Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.246
Word version: 19.0.0
0…
4…
A…
4
MBMS security overview
5
MBMS security functions
6
Security mechanisms
4
MBMS security overview
p. 11
4.1
MBMS security architecture
p. 11
4.1.1
General
p. 11
4.1.2
BM-SC sub-functions
p. 13
4.1.3
UE security architecture
p. 14
4.1A
Granularity of MBMS security
p. 15
4.2
Key management overview
p. 15
5
MBMS security functions
p. 16
5.1
Authenticating and authorizing the user
p. 16
5.2
Key derivation, management and distribution
p. 17
5.3
Protection of the transmitted traffic
p. 17
6
Security mechanisms
p. 18
6.1
Using GBA for MBMS
p. 18
6.2
Authentication and authorisation of a user
p. 19
6.2.1
Authentication and authorisation in HTTP procedures
p. 19
6.2.1.1
General
p. 19
6.2.1.2
Bootstrapping
p. 19
6.2.1.3
HTTP digest authentication
p. 19
6.2.2
Authentication and authorisation in MBMS bearer establishment
p. 20
6.2.3
Void
6.2.4
Void
6.3
Key management procedures
p. 20
6.3.1
General
p. 20
6.3.2
MSK procedures
p. 20
6.3.2.1
MSK identification
p. 20
6.3.2.1A
MBMS User Service Registration procedure
p. 21
6.3.2.1B
MBMS User Service Deregistration procedure
p. 24
6.3.2.2
MSK request procedures
p. 25
6.3.2.2.1
Basic MSK request procedure
p. 25
6.3.2.2.2
Void
6.3.2.2.3
Missed key update procedure
p. 26
6.3.2.2.4
BM-SC solicited pull procedure
p. 26
6.3.2.3
MSK delivery procedures
p. 27
6.3.2.3.1
Pushing the MSK to the UE
p. 27
6.3.2.3.2
Void
6.3.2.4
Handling of multiple status codes within one response message
p. 27
6.3.3
MTK procedures
p. 28
6.3.3.1
MTK identification
p. 28
6.3.3.2
MTK update procedure
p. 29
6.3.3.2.1
MTK delivery in download
p. 29
6.3.3.2.2
MTK delivery in streaming
p. 29
6.3.4
Multiple BM-SC deployments
p. 29
6.3.4.1
General
p. 29
6.3.4.2
Service announcement coordination
p. 29
6.3.4.3
MSK key management anchor point
p. 29
6.3.4.4
MSK coordination
p. 29
6.3.4.5
MTK coordination
p. 30
6.3.4.6
MIKEY MTK timestamp coordination
p. 30
6.4
MIKEY message creation and processing in the ME
p. 30
6.4.1
General
p. 30
6.4.2
MIKEY common header
p. 31
6.4.3
Replay protection
p. 31
6.4.4
General extension payload
p. 31
6.4.5
MIKEY message structure
p. 32
6.4.5.1
MSK message structure
p. 32
6.4.5.2
MSK Verification message structure
p. 34
6.4.5.3
MTK message structure
p. 34
6.4.6
Processing of received messages in the ME
p. 35
6.4.6.1
MSK MIKEY Message Reception
p. 35
6.4.6.2
MTK MIKEY Message Reception
p. 35
6.5
Validation and key derivation functions in MGV-F
p. 36
6.5.1
General
p. 36
6.5.2
Usage of MUK
p. 36
6.5.3
MSK processing
p. 36
6.5.4
MTK processing
p. 36
6.6
Protection of the transmitted traffic
p. 37
6.6.1
General
p. 37
6.6.2
Protection of streaming data
p. 38
6.6.2.1
Usage of SRTP
p. 38
6.6.2.1A
Usage of SRTCP
p. 38
6.6.2.2
Packet processing in the UE
p. 39
6.6.3
Protection of download data
p. 39
6.6.3.1
General
p. 39
6.6.3.2
Usage of OMA DRM DCF
p. 39
6.7
Confidentiality protection of associated delivery procedures
p. 40
6.7.1
General
p. 40
6.7.2
TLS Profile
p. 40
6.7.3
HTTP server authentication
p. 41
6.7.4
Authentication of the UE
p. 41