Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.863  Word version:  14.2.0

Top   Top   None   None   Next
1…   4…

 

1  Scopep. 8

The present document's objectives are to:
  1. Investigate whether battery efficient 'device to enterprise' mechanisms to provide sufficient security exist.
  2. Investigate potential enhancements to 3GPP's security architecture(s) that enable the Home Operator to be able to offer well guaranteed security to enterprises e.g. to provide security between the UE and a node in the home operator domain.
  3. Both S1 and Gb based architectures should be considered when undertaking b, above.
The impacts of relevant authentication and key agreement procedures are also presented.
The following should be taken into account for the study:
  • The potential solutions should aim at minimising the energy consumption of devices to help meet the objective of a ten year battery life in the extended coverage situation and take into consideration the very low data rate capability of the radio interface when using the Energy Consumption Evaluation Methodology described in TR 45.820.
Up

2  Referencesp. 8

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
TR 41.001: "GSM Release specifications".
→ to date, withdrawn by 3GPP
[3]  Void
[4]
IETF Transport Layer Security (tls) Working Group, Charter, http://datatracker.ietf.org/wg/tls/charter/
[5]
RFC 7252:  "The Constrained Application Protocol (CoAP)".
[6]
draft-ypoeluev-tls-m2mcertificate-00  "Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Authentication Using M2M Certificate".
[7]
draft-ietf-tls-cached-info-19  "Transport Layer Security (TLS) Cached Information Extension".
[8]
draft-ietf-tls-tls13-05  "The Transport Layer Security (TLS) Protocol Version 1.3".
[9]
RFC 5246:  "The Transport Layer Security (TLS) Protocol Version 1.2".
[10]
draft-ietf-dice-profile-13  "A TLS/DTLS Profile for the Internet of Things".
[11]
TS 23.060: "General Packet Radio Service (GPRS); Service description; Stage 2".
[12]
TS 24.008: "Mobile radio interface Layer 3 specification; Core network protocols; Stage 3".
[13]
TS 48.018: "General Packet Radio Service (GPRS); Base Station System (BSS) - Serving GPRS Support Node (SGSN); BSS GPRS protocol (BSSGP)".
[14]
TS 44.064: "Mobile Station - Serving GPRS Support Node (MS-SGSN); Logical Link Control (LLC) Layer Specification".
[15]
TS 44.065: "Mobile Station (MS) - Serving GPRS Support Node (SGSN); Subnetwork Dependent Convergence Protocol (SNDCP)".
[16]
TS 23.401: "General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access".
[17]  Void.
[18]
TS 36.413: "Evolved Universal Terrestrial Radio Access Network (E-UTRAN); S1 Application Protocol (S1AP)".
[19]
TS 33.187: "Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements".
[20]
TS 33.220: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)".
[21]
TS 33.223: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function".
[22]
TS 22.368: "Service requirements for Machine-Type Communications (MTC); Stage 1".
[23]
TS 36.323: "Evolved Universal Terrestrial Radio Access (E-UTRA); Packet Data Convergence Protocol (PDCP) specification".
[24]
TS 29.281: "General Packet Radio System (GPRS) Tunnelling Protocol User Plane (GTPv1-U)".
[25]
TR 45.820: "Cellular system support for ultra-low complexity and low throughput Internet of Things (CIoT)".
[26]
NIST SP 800-38D.
[27]
TS 33.102: "3G security; Security architecture".
[28]
TS 33.401: "3GPP System Architecture Evolution (SAE); Security architecture".
[29]
TS 29.060: "General Packet Radio Service (GPRS); GPRS Tunnelling Protocol (GTP) across the Gn and Gp interface".
[30]
TS 24.301: "Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3".
[31]
TS 23.002: "Network architecture".
[32]
RFC 6347.:  "Datagram Transport Layer Security" [33] IETF RFC 4492. "Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) ".
[34]
TS 24.109: "Bootstrapping interface (Ub) and network application function interface (Ua); Protocol details".
[35]
TS 33.222: "Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS)".
[36]
RFC 4303:  "IP Encapsulation Security Payload (ESP)".
[37]
TS 33.210: "Network Domain Security (NDS); IP network layer security".
[38]
TS 55.241: " Specification of the GIA4 integrity algorithm for GPRS; GIA4 specification".
[39]
TS 55.251: " Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS; GEA5 and GIA5 specification".
[40]
TS 35.205: "3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General".
[41]
TS 35.215: "Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications".
[42]  Void
[43]
TS 35.221: " Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications".
[44]
RFC 7296:  "Internet Key Exchange Protocol Version 2 (IKEv2)"
[45]
TS 33.310: "Network Domain Security (NDS); Authentication Framework (AF)"
[46]
TS 23.682: "Architecture enhancements to facilitate communications with packet data networks and applications"
[47]
TS 43.020: "Security related network functions"
Up

3  Definitions, symbols and abbreviationsp. 10

3.1  Definitionsp. 10

For the purposes of the present document, the terms and definitions given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.
E2m:
End to middle
Gb architecture:
a system architecture described in TS 23.060 that uses the protocols defined in e.g. 3GPP TSs 24.008 [12], 48.018 [13], 44.064 [14] and 44.065 [15].
S1 architecture:
a system architecture described in TS 23.401 that uses the protocols defined in e.g. 3GPP TSs 24.301 [30] and 36.413 [18].
Up

3.2  Symbolsp. 10

For the purposes of the present document, the following symbols apply:
||
Concatenation
Communication between

3.3  Abbreviationsp. 10

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply.
An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
AKA
Authentication and Key Agreement
AMF
Authentication Management Field
AuC
Authentication Centre
cIoT
Cellular Internet of Things
CK
Ciphering Key
CK'
replacement CK for ait interface security to withhold CK from the visited network
CoAP
Constrained Application Protocol
DH
Diffie-Hellman
DLTS
Datagram Transport Layer Security
E-UTRAN
Evolved Universal Terrestrial Radio Access Network
E2E
End to End
EESE
End to End Security Endpoint
EMKS
End to Middle Key Server
EMSE
E2M Security Endpoint
EPS
Evolved Packet System
GBA
Generic Bootstrapping Architecture
GERAN
GSM EDGE Radio Access Network
GGSN
Gateway GPRS Support Node
GTP
GPRS Tunnelling Protocol
HLR
Home Location Registry
HSS
Home Subscriber Server
IK
Integrity Key
IK'
replacement for IK for air interface security to withhold IK from the visited network
IoT
Internet of Things
KDF
Key Derivation Function
LLC
Logical Link Controller
MME
Mobility Management Entity
MTC
Machine Type Communications
P-GW
PDN Gateway
PDN
Packet Data Network
PLMN
Public Land Mobile Network
S-GW
Serving Gateway
SGSN
Serving GPRS Support Node
SQN
Sequence Number
TLS
Transport Layer Security
UE
User Equipment
UMTS
Universal Mobile Telecommunication System
UP
User Plane
USIM
Universal Subscriber Identity Module
Up

Up   Top   ToC