Tech-invite   World Map
3GPPspecs     Glossaries     T+       IETF     RFCs     Groups     SIP     ABNFs
Top        in Index        Prev        Next

TS 33.401 (SA3)
System Architecture Evolution (SAE) – Security architecture

ToC      3GPP‑Page      ETSI‑search      Help
V15.2.0 (Wzip)    2017/12    163 p.
V14.5.0 (PDF)    2017/12    157 p.
V13.5.0    2016/12    152 p.
V12.16.0    2015/12    134 p.
V11.9.0    2015/12    123 p.
V10.7.0    2015/12    118 p.
V9.9.0    2015/12    107 p.
V8.8.0    2011/06    101 p.


Rapporteur:  Dr. Prasad, Anand
See also:  EPC-related TS/TR    

This TS specifies the security architecture, i.e., the security features and the security mechanisms for the Evolved Packet System and the Evolved Packet Core, and the security procedures performed within the evolved Packet System (EPS) including the Evolved Packet Core (EPC) and the Evolved UTRAN (E-UTRAN).


2017-12-changes
for V14, V15:    (F) Clause 7.2.4.4 (Rectifying use of HASH_MME at NAS_SMC in Rel-14)   |   (F) Address EN for the RLFs for UEs doing user plane over control plane using NAS level security   |   (F) Improve and clarify texts under NOTE
for V15:    (F) Corrections to SgNB security procedures   |   (D) Editorial corrections for Annex E   |   (F) Aligning the specification of the key derivation function for key to use in security algorithms between UE and SgNB in EDCE5 with the 5G specification   |   (F) Clarifying the security algorithms that are used between the UE and MeNB and the UE and SgNB   |   (F) Adding a reference to RAN procedures on EDCE5   |   (F) Clarifying the behaviour of UE to SgNB connection at a MeNB handover   |   (D) Clause E Dual Connectivity ENs   |   (F) Aligning the algorithm names between EDCE5 and 5G   |   (F) Corrections to deletion of SCG Keys   |   (F) Handling the algorithms for use between a UE and SgNB for EN-DC


click  here  to see the ToC for advanced Rel-15 Word version

 

Here        Top        None        None        Next
part:    1     2     3     4     5

 

 

1   Scope [R8]   PDF-p. 10
2   References [R8]
3   Definitions, symbols and abbreviations [R8]   PDF-p. 12
4   Overview of Security Architecture [R8]   PDF-p. 16
5   Security Features [R8]
6   Security Procedures between UE and EPC Network Elements [R8]   PDF-p. 21

Up        Top        ToC