Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.860  Word version:  13.1.0

Top   Top   None   None   Next
0…   4…

 

0  Introductionp. 6

Machine to Machine (M2M) communication represents a significant growth opportunity for the 3GPP ecosystem. To support the so called 'Internet of Things' (IoT), 3GPP operators have to address usage scenarios with devices that are power efficient (with battery life of several years), can be reached in challenging coverage conditions e.g. indoor and basements and, more importantly, are cheap enough so that they can be deployed on a mass scale and even be disposable.
TR 45.820 studies the need to adapt the security frame work of the proposed candidate techniques to suit the need of the emerging Internet of Things market. Any of the alternative solutions studied within the scope of FS_IoT_LC, for example the so-called "clean slate solution", could potentially select to operate with an architecture using the Gb interface. All these solutions use the Gb interface.
Up

1  Scopep. 7

The present document contains a study of the EGPRS access security in relation to cellular IoT, and an evaluation of possible technical security enhancements needed to support such services. Different possible deployment scenarios for Cellular IoT, and related stage 2 solutions are being studied in TR 45.820.
The scope of this study is limited to investigate the feasibility of improving the access security aspects of Gb mode. In more detail, the scope includes:
  1. Investigate potential security threats, such as man in the middle attacks.
  2. Investigate potential security enhancements between the UE and SGSN to mitigate said threats.
  3. Define what security procedures and security algorithms that are recommended to be used by for Cellular IoT devices in Gb mode. This may be procedures and algorithms already specified in earlier 3GPP releases or it could be new procedures and algorithms being introduced as part of this feasibility study.
  4. The potential security enhancements as part of this study item should aim at minimising the impacts to the GPRS core network.
Up

2  Referencesp. 7

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
TR 45.820: "Cellular System Support for Ultra Low Complexity and Low Throughput Internet of Things".
[3]
TR 23.060: "General Packet Radio Service (GPRS)".
[4]
TS 43.020: "Security related network functions".
[5]
TS 35.215: "Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications".
[6]
TS 35.201: "Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specification".
[7]
TS 44.064: "Logical Link Control (LLC) layer specification".
[8]
TS 24.301: "Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS)".
[9]
J. Passki and T. Ritter: "An Adaptive Ciphertext Attack Against "I⊕C" Block Cipher Moders with an Oracle. "May. 2012. https://eprint.iacr.org/2012/292.pdf
[10]
TS 33.401: "3GPP System Architecture Evolution (SAE): Security architecture".
[11]
Z. Shelby, K. Hartke, and C. Bormann: "The Constrained Application Protocol (CoAP)". RFC 7252, June 2014.
[12]
GP-140681: "Traffic model for Cellular IoT (update of GP-140560)".
[13]
TR 33.821: "Rationale and track of security decisions in Long Term Evolved (LTE) RAN / 3GPP System Architecture Evolution (SAE)".
[14]
D. A. McGrew and John Viega: "The Security and Performance of the Galois/Counter Mode (GCM) of Operation" (Full Version). http://eprint.iacr.org/2004/193.pdf.
[15]
T. Kohno, J. Viega, and D. "Whiting: The CWC Authenticated Encryption (Associated Data) Mode". http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/cwc/cwc-spec.pdf
[16]
P. Rogaway, M. Bellare, J. Black and T. Krovetz: OCB:"A Block-Cipher Mode of Operation for Efficient Authenticated Encryption". http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ocb/ocb-spec.pdf.
[17]
TS 24.008: "Mobile radio interface Layer 3 specification; Core network protocols; Stage 3".
[18]
TR 43.064: "General Packet Radio Service (GPRS); Overall description of the GPRS radio interface; Stage 2".
Up

3  Definitions and abbreviationsp. 8

3.1  Definitionsp. 8

For the purposes of the present document, the terms and definitions given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.

3.2  Abbreviationsp. 8

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply.
An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
CIoT
Cellular System Support for Ultra Low Complexity and Low Throughput Internet of Things
KDctr
Key Derivation Counter
Kmed
Medium term key, derived from K, and used in the derivation of Ktc and Kti
Ktc
Session key of Gb based cellular IoT for confidentiality protection
Kti
Session key of Gb based cellular IoT for integrity protection
Up

Up   Top   ToC