Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.836
Word version: 16.1.0
1…
5…
5
Key Issues
6
Solutions
7
Conclusions
$
Change History
5
Key Issues
p. 10
5.1
Key Issue #1: Privacy protection for unicast messages over PC5
p. 10
5.1.1
Key issue details
p. 10
5.1.2
Security threats
p. 10
5.1.3
Potential security requirements
p. 10
5.2
Key Issue #2: Security for eV2X unicast messages over PC5.
p. 10
5.2.1
Key issue details
p. 10
5.2.2
Security threats
p. 11
5.2.3
Potential security requirements
p. 11
5.3
Key Issue #3: Privacy protection for groupcast messages over PC5
p. 11
5.3.1
Key issue details
p. 11
5.3.2
Security threats
p. 11
5.3.3
Potential security requirements
p. 12
5.4
Key Issue #4: Security of identifier conversion in groupcast communication
p. 12
5.4.1
Key issue details
p. 12
5.4.2
Security threats
p. 12
5.4.3
Potential security requirements
p. 12
5.5
Key Issue #5: Security for setting up groupcast
p. 13
5.5.1
Key issue details
p. 13
5.5.2
Security threats
p. 13
5.5.3
Potential security requirements
p. 13
5.6
Key Issue #6: Security of the UE service authorization and revocation
p. 13
5.6.1
Key issue details
p. 13
5.6.2
Security threats
p. 13
5.6.3
Potential security requirements
p. 13
5.7
Key Issue #7: Cross-RAT PC5 control authorization indication
p. 13
5.7.1
Key issue details
p. 13
5.7.2
Security threats
p. 14
5.7.3
Potential security requirements
p. 14
5.8
Key Issue #8: Privacy protection for broadcast messages over PC5
p. 14
5.8.1
Key issue details
p. 14
5.8.2
Security threats
p. 14
5.8.3
Potential security requirements
p. 14
5.9
Key Issue #9: Minimizing the impact of privacy protection mechanism in the application layer communication
p. 15
5.9.1
Key issue details
p. 15
5.9.2
Security threats
p. 16
5.9.3
Potential security requirements
p. 16
5.10
Key Issue #10: UP security policy handling for PC5 and Uu interface
p. 16
5.10.1
Key issue details
p. 16
5.10.2
Security threats
p. 17
5.10.3
Potential security requirements
p. 17
5.11
Key Issue #11: Security for eV2X broadcast messages over PC5
p. 17
5.11.1
Key issue details
p. 17
5.11.2
Security threats
p. 17
5.11.3
Potential security requirements
p. 17
6
Solutions
p. 17
6.1
Solution #1: Privacy protection for unicast messages over PC5
p. 17
6.1.1
Introduction
p. 17
6.1.2
Solution details
p. 18
6.1.3
Evaluation
p. 20
6.2
Solution #2: Security for eV2X unicast messages over PC5
p. 20
6.2.1
Introduction
p. 20
6.2.2
Solution details
p. 21
6.2.3
Evaluation
p. 22
6.3
Solution #3: Security for eV2X unicast messages over PC5
p. 22
6.3.1
Introduction
p. 22
6.3.2
Solution details
p. 23
6.3.3
Evaluation
p. 25
6.4
Solution #4: Privacy protection for unicast messages over PC5
p. 25
6.4.1
Introduction
p. 25
6.4.2
Solution details
p. 26
6.4.3
Evaluation
p. 27
6.5
Solution #5: Security protection of service authorisation
p. 27
6.5.1
Introduction
p. 27
6.5.2
Solution details
p. 27
6.5.3
Evaluation
p. 28
6.6
Solution #6: V2X Group Key Provisioning
p. 28
6.6.1
Introduction
p. 28
6.6.2
Solution details
p. 28
6.6.3
Evaluation
p. 29
6.7
Solution #7: Cross-RAT PC5 control authorization indication
p. 29
6.7.1
Introduction
p. 29
6.7.2
Solution details
p. 29
6.7.3
Evaluation
p. 29
6.8
Solution #8: Deriving PC5 layer keys based on higher layer keys
p. 29
6.8.1
Introduction
p. 29
6.8.2
Solution details
p. 29
6.8.3
Evaluation
p. 31
6.9
Solution #9: Security for eV2X unicast messages over PC5 using ECCSI and SAKKE
p. 32
6.9.1
Introduction
p. 32
6.9.2
Solution details
p. 32
6.9.2.1
Initial Security Link Establishment
p. 32
6.9.2.2
Procedure for privacy protection of unicast communication
p. 34
6.9.3
Evaluation
p. 35
6.10
Solution #10: Privacy protection for unicast message over PC5
p. 35
6.10.1
Introduction
p. 35
6.10.2
Solution details
p. 35
6.10.3
Evaluation
p. 36
6.11
Solution #11: Solution on minimizing the impact of privacy protection mechanism in the application layer communication
p. 37
6.11.1
Introduction
p. 37
6.11.2
Solution details
p. 37
6.11.3
Evaluation
p. 38
6.12
Solution #12: Protecting the traffic at the PDCP layer
p. 39
6.12.1
Introduction
p. 39
6.12.2
Solution details
p. 39
6.12.2.1
General
p. 39
6.12.2.2
Integrity protection
p. 39
6.12.2.3
Confidentiality protection
p. 39
6.12.2.4
Security contents in the PCDP header
p. 39
6.12.3
Evaluation
p. 40
6.13
Solution #13: Solution against V2X UE tracking based on PC5 identifiers
p. 40
6.13.1
Introduction
p. 40
6.13.2
Solution details
p. 40
6.13.3
Evaluation
p. 40
6.14
Solution #14: Identifier conversion in groupcast communication
p. 41
6.14.1
Introduction
p. 41
6.14.2
Solution details
p. 41
6.14.3
Evaluation
p. 41
6.15
Solution #15: Solution on minimizing the impact of privacy protection mechanism in the application layer communication
p. 42
6.15.1
Introduction
p. 42
6.15.2
Solution details
p. 42
6.15.3
Solution Evaluation
p. 43
6.16
Solution #16: Solution for the activation of user plane security in NR PC5 unicast
p. 43
6.16.1
Introduction
p. 43
6.16.2
Solution details
p. 43
6.16.3
Evaluation
p. 44
6.17
Solution #17: PC5 layer key derivation using the 5G network keys
p. 44
6.17.1
Introduction
p. 44
6.17.2
Solution details
p. 44
6.17.3
Evaluation
p. 46
6.18
Solution #18: Solution for the UP security activation policy handling in NR PC5 unicast
p. 46
6.18.1
Introduction
p. 46
6.18.2
Solution details
p. 46
6.18.3
Evaluation
p. 47
6.19
Solution #19: Protection of IEs in Direct Communication Request message
p. 47
6.19.1
Introduction
p. 47
6.19.2
Solution details
p. 47
6.19.3
Evaluation
p. 47
6.20
Solution #20: Solution on securely creating destination Layer-2 ID in groupcast communication
p. 48
6.20.1
Introduction
p. 48
6.20.2
Solution details
p. 48
6.20.3
Evaluation
p. 48
7
Conclusions
p. 49
7.1
Conclusion on KI #7
p. 49
7.2
Conclusion on KI #5
p. 49
7.3
Conclusion on KI #11
p. 49
7.4
Conclusion on KI #3 and #8
p. 49
7.5
Conclusion on KI #6
p. 49
7.6
Conclusion on KI #1
p. 49
7.7
Conclusion on KI #2
p. 49
7.8
Conclusion on KI #10
p. 49
7.9
Conclusion on KI#4
p. 49
7.10
Conclusion on KI#9
p. 50
$
Change History
p. 51