Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   Next

TS 33.259 (SA3)
Key establishment between a UICC hosting device and a remote device

ToC   3GPP‑Page   ETSI‑search   Help    
V14.0.0 (PDF)  2017/03  30 p.
V13.0.0  2016/01  30 p.
V12.0.0  2014/09  29 p.
V11.0.0  2012/09  30 p.
V10.0.0  2011/04  30 p.
V9.0.0  2009/12  29 p.
V8.2.0  2008/12  29 p.
V7.2.0  2007/12  30 p.


Rapporteur:  Mr. Lehtovirta, Vesa
See also:  –

The need to establish a secure channel between a UICC Hosting Device and a Remote Device connected via a local interface has been identified by the Personal Network Management work (see TS 22.259), in order to protect the communication between the UICC Hosting Device and the Remote Device.

This document describes the security features and mechanisms to provision a shared key between a UICC Hosting Device and a Remote Device connected via a local interface. The shared secret is then intended to be used to secure the interface between the Remote Device and the UICC hosting device. Candidate applications to use this key establishment mechanism include but are not restricted to Personal Network Management (see TS 22.259).

The scope of this specification includes an architecture overview and the detailed procedure how to establish the shared key between the UICC Hosting Device and the Remote Device. This is different from the Technical Specification TS 33.110 that describes an architecture overview and the detailed procedure how to establish the shared key between the UICC itself and the terminal hosting the UICC. The use cases utilizing the mechanisms described in this specification are seen to be different to the use cases where "Key establishment between a UICC and a terminal", PSK TLS as specified in TS 33.310, is utilized.

The solution described in this document is built on the existing infrastructure defined in "GBA", TS 33.220.


 

Here   Top

 

 

1  ScopePDF-p. 6
2  References
3  Definitions and abbreviationsPDF-p. 7
4  Key Establishment between a UICC Hosting Device and a Remote Device
A (Normative)  Key Derivation Function definitionPDF-p. 17
B (Normative)  HTTP based key request procedurePDF-p. 18
C  Signalling flows for key request procedurePDF-p. 20
D (Normative)  XML schema for Key Request and Key ResponsePDF-p. 23
E (Normative)  TLS profilesPDF-p. 25
F  Application specific key (Ks_local_device_appl)PDF-p. 26
G  Application specific key (Ks_local_device_appl): Key Derivation Function definitionPDF-p. 27
H  Change historyPDF-p. 28

Up   Top