Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.821
Word version: 9.0.0
0…
4…
6…
8…
8
Network Domain Security
9
Security Requirements for LTE eNBs
A
Decision made in RAN2/3-SA3 joint meeting in Jan 2006
B
Issues and Threats of emergency calls
$
Change history
8
Network Domain Security
p. 118
8.1
Introduction
p. 118
8.1.1
NDS/IP architecture applied to LTE
p. 118
8.1.2
Key Management solutions for NDS/IP
p. 119
8.1.3
Alternatives
p. 119
8.2
How particular threats can be counteracted.
p. 120
8.2.1
Threats to User Data
p. 120
8.2.2
Threats to Signalling Data
p. 121
8.3
Summary
p. 122
8.4
Network Domain Security Evolution
p. 122
8.5
IKE version in NDS/IP for EPS
p. 123
8.6
S1/X2 reference point security
p. 124
8.7
S6a Reference Point Security
p. 125
8.8
Authentication Failure Reporting (AFR) functionality for EPS
p. 125
8.9
EPS interworking with a pre-Rel-8 HSS/HLR
p. 126
8.9.1
Current approach to binding authentication vectors to E-UTRAN serving network identity
p. 126
8.9.2
Solutions for interworking with a pre-Rel-8 HSS/HLR
p. 127
8.9.2.1
Solution 1: K_ASME derivation and protocol conversion in HPLMN
p. 127
8.9.2.2
Solution 2: K_ASME derivation in HPLMN, protocol conversion in VPLMN
p. 128
8.9.2.3
Solution 3: K_ASME derivation and protocol conversion in VPLMN (with dynamic setting of separation bit in HLR)
p. 129
8.9.2.4
Solution 4: K_ASME derivation and protocol conversion in VPLMN (with static setting of separation bit in HLR)
p. 129
8.9.2.5
Solution 5: IWF in VPLMN with UMTS level security in EPS
p. 130
8.9.2.6
Solution 6: Gradual upgrade of HLR using indicator on Rel-8 USIM
p. 130
8.9.3
Distinguishing E-UTRAN authentication vector requests from other types
p. 131
8.9.4
Considerations on migration towards full security solution
p. 132
8.9.5
Evaluation of proposed solutions
p. 133
8.9.6
Conclusion
p. 134
9
Security Requirements for LTE eNBs
p. 134
9.1
Terminology
p. 134
9.2
eNB security requirements
p. 135
A
Decision made in RAN2/3-SA3 joint meeting in Jan 2006
p. 136
A.1
RRC
p. 136
A.2
MAC
p. 136
B
Issues and Threats of emergency calls
p. 137
B.1
General
p. 137
B.2
DoS threats against EC function
p. 137
B.2.1
Threats against IMS nodes
p. 137
B.2.2
Threats against EPS nodes
p. 138
B.3
Protection via network configuration
p. 139
B.4
UE implementation considerations
p. 139
$
Change history
p. 141