Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 33.163  Word version:  17.0.0

Top   Top   None   None   Next
0…   4…   4.3…   4.6…   5…   6…   6.2.2…   6.2.6…   6.2.7…   7…   A…

 

0  Introductionp. 5

This document describes communication security and key agreement processes that are optimised for battery constrained, very low throughput Machine Type Communication (MTC) devices.
Specifically:
  • N-PDU data tampering and eavesdropping
  • Efficient user data protection challenges
  • VPLMN Specific Needs
  • End-to-end security

1  Scopep. 6

The present document defines communication security processes designed for very low throughput Machine Type Communication (MTC) devices that are battery constrained.
These processes consist of:
  • A Key agreement service for End to Middle and End to End security use
  • An End to Middle secure transport service that includes the ability to verify and confidentiality protect low throughput data.
  • An End to End secure transport service that includes the ability to verify and confidentiality protect low throughput data.
Up

2  Referencesp. 6

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
TR 33.863: "Study on battery efficient security for very low throughput Machine Type Communication (MTC) devices".
[3]
TS 33.102: "3G security; Security architecture".
[4]
TS 23.401: "General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access".
[5]
TS 24.008: "Mobile radio interface Layer 3 specification; Core network protocols; Stage 3".
[6]
TS 55.241: "Specification of the GIA4 integrity algorithm for GPRS; GIA4 specification"
[7]
TS 55.251: "Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS; GEA5 and GIA5 algorithm specification"
[8]
TS 35.201: " Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification".
[9]
TS 35.215: "Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications"
[10]
TS 35.221: "Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications".
[11]
TS 33.310: "Network Domain Security (NDS); Authentication Framework (AF)".
[12]
TS 33.401: "3GPP System Architecture Evolution (SAE); Security architecture".
[13]
TS 33.220: " Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)".
[14]
TS 23.682: "Architecture enhancements to facilitate communications with packet data networks and applications".
[15]
TS 31.102: "Characteristics of the Universal Subscriber Identity Module (USIM) application".
[16]
TS 33.501: "Security architecture and procedures for 5G system".
[17]
TS 33.535: "Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)".
[18]
TS 24.501: "Non-Access-Stratum (NAS) protocol for 5G System (5GS); Stage 3".
Up

3  Definitions and abbreviationsp. 7

3.1  Definitionsp. 7

For the purposes of the present document, the terms and definitions given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.
BEST:
Battery Efficient Security for very low Throughput Machine Type Communication (MTC) devices
BEST Capable UE:
A UE that is enabled for the BEST service
Enterprise Key:
A secret key shared by the Enterprise Application Server and the UE for application in the BEST service
EAS PSK:
An Enterprise Application Service specific key derived by the HSE and the UE from the Intermediate key and meant to be forwarded to a specific EAS by the HSE.
Intermediate Key:
A key derived by the HSE and the UE from CK and IK to be used to derive the EAS PSK
Intermediate Key Identifier:
A key identifier that identifies an Intermediate Key
UE-to-HSE keys:
Keys derived by the HSE and the UE from CK and IK to be used on control and/or user plane between the UE and HSE.
UE-to-EAS keys:
Keys derived by the EAS and the UE from EAS PSK and an Enterprise Key to be used for user plane between UE and EAS.
UE-to-HSE:
UE to Home PLMN Security Endpoint
UE-to-EAS:
UE to Enterprise Application Server
Up

3.2  Abbreviationsp. 7

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
EAS
Enterprise Application Server
HSE
HPLMN Security Endpoint

Up   Top   ToC