Tech-invite   World Map
3GPP     Specs     Glossaries     UICC       IETF     RFCs     Groups     SIP     ABNFs       T+       Search     Home
Top        in Index        Prev        Next

TS 33.180 (SA3)
Security of the mission critical service

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

V15.0.0 (Wzip)    2017/12    169 p.
V14.2.0 (PDF)    2017/12    135 p.

Rapporteur:  Mr. Haigh, Peter
See also:  MCX-related TS/TR    

The present document specifies the security architecture, procedures and information flows needed to protect the mission critical service (MCX). The architecture includes mechanisms to protect the Common Functional Architecture and security mechanisms for mission critical applications. This includes Push-To-Talk (MCPTT), Video (MCVideo) and Data (MCData). Additionally, security mechanisms relating to on-network use, off-network use, roaming, migration, interconnection, interworking and multiple security domains are described.

for V14, V15:    (F) Corrections to MCData security procedures   |   (F) Add transmission control for MCVideo   |   (F) MCPTT to MCX fixes   |   (F) SIP MESSAGE clarification for MCData   |   (F) A Clarification on SSRC use in group communications   |   (F) Fix inter-domain IdM token exchange procedure   |   (F) Fix reference to 33.179   |   (F) Fix media security for private call   |   (F) Fix client check during GMK provisioning   |   (F) Alignment with MuSiK Stage 3 in CT1 specs 24.379 and 24.481   |   (F) Key parameters payload correction
for V15:    (B) Adding KMS Redirect Responses   |   (B) KMS enhancement, including Migration KMS   |   (B) Addition of Clause on Logging, Audit and Discreet Monitoring   |   (B) Addition of Signalling Proxies   |   (B) Addition of Element for Authenticating Requests (EAR)   |   (B) Addition of KMS Requests to support KMS Discovery   |   (B) Addition of Security Gateway


Here        Top        None        None        Next
part:    1     2     3     4



1   Scope   PDF-p. 10
2   References
3   Definitions and abbreviations   PDF-p. 12
4   Overview of Mission Critical Security   PDF-p. 13
5   Common mission critical security framework   PDF-p. 20
5.1   User authentication and authorization
5.2   Key management common elements   PDF-p. 30
5.3   User key management (KMS)
5.4   Key management from MC client to MC server (CSK upload)   PDF-p. 43
5.5   Key management between MCX servers (SPK)
5.6   Key management for one-to-one (private) communications (PCK)
5.7   Key management for group communications (GMK)   PDF-p. 44
5.8   Key management from MC server to MC client (Key download)   PDF-p. 45
5.9   Key management during MBMS bearer announcement   PDF-p. 46

Up        Top        ToC