Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.855  Word version:  16.1.0

Top   Top   None   None   Next
1…   4…   6…

 

1  Scopep. 12

3GPP TS 23.501 defines 5G services with a new service based architecture (SBA) approach.
The present document reviews the interactions in this new architecture, determines key issues relating to the security of SBA elements and interfaces, details potential solutions and recommends normative work .

2  Referencesp. 12

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
TS 23.501: "System Architecture for the 5G System".
[3]
TS 23.502: "Procedures for the 5G System".
[4]
JSON Object Signing and Encryption (https://datatracker.ietf.org/wg/jose/charter).
[5]
RFC 7515:  "JSON Web Signature" (https://tools.ietf.org/html/rfc7515).
[6]
RFC 7516:  "JSON Web Encryption" (https://tools.ietf.org/html/rfc7516).
[7]
RFC 7518:  "JSON Web Algorithms" (https://tools.ietf.org/html/rfc7518).
[8]
V. Goyal, O. Pandey, Amit Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. CCS '06, New York, 2006, pp. 89-98.
[9]
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption" in Proc. SP '07, 2007, pp. 321-334.
[10]
C. Chen, J. Chen, H.-W. Lim, Z. Zhang, D. Feng, "Combined Public-Key Schemes: The Case of ABE and ABS" in Proc. Provable Security '12, Lecture Notes in Computer Science, vol. 7496, 2012, pp. 53-69.
[11]
TS 33.501: "Security architecture and procedures for 5G System".
[12]  Void
[13]  Void
[14]
GSMA: "IPX Network End-to End Security Guidelines", V1.0, Nov 2017.
[15]
RFC 8446:  "The Transport Layer Security (TLS) Protocol Version 1.3".
[16]
RFC 1123:  "Requirements for Internet Hosts -- Application and Support".
[17]
TR 23.742: "Study on Enhancements to the Service-Based Architecture".
[18]
TS 29.244: "Interface between the Control Plane and the User Plane nodes".
[19]
RFC 6749:  "The OAuth 2.0 Authorization Framework".
[20]
TS 33.210: "Network Domain Security (NDS); IP network layer security".
Up

3  Definitions of terms, symbols and abbreviationsp. 13

3.1  Termsp. 13

For the purposes of the present document, the terms given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.

3.2  Symbolsp. 13

Void.

3.3  Abbreviationsp. 13

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
SeCoP
Service Communication Proxy

Up   Top   ToC