Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.303
Word version: 18.0.0
1…
4…
A…
4
Overview of ProSe security
4.1
General
4.2
Reference points and Functional Entities
5
Common security procedures
5.1
General
5.2
Network domain security
5.3
Security of UE to ProSe Function interface
5.4
Security of the PC2 reference point
6
Security for ProSe features
6.1
ProSe direct discovery
6.2
Security for One-to-many ProSe direct communication
6.3
EPC-level discovery of ProSe-enabled UEs
6.4
Security for EPC support WLAN direct discovery and communication
6.5
Security for One-to-one ProSe Direct communication
6.6
Security for ProSe Public Safety Discovery
6.7
Security for ProSe UE-to-network relays
4
Overview of ProSe security
p. 12
4.1
General
p. 12
4.2
Reference points and Functional Entities
p. 12
5
Common security procedures
p. 12
5.1
General
p. 12
5.2
Network domain security
p. 12
5.2.1
General
p. 12
5.2.2
Security requirements
p. 12
5.2.3
Security procedures
p. 12
5.3
Security of UE to ProSe Function interface
p. 13
5.3.1
General
p. 13
5.3.2
Security requirements
p. 13
5.3.3
Security procedures
p. 13
5.3.3.1
Security procedures for configuration transfer to the UICC
p. 13
5.3.3.2
Security procedures for data transfer to the UE
p. 13
5.3.3.2.1
TLS 1.2
p. 13
5.3.3.2.2
TLS 1.3
p. 14
5.4
Security of the PC2 reference point
p. 15
5.4.1
Requirements on PC2 reference point
p. 15
5.4.2
Security procedures for PC2 reference point
p. 15
6
Security for ProSe features
p. 16
6.1
ProSe direct discovery
p. 16
6.1.1
Overview of ProSe direct discovery in network coverage
p. 16
6.1.2
Security requirements
p. 16
6.1.3
Security procedures
p. 17
6.1.3.1
Interface between the UE and ProSe Function
p. 17
6.1.3.2
Interfaces between network elements
p. 17
6.1.3.3
Integrity protection and validation of the transmitted code for open discovery
p. 17
6.1.3.3.1
Open discovery security flows
p. 17
6.1.3.4
Restricted discovery
p. 20
6.1.3.4.1
General
p. 20
6.1.3.4.2
Security flows
p. 20
6.1.3.4.2.1
Model A security flows
p. 20
6.1.3.4.2.2
Model B security flows
p. 23
6.1.3.4.3
Protection of the discovery messages over the PC5 interface
p. 26
6.1.3.4.3.1
General
p. 26
6.1.3.4.3.2
Message Processing in the sending UE
p. 27
6.1.3.4.3.3
Protected message processing in the receiving UE
p. 27
6.1.3.4.3.4
Integrity protection description
p. 28
6.1.3.4.3.5
Scrambling description
p. 28
6.1.3.4.3.6
Message-specific confidentiality description
p. 28
6.2
Security for One-to-many ProSe direct communication
p. 29
6.2.1
Overview of One-to-many ProSe direct communication
p. 29
6.2.2
Security requirements
p. 29
6.2.3
Bearer layer security mechanism
p. 30
6.2.3.1
Security keys and their lifetimes
p. 30
6.2.3.2
Identities
p. 30
6.2.3.3
Security flows
p. 32
6.2.3.3.1
Overview
p. 32
6.2.3.3.2
Messages between UE and ProSe Key Management Function
p. 34
6.2.3.3.2.1
General
p. 34
6.2.3.3.2.2
Key Request and Key Response messages
p. 34
6.2.3.3.2.3
MIKEY messages
p. 36
6.2.3.3.2.3.1
General
p. 36
6.2.3.3.2.3.2
Creation of the MIKEY key delivery message
p. 36
6.2.3.3.2.3.3
Processing the MIKEY key delivery message
p. 36
6.2.3.3.2.3.4
MIKEY Verification message
p. 37
6.2.3.4
Protection of traffic between UE and ProSe Function
p. 37
6.2.3.5
Protection of traffic between UE and ProSe Key Management Function
p. 37
6.2.3.6
Protection of traffic between UEs
p. 37
6.2.3.6.1
Protection of data
p. 37
6.2.3.6.2
Key derivation data in PDCP header
p. 38
6.2.4
Solution description for media security of one-to-many communications
p. 39
6.3
EPC-level discovery of ProSe-enabled UEs
p. 40
6.3.1
Security for proximity request authentication and authorization
p. 40
6.3.1.1
General
p. 40
6.3.1.2
Application Server-signed proximity request
p. 40
6.3.1.3
Proximity request digital signature algorithms and key strength
p. 41
6.3.1.4
Proximity request hash input format
p. 43
6.3.1.5
Verification key format
p. 43
6.3.1.6
Profile for Application Server certificate
p. 43
6.3.2
Protection of traffic between UE and ProSe Function
p. 43
6.4
Security for EPC support WLAN direct discovery and communication
p. 44
6.5
Security for One-to-one ProSe Direct communication
p. 44
6.5.1
General
p. 44
6.5.2
Security Requirements
p. 44
6.5.3
Overview of One-to-one ProSe Direct communication
p. 44
6.5.3.1
Description of differet layers of keys and their identities
p. 44
6.5.3.2
Security states
p. 45
6.5.3.3
High level overview of security establishment
p. 45
6.5.4
Direct Authentication and Key Establishment
p. 46
6.5.4.1
General
p. 46
6.5.5
Security Establishment procedures
p. 46
6.5.5.1
General
p. 46
6.5.5.2
Security establishment during connection set-up
p. 46
6.5.5.3
Rekeying security
p. 47
6.5.6
Protection of the one-to-one traffic
p. 48
6.5.6.1
General
p. 48
6.5.6.2
Integrity protection
p. 49
6.5.6.3
Confidentiality protection
p. 49
6.5.6.4
Security contents in the PCDP header
p. 49
6.5.7
ProSe one-to-one commuication security using ECCSI and SAKKE
p. 50
6.5.7.1
General
p. 50
6.5.7.2
Key and their identities
p. 50
6.5.7.3
Security flows
p. 50
6.5.7.3.1
Direct Connection Request
p. 50
6.5.7.3.2
Direct Rekeying Request
p. 51
6.6
Security for ProSe Public Safety Discovery
p. 52
6.6.1
General
p. 52
6.6.2
Security Requirements
p. 52
6.6.3
Overview of ProSe Public Safety Discovery
p. 52
6.6.3.1
General
p. 52
6.6.3.2
Key and their identities
p. 53
6.6.4
Security flows
p. 53
6.6.4.1
Overview
p. 53
6.6.4.2
Messages between UE and ProSe Key Management Function
p. 55
6.6.4.2.1
General
p. 55
6.6.4.2.2
Key Request and Key Response messages
p. 55
6.6.4.2.3
MIKEY messages
p. 56
6.6.4.2.3.1
General
p. 56
6.6.5
Protection of traffic between UE and ProSe Function
p. 56
6.6.6
Protection of traffic between UE and ProSe Key Management Function
p. 56
6.6.7
Protection of discovery messages between the UEs
p. 57
6.7
Security for ProSe UE-to-network relays
p. 57
6.7.1
General
p. 57
6.7.2
Security Requirements
p. 57
6.7.3
Overview of ProSe UE-to-network relay security
p. 58
6.7.3.1
General
p. 58
6.7.3.2
Security flows
p. 58
6.7.3.2.1
Overview
p. 58
6.7.3.2.1.1
Remote UE attaching to a ProSe UE-to-network relay
p. 58
6.7.3.2.1.2
Re-synchronisation in GBA Push authentication
p. 60
6.7.3.2.1.3
Rekeying procedures
p. 61
6.7.3.2.2
Messages between the Remote UE and ProSe Key Management Function
p. 62
6.7.3.2.2.1
General
p. 62
6.7.3.2.2.2
Key Request and Key Response messages
p. 62
6.7.3.2.3
Messages between the Relay and ProSe Key Management Function
p. 63
6.7.3.2.3.1
General
p. 63
6.7.3.2.3.2
Key Request and Key Response messages
p. 63
6.7.3.3
Protection of traffic between Remote UE or Relay and ProSe Function
p. 64
6.7.3.4
Protection of traffic between Remote UE or Relay and ProSe Key Management Function
p. 64
6.7.3.5
Protection of traffic between Remote UE and Relay
p. 65