Tech-invite   World Map
3GPPspecs     Glossaries     T+       IETF     RFCs     Groups     SIP     ABNFs
Top        in Index        Prev        Next

TR 33.816 (SA3)
Feasibility study on
LTE relay node security

ToC      3GPP‑Page      Help       
V10.0.0 (Wzip)    2011/03    94 p.

Rapporteur:  Dr. Escott, Adrian
See also:  –

ThiS TR provides an analysis of the security issues by including Relay Nodes (RN) into the LTE network. Furthermore it contains several solutions to provide security for the relay architecture chosen by the RAN groups. It also provides a comparison between those solution and the reasoning why a particular solution was chosen.


Here        Top        None        None        Next
1…      10…     



1   Scope   Word-p. 8
2   References
3   Definitions, symbols and abbreviations   Word-p. 9
4   Relay Architecture   Word-p. 10
5   Threats   Word-p. 12
6   Requirements   Word-p. 15      Up
7   Security Architecture
8   Security Procedures   Word-p. 19
8.1   Analysis of Un interface security
8.2   Security for the RN NAS traffic   Word-p. 23
8.3   Security for the RN RRC traffic
8.4   Mutual Authentication
8.5   Enrolment procedures for RNs
8.6   Location verification   Word-p. 24
8.7   Security handling in handover
8.8   Analysis of key interaction on Un interface   Word-p. 26
8.9   Differentiation the RN and UE by the DeNB
8.10   NAS signalling security   Word-p. 27
8.11   Algorithm negotiation for RBs on Un interface
9   Device Security   Word-p. 28      Up

Up        Top        ToC