Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.850
Word version: 17.0.0
0…
5…
5
Key issues
6
Proposed solutions
7
Conclusions
$
Change history
5
Key issues
p. 8
5.1
Key issue #1: Security of authentication and authorization for multicast communication services
p. 8
5.1.1
Key issue details
p. 8
5.1.2
Security threats
p. 9
5.1.3
Potential security requirements
p. 9
5.2
Key Issue #2: Security protection of MBS traffic
p. 9
5.2.1
Key issue details
p. 9
5.2.2
Security threats
p. 9
5.2.3
Potential security requirements
p. 10
5.3
Key Issue #3: Security protection of key distribution
p. 10
5.3.1
Key issue details
p. 10
5.3.2
Security threats
p. 10
5.3.3
Potential security requirements
p. 10
5.4
Key Issue # 4: Security protection between AF and 5GC
p. 10
5.4.1
Key issue details
p. 10
5.4.2
Security threats
p. 11
5.4.3
Potential security requirements
p. 11
6
Proposed solutions
p. 11
6.0
Mapping of solutions to key issues
p. 11
6.1
Solution #1: Protection of MBS traffic in transport layer
p. 11
6.1.1
Solution overview
p. 11
6.1.2
Solution details
p. 12
6.1.2.1
Security handling in handover
p. 13
6.1.3
Solution evaluation
p. 13
6.2
Solution #2: protect MBS traffic in service layer
p. 13
6.2.1
Solution overview
p. 13
6.2.2
Solution details
p. 14
6.2.2.1
MBS group key distribution and update
p. 15
6.2.3
Solution evaluation
p. 16
6.3
Solution #3: MBS Traffic Protection
p. 16
6.3.1
Solution overview
p. 16
6.3.2
Solution details
p. 17
6.3.3
Solution evaluation
p. 18
6.4
Solution #4: Authentication and authorization for multicast communication service
p. 18
6.4.1
Solution overview
p. 18
6.4.2
Solution details
p. 18
6.4.2.1
Authentication and authorization
p. 19
6.4.2.2
Authorization revocation
p. 20
6.4.3
Solution evaluation
p. 20
6.5
Solution #5: Authorization revocation
p. 20
6.5.1
Solution overview
p. 20
6.5.2
Solution details
p. 20
6.5.3
Solution evaluation
p. 21
6.6
Solution #6: Authentication and authorization for multicast communication service based on AKMA
p. 21
6.6.1
Solution overview
p. 21
6.6.2
Solution details
p. 22
6.6.3
Solution evaluation
p. 22
6.7
Solution # 7: security protection between AF and 5GC
p. 23
6.7.1
Solution overview
p. 23
6.7.2
Solution details
p. 23
6.7.3
Solution evaluation
p. 23
6.8
Solution #8: MBS Traffic Protection
p. 23
6.8.1
Solution overview
p. 23
6.8.2
Solution details
p. 23
6.8.3
Solution evaluation
p. 25
6.9
Solution #9: Key update solution
p. 25
6.9.1
Solution overview
p. 25
6.9.2
Solution Details
p. 25
6.9.2.1
Comparison between the default and optimized approaches
p. 28
6.9.2.2
Key update conditions
p. 32
6.9.2.3
Applicability to other solutions
p. 32
6.9.3
Evaluation
p. 33
6.10
Solution #10: Secure framework for Key distribution in MBS
p. 35
6.10.1
Solution overview
p. 35
6.10.2
Solution details
p. 35
6.10.2.1
MBS key generation
p. 35
6.10.2.2
MBS procedure for key generation and traffic protection
p. 36
6.10.2.3
MBS procedure for re-keying
p. 38
6.10.3
Solution Evaluation
p. 41
6.11
Solution #11: Update the keys used to protect the MBS traffic
p. 41
6.11.1
Introduction
p. 41
6.11.2
Solution details
p. 41
6.11.3
Evaluation
p. 42
6.12
Solution #12: Protection of MBS traffic at service layer based on GBA
p. 42
6.12.1
Solution overview
p. 42
6.12.2
Solution details
p. 42
6.12.3
Solution evaluation
p. 44
6.13
Solution #13: Key generation and distribution for MBS
p. 44
6.13.1
Solution overview
p. 44
6.13.2
Solution details
p. 45
6.13.2.1
Key generation and distribution
p. 45
6.13.2.2
Key hierarchy
p. 46
6.13.3
Solution evaluation
p. 47
6.14
Solution #14: Secure key delivery in service layer
p. 48
6.14.1
Solution overview
p. 48
6.14.2
Solution details
p. 48
6.14.3
Solution evaluation
p. 49
7
Conclusions
p. 49
7.1
Conclusions on Key Issue #1
p. 49
7.2
Conclusions on Key Issue #2
p. 49
7.3
Conclusions for Key Issue #3
p. 50
7.4
Conclusions on Key Issue #4
p. 50
$
Change history
p. 51