Tech-invite   World Map
3GPPspecs     Glossaries     T+       IETF     RFCs     Groups     SIP     ABNFs
Top        in Index        Prev        Next

TR 33.817 (SA3)
Feasibility study on
(U)SIM Security reuse
by peripheral devices on local interfaces

ToC      3GPP‑Page      Help       
V6.1.0 (Wzip)    2004/12    39 p.

Rapporteur:  Dr. Yaqub, Raziq
See also:  –

This Feasibility Study report conducts a threat analysis and determines the feasibility of Reuse of a Single SIM, USIM, or ISIM by peripheral devices on local interfaces to access multiple networks. Most important for this Reuse is the authentication and key agreement (AKA) function provided by these applications. The peripheral devices include 3GPP and WLAN devices that function as integrated or attachable peripherals on Laptops or PDAs or other mobile data devices. The multiple access networks of interest correspondingly include 3GPP and WLAN type networks.

The objective of this study is to realize the diverse usage models with multiple external (wired or wireless) interfaces from a security point of view, without incorporating significant changes to the 3GPP and WLAN infrastructure. It also studies the impact on current security specifications for 3GPP, especially given that some issues have already been identified surrounding key setting procedures, USIM sequence number synchronization, UICC presence detection/UICC application presence detection and termination of the UICC usage etc. It also studies additional user authentication requirements (e.g. PINs) when used over local interfaces like Bluetooth, IR or USB.

Furthermore it studies the impact on having many entities using the same security mechanism and any 3GPP core network elements. Reuse of security functions provided by applications on the UICC does not have an impact on ownership and control of the UICC, which remains with the issuer of the UICC. This Feasibility Study may be used as a basis for future CRs to TS 33.234 as and when any of the proposals are developed by SA WG3.


Here        Top



1   Scope   Word-p. 6
2   References
3   Definitions and abbreviations   Word-p. 7
4   General Aspects   Word-p. 8
5   Threat Analysis   Word-p. 19      Up
6   Potential Requirements
7   Feasibility of diverse usage models   Word-p. 24
8   Conclusion
A   Additional Information on Issue No. 2   Word-p. 27
B   Additional Information on Bluetooth   Word-p. 29
C   Bibliography   Word-p. 38
D   Change history   Word-p. 39      Up

Up        Top