GBA_5G | S3 | SP-190714 | Vlasios Tsiatsis, Ericsson |
910004 | CT aspects of Integration of GBA into SBA | GBA_5G | C4 | CP-210283 | de Gregorio, Jesús (Ericsson) |
910047 | Integration of Generic Bootstrapping Architecture (GBA) into 5GC | GBA_5G | S3 | SP-190714 | Vlasios Tsiatsis, Ericsson |
Summary based on the input provided by Ericsson in SP-220321.
The existing Generic Bootstrapping Architecture (GBA) was firstly introduced in Rel-6 and prior to Rel-17 the architecture included network functions interacting with each other via dedicated reference point interfaces. The integration of the Generic Bootstrapping Architecture (GBA) to the 5G Core (5GC) introduces Service Based Interfaces (SBA) for the related GBA Network Functions as well as specific GBA services for the User Data Management (UDM) network function in 5GC. In this way GBA can be used in 5GC deployments.
The 3GPP authentication infrastructure employed in GBA includes Home Network (HN) functions User Equipment (UE) functions and the 3GPP AKA (Authentication and Key Agreement) protocol. This infrastructure is a very valuable asset of 3GPP operators and could be leveraged to enable application functions in the network and on the User Equipment (UE) side to establish shared cryptographic material based on 3GPP credentials. This is the motivation and purpose of the Generic Bootstrapping Architecture (GBA) and GBA Push features developed in 3GPP since Rel-6.
The GBA architecture in releases prior to Rel-17 includes a Bootstrapping Server Function (BSF) which is the anchor of the cryptographic key hierarchy, the Home Subscriber System (HSS), which handles the user subscriptions and provides authentication vectors to the BSF, UE applications and Network Application Functions (NAFs). GBA includes a bootstrapping protocol for authentication and key agreement for a root security key between the UE and BSF and a framework of application session protocols (Ua protocols) to establish an application security key between a UE and a NAF. The application security key is derived from the bootstrapping key. The GBA Push feature includes a protocol between the NAF and the UE in order to establish the application security key with a more efficient message exchange suitable for constrained devices. GBA is specified to support at least the following Diameter-based reference point interfaces: (a) Zh between the BSF and HSS for mutual authentication between the HN and the UE, (b) Zn between the BSF and NAF for the application security key establishment and (c) Zpn between the BSF and a GBA Push enabled NAF (Push-NAF) for a combined mutual authentication and application security key establishment. The use of these interfaces has allowed GBA to be used in 3G and also in 4G core networks since the HSS in 3G and 4G supported Diameter-based interfaces.
With the advent of 5G, the 5G Core (5GC) has introduced Network Functions which expose SBA interfaces and among other network functions a new subscription management network function, the User Data Management (UDM). Enabling GBA and GBA Push functionality to be used in 5GC, resulted in the inclusion of the GBA and GBA Push functions in SBA as well as the specification of the SBA interfaces for the BSF, HSS and UDM. More specifically, a Service Based Interface (SBI) capable BSF exposes not only the aforementioned reference point interfaces but also SBA interfaces towards an SBI capable NAF. An SBI capable HSS provides an SBA interface for the BSF to retrieve authentication vectors and other GBA related subscription information for the GBA and GBA Push procedures. Finally, the UDM exposes a new service operation for an SBI capable BSF to retrieve authentication vectors provided by the UDM.
References
[16.6-1]
TS 23.501: "System architecture for the 5G System (5GS)".
[16.6-2]
TS 33.501: "Security architecture and procedures for 5G System".
[16.6-3]
TS 33.220: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)".
[16.6-4]
TS 33.223: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function".
[16.6-5]
TS 29.510: "5G System; Network function repository services; Stage 3".
[16.6-6]
TS 29.562: "5G System; Home Subscriber Server (HSS) services; Stage 3".
UID |
Name |
Acronym |
WG |
WID |
WI rapporteur name/company |
860016 | Assurance Specification for IMS | SCAS_IMS | S3 | SP-191128 | Bo Zhang, Huawei Technologies |
870020 | Security Assurance Specification for 5G (eSCAS_5G) | eSCAS_5G | S3 | SP-200149 | Rong Wu, Huawei Technologies Co. |
890013 | eSCAS_5G for Network Slice-Specific Authentication and Authorization Function (NSSAAF) | SCAS_5G_NSSAAF | S3 | SP-200720 | Rong Wu, Huawei Technologies Co., Ltd. |
870017 | eSCAS_5G for Non-3GPP InterWorking Function | SCAS_5G_N3IWF | S3 | SP-200146 | Feng Gao, China Unicom |
870018 | eSCAS_5G for 5G NWDAF | SCAS_5G_NWDAF | S3 | SP-200147 | QI Minpeng, China Mobile |
870019 | eSCAS_5G for Service Communication Proxy | SCAS_5G_SECOP | S3 | SP-200148 | Wei Lu, Nokia |
880003 | eSCAS_5Gfor Inter PLMN UP Security | SCAS_5G_IPUPS | S3 | SP-200348 | Jin PENG, ZTE Corporation |
UID |
Name |
Acronym |
WG |
WID |
WI rapporteur name/company |
900019 | Adapting BEST for use in 5G networks | BEST_5G | S3 | SP-201020 | Keesmaat, Iko, KPN |
Summary based on the input provided by KPN in SP-221202.
This work item updates the BEST feature (Battery Efficient Security for very low Throughput Machine Type Communication (MTC) devices) for use in 5G networks. The original BEST feature (based on WI 730050 BEST_MTC_Sec) was defined for LTE and made use of LTE architecture and a UMTS based key agreement procedure.
The result of the work item is a BEST feature applicable to a range of architectures and key agreement procedures:
-
the original LTE architecture using UMTS based key agreement procedure;
-
an updated LTE architecture using LTE based key agreement procedure;
-
a 5G architecture using 5G based key agreement procedure;
-
an LTE or 5G architecture using GBA as key agreement procedure;
-
a 5G architecture using AKMA as key agreement procedure; and
-
a 5G architecture using a proprietary key agreement procedure.
References
[16.8-1]
TS 33.163: Battery Efficient Security for very low Throughput Machine Type Communication (MTC) devices (BEST)
UID |
Name |
Acronym |
WG |
WID |
WI rapporteur name/company |
930031 | User Consent for 3GPP services | FS_UC3S | S3 | SP-200885 | Rong Wu, Huawei Technologies |
890037 | Study on User Consent for 3GPP services | FS_UC3S | S3 | SP-200885 | Rong Wu, Huawei Technologies |
930006 | Security aspects on User Consent for 3GPP services | UC3S_SEC | S3 | SP-210836 | Rong Wu, Huawei Technologies |
910024 | Enhancements of 3GPP profiles for cryptographic algorithms and security protocols | eCryptPr | S3 | SP-210107 | Pinar Comak, Ericsson |
860025 | Lawful Interception Rel-17 | LI17 | S3 | SP-190983 | Alex Leadbeater, BT |
850047 | (Small) Technical Enhancements and Improvements for Rel-17 | TEI17 | | | |