Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.860  Word version:  13.1.0

Top   Top   Up   Prev   None
0…   4…

 

4  Cellular IoTp. 8

5  Key Issuesp. 9

6  Solutionsp. 14

6.1  Solution #1: Integrity protection of signalling and algorithm negotiationp. 14

6.2  Solution #2: Data efficient rekeyingp. 17

6.3  Solution #3: Algorithms for ciphering and integrity protectionp. 19

6.4  Solution #4: Protection for CIoT enhanced GPRS Layer 3 - GMM messagesp. 22

6.4.1  Generalp. 22

6.5  Solution #5: Activating integrity protection for user data in bearer layerp. 25

6.5.1  Generalp. 25

6.5.2  Solutionp. 25

6.6  Solution #6: Authenticated encryptionp. 25

6.7  Solution #7: GIA with INPUT-I and CONSTANT-Fp. 26

6.8  Solution #8: Implementation of integrity protection in LLC protocolp. 27

7  Evaluationp. 29

8  Conclusionsp. 30

A  Solution #A: Early solution for EASEp. 31

B  Analysis of data efficient rekeyingp. 34

C  Access security related functions for enhanced General Packet Radio Service (GPRS) in relation to Cellular Internet of Things (CIoT)p. 40

D  Comparison of authenticated encryption schemesp. 46

$  Change Historyp. 47


Up   Top