Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.880
Word version: 15.1.0
1…
4…
7…
8…
4
Overview of enhanced Mission Critical Services
5
Security analysis of Mission Critical services
6
List of potential security requirements
...
4
Overview of enhanced Mission Critical Services
p. 15
4.1
Introduction
p. 15
4.2
Architecture
p. 15
5
Security analysis of Mission Critical services
p. 17
5.1
General
p. 17
5.2
Cross-service key issues
p. 17
5.2.1
Key Issue #1.1: Denial of service
p. 17
5.2.1.1
Issue details
p. 17
5.2.1.2
Security threats
p. 17
5.2.1.3
Potential security requirements
p. 18
5.2.2
Key Issue #1.2: Data communication security between MCX network entities
p. 18
5.2.2.1
Issue details
p. 18
5.2.2.2
Security threats
p. 18
5.2.2.3
Potential security requirements
p. 18
5.2.3
Key Issue #1.3: User impersonation
p. 18
5.2.3.1
Issue details
p. 18
5.2.3.2
Security threats
p. 18
5.2.3.3
Potential security requirements
p. 18
5.2.4
Key Issue #1.4: Manipulation
p. 19
5.2.4.1
Issue details
p. 19
5.2.4.2
Security threats
p. 19
5.2.4.3
Potential security requirements
p. 19
5.2.5
Key Issue #1.5: Traffic analysis
p. 19
5.2.5.1
Issue details
p. 19
5.2.5.2
Security threats
p. 19
5.2.5.3
Potential security requirements
p. 20
5.2.6
Key Issue #1.6: Privacy of MCX Service identities
p. 20
5.2.6.1
Issue details
p. 20
5.2.6.2
Security threats
p. 20
5.2.6.3
Potential security requirements
p. 20
5.2.7
Key issue #1.7: Use of multiple security domains for media security
p. 21
5.2.7.1
Issue details
p. 21
5.2.7.2
Security threats
p. 21
5.2.7.3
Potential security requirements
p. 21
5.2.8
Key issue #1.8: Control of use of MBMS within the MC Domain
p. 21
5.2.8.1
Issue details
p. 21
5.2.8.2
Security threats
p. 21
5.2.8.3
Potential security requirements
p. 22
5.2.9
Key Issue #1.9: Edge protection of the MC Domain
p. 22
5.2.9.1
Issue details
p. 22
5.2.9.2
Security threats
p. 22
5.2.9.3
Potential security requirements
p. 22
5.3
Key issues on Common Functional Architecture (MC_ARCH)
p. 23
5.3.1
Key Issue #2.1: Configuration & service access
p. 23
5.3.1.1
Issue details
p. 23
5.3.1.2
Security threats
p. 23
5.3.1.3
Potential security requirements
p. 23
5.3.2
Key Issue #2.2: Group key management
p. 24
5.3.2.1
Issue details
p. 24
5.3.2.2
Security threats
p. 24
5.3.2.3
Potential security requirements
p. 24
5.4
Key issues on push-to-talk enhancements (eMCPTT)
p. 25
5.4.1
Key Issue #3.1: Interception of user traffic
p. 25
5.4.1.1
Issue details
p. 25
5.4.1.2
Security threats
p. 25
5.4.13
Potential security requirements
p. 25
5.4.2
Key Issue #3.2: Key stream re-use
p. 25
5.4.2.1
Key issue details
p. 25
5.4.2.2
Security threats
p. 26
5.4.2.3
Potential security requirements
p. 26
5.4.3
Key Issue #3.3: Late entry to group communication
p. 26
5.4.3.1
Issue details
p. 26
5.4.3.2
Security threats
p. 26
5.4.3.3
Potential security requirements
p. 26
5.4.4
Key Issue #3.4: Private call confidentiality
p. 26
5.4.4.1
Issue details
p. 26
5.4.4.2
Security threats
p. 26
5.4.4.3
Potential security requirements
p. 27
5.4.6
Key issue #3.6: Exposure of group identifiers
p. 28
5.4.6.1
Issue details
p. 28
5.4.6.2
Security threats
p. 28
5.4.6.3
Potential security requirements
p. 28
5.5
Key issues on data communications (MCData)
p. 28
5.5.1
Key issue #4.1: Protection of SDS
p. 28
5.5.1.1
Issue details
p. 28
5.5.1.2
Security threats
p. 29
5.5.1.3
Potential security requirements
p. 29
5.6
Key issues on video communications (MCVideo)
p. 29
5.6.1
Key Issue #5.1: Equivalence with MCPTT
p. 29
5.6.1.1
Issue details
p. 29
5.6.1.2
Security threats
p. 29
5.6.1.3
Potential security requirements
p. 29
5.6.1.3.1
General
p. 29
5.6.1.3.2
Group key management
p. 30
5.6.1.3.3
On-network operation
p. 30
5.6.1.3.4
Ambient listening
p. 30
5.6.1.3.5
Data communication between MCVideo network entities
p. 31
5.6.1.3.6
Off-network operation
p. 31
5.6.1.3.7
User authentication and authorisation
p. 31
5.7
Key issues on migration and interconnect (MCSMI)
p. 32
5.7.1
Key Issue #6.1: Maintaining security during migration and interconnection
p. 32
5.7.1.1
Issue details
p. 32
5.7.1.2
Security threats
p. 32
5.7.1.3
Potential security requirements
p. 32
5.7.2
Key issue #6.2: Inter-domain user authentication and authorisation
p. 33
5.7.2.1
Issue details
p. 33
5.7.2.2
Security threats
p. 33
5.7.2.3
Potential security requirements
p. 33
5.7.3
Key Issue #6.3: Protection against external systems
p. 34
5.7.3.1
Issue details
p. 34
5.7.3.2
Security threats
p. 34
5.7.3.3
Potential security requirements
p. 34
5.8
Key Issues on interworking with non-3GPP systems
p. 35
5.8.1
Key Issue #7.1: Terminating MC security mechanisms for non-3GPP systems
p. 35
5.8.1.1
Issue details
p. 35
5.8.1.2
Security threats
p. 35
5.8.1.3
Potential security requirements
p. 35
5.8.2
Key Issue #7.2: Interworking security data
p. 35
5.8.2.1
Issue details
p. 35
5.8.2.2
Security threats
p. 35
5.8.2.3
Potential security requirements
p. 36
6
List of potential security requirements
p. 36
6.1
Common services
p. 36
6.2
Common functional architecture
p. 37
6.3
MCPTT enhancements
p. 37
6.4
MCData
p. 38
6.5
MCVideo
p. 38
6.6
Migration and interconnect
p. 40