Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 33.533  Word version:  18.3.0

Top   Top   Up   Prev   Next
1…   4…   5…   6…   6.4…   7…   A…   B…

 

5  Common securityp. 10

5.1  Generalp. 10

This clause describes the security requirements and procedures commonly applied to different features of Ranging/SL positioning services, including Ranging/SL positioning discovery, Ranging/SL positioning communication with unicast mode, broadcast/groupcast mode, etc.

5.2  Security for PC8* interfacep. 10

5.2.1  Generalp. 10

The security requirements on PC8* interface between ProSe capable UE and SLPKMF are derived based on the definition of the SLPKMF described in clause 4.2.1.1 and the definition of PC8* interface described in clause 4.2.2.

5.2.2  Security requirementsp. 10

The 5G System shall support mutual authentication between the ProSe capable UE and the SLPKMF.
The 5G System shall support integrity protection for the transmission between the ProSe capable UE and the SLPKMF.
The 5G System shall support confidentiality protection for the transmission between the ProSe capable UE and the SLPKMF.
The 5G System shall support anti-replay protection for the transmission between the ProSe capable UE and the SLPKMF.

5.2.3  Security procedures for PC8* using GBAp. 10

When using GBA for the security procedures on PC8* interface, the use of either TLS v1.2 or TLS v. 1.3 as described in clause 5.3.3.2 of TS 33.303 applies with the following changes:
  • The SLPKMF takes the role of ProSe function.
  • Confidentiality protection shall be enabled.

5.2.4  Security procedures for PC8* using AKMAp. 10

When using AKMA for the security procedures on PC8* interface, the specification in clause B.1.3.2 of TS 33.535 applies with the following changes:
  • The SLPKMF takes the role of AF.
  • Confidentiality protection shall be enabled.

5.3  Security of service-based interfaces used in Ranging/SL Positioningp. 10

Npc9* and Npc10* defined in clause 4.2.2 are realized by corresponding NF service-based interfaces. Security procedures specified in clause 13 of TS 33.501 apply to these interfaces.

Up   Top   ToC