Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.861  Word version:  16.1.0

Top   Top   Up   Prev   None
0…   5…

 

5  Key issuesp. 12

5.1  Key Issue #1: Efficient frequent small data transmissionsp. 12

5.2  Key Issue #2: Integrity protection of small datap. 12

5.3  Key Issue #3: Encryption of small datap. 13

5.4  Key Issue #4: Signalling overload due to Malicious Applications on the UEp. 14

5.5  Key Issue #5: gNB Protection from CIoT DoS attackp. 14

5.6  Key issue #6: Avoiding AS security for application security enabled UEs.p. 15

5.7  Key Issue #7: Key refreshing for protection of small datap. 16

5.8  Key Issue #8: Key and mac size for protection of small datap. 16

5.9  Key Issue #9: Protection of NIDD interfacesp. 17

5.10  Key issue #10: User Plane data transmission with Connectionless signalling.p. 17

5.11  Key Issue #11: Bidding down attack for NAS based redirection between core networksp. 18

5.12  Key Issue #12: Privacy protection of new parameters for CIoT included in NAS messagep. 19

5.13  Key Issue #13: Security Handling in RRC Connection Re-Establishment for the control plane for NB-IoT connected to 5GCp. 19

5.14  Key issue #14: Preventing User Plane Botnet Attacks from Improper CIOT Device Usagep. 20

5.15  Key Issue #15: Protection of UE capability transfer for UEs without AS securityp. 20

6  Solutionsp. 21

6.1  Solution #1: Security Solution for small data transmission via NAS signalingp. 21

6.2  Solution #2: Efficient integrity protection for frequent small data transmissionsp. 22

6.3  Solution #3: Security solution for MO SMS at AMF re-allocationp. 24

6.4  Solution #4: Security solution for UL small data transfer in RRC Suspend and Resume with early data transmission (EDT)p. 26

6.5  Solution #5: Security solution for small data included in initial NAS signalling at mobilityp. 28

6.6  Solution #6: Detecting and handling signalling overload due to Malicious Applications on the UEp. 31

6.7  Solution #7: Procedure for protecting gNB from RRC resume and RRC Re-establishment DoS attackp. 34

6.8  Solution #8: Security solution for protection of interface used by NIDD proceduresp. 37

6.9  Solution #9: Security protection of small data at idle mobilityp. 37

6.10  Solution #10: Security solution for small data at idle mobility using the Registration Complete messagep. 39

6.11  Solution #11: Security-Property-Group-based Mitigation for DDoS Attack Triggered by Malicious Applications on the UEp. 41

6.12  Solution #12: Security Solution on DDoS attack mitigationp. 43

6.13  Solution #13: Security solution for small data using key refreshingp. 45

6.14  Solution #14: Privacy protection of new parameters for CIoT included in NAS messagesp. 45

6.15  Solution #15: Efficient integrity protection for small data transmissions with immediate resultp. 46

6.16  Solution #16: Solution to Identify Misbehaving UEsp. 48

6.17  Solution #17: Solution to Mitigate DDoS Attack based on RAN caused by Massive Number of Misbehaving CIoT UEsp. 48

6.18  Solution #18: Security solution for UL small data transfer in RRC Suspend and Resume with early data transmission (EDT)p. 51

6.19  Solution #19: Solution to Mitigate DDoS Attack on AMF caused by Massive Number of Misbehaving CIoT UEsp. 52

6.20  Solution 20: RRC Connection Re-Establishment for the Control Plane for NB-IoT connected to 5GCp. 54

6.21  Solution 21: Protection of NAS Redirection Messagep. 56

6.22  Solution #22: Security solution for UP IP in PDCP to protect UL EDT data in Msg 3p. 60

6.23  Solution #23: Mitigate DDoS Attack on RAN based on RANs coordinationp. 62

6.24  Solution #24: Using NAS security for protection of NAS Redirection messagep. 62

6.25  Solution #25: Security solution for preventing Botnet Attacks from Improper CIOT Device Usep. 63

6.26  Solution #26: Hash based UE capability protection for CP optimization only CIoT UEp. 64

6.27  Solution #27: Network resilience for UEs without AS securityp. 66

6.28  Solution #28: Protection of UE capability transfer for UEs without AS securityp. 66

6.29  Solution #29: Security solution for UE Capability Transfer for UE with no AS security.p. 67

6.30  Solution #30: AMF verification of the UE radio capabilities for CP optimization only CIoT UEp. 69

7  Conclusionsp. 70

$  Change historyp. 72


Up   Top