tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top          in Index          Prev          Next

TR 33.969 (SA3)
Study on security aspects of Public Warning System (PWS)

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    xx p.
(P) V13.0.0    2016/01    118 p.
(P) V12.0.0    2014/09    xx p.


Rapporteur:  Mr. Mattsson, John
See also:  PWS-related TS/TR    


The present document studies security features and mechanisms for protection against false Base Stations broadcasting False Warning Notifications.

The default terminal behaviour is to accept all Warning Notifications even if their authenticity is unknown (i.e. no security protection). The default terminal behaviour is therefore open to the presentation of false Warning Notifications issued by false BSs even in countries without a Public Warning System (PWS) deployed.

Examples of false BS risks include, but are not limited to:
  • False Warning Notifications to induce panic;
  • Abuse of warning system broadcast channel to send advertising / spam.


 

Here          Top          None          None          Next
part:    1     2

 

 

1   Scope   PDF-p. 8
2   References   PDF-p. 9
3   Abbreviations   PDF-p. 10
4   Recommendations on security requirements of PWS   PDF-p. 12
5   System architecture of PWS   PDF-p. 13
6   Security features of PWS   PDF-p. 14
6.1   PWS threats and analysis
6.2   Proposed security features of PWS
6.2.1   General
6.2.2   Restrictions on the PWS message signature length   PDF-p. 18
6.2.3   Algorithm agility of PWS   PDF-p. 20
6.2.4   Security level and key length of signature algorithms proposed   PDF-p. 22
6.2.5   Verification of PWS Warning Notification message   PDF-p. 24
6.2.6   Primary and secondary notifications   PDF-p. 25
6.2.7   Network sharing impact to PWS Security   PDF-p. 26
6.2.8   Triggering condition for public key update   PDF-p. 28
6.2.9   Roaming impact to PWS Security   PDF-p. 29
6.2.10   Discussion on parameters to be sent when distributing public keys or broadcasting warning messages   PDF-p. 31
6.2.11   Considerations on networks in disaster areas   PDF-p. 34
7   Possible Security solutions of PWS

Up          Top          ToC