tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top          in Index          Prev          Next

TR 33.816 (SA3)
Feasibility study on
LTE relay node security

|   ToC   |   3GPP‑Page   |   Help   |

(W-zip) V10.0.0    2011/03    94 p.


Rapporteur:  Dr. Escott, Adrian
See also:  –


ThiS TR provides an analysis of the security issues by including Relay Nodes (RN) into the LTE network. Furthermore it contains several solutions to provide security for the relay architecture chosen by the RAN groups. It also provides a comparison between those solution and the reasoning why a particular solution was chosen.



 

Here          Top          None          None          Next
part:    1     2

 

 

1   Scope   Word-p. 8
2   References
3   Definitions, symbols and abbreviations   Word-p. 9
4   Relay Architecture   Word-p. 10
5   Threats   Word-p. 12
6   Requirements   Word-p. 15      Up
7   Security Architecture
8   Security Procedures   Word-p. 19
8.1   Analysis of Un interface security
8.2   Security for the RN NAS traffic   Word-p. 23
8.3   Security for the RN RRC traffic
8.4   Mutual Authentication
8.5   Enrolment procedures for RNs
8.6   Location verification   Word-p. 24
8.7   Security handling in handover
8.8   Analysis of key interaction on Un interface   Word-p. 26
8.9   Differentiation the RN and UE by the DeNB
8.10   NAS signalling security   Word-p. 27
8.11   Algorithm negotiation for RBs on Un interface
9   Device Security   Word-p. 28      Up

Up          Top          ToC