Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.163
BEST — Battery Efficient Security
for Very Low Throughput
Machine Type Communication (MTC) Devices

V18.0.0 (PDF)  2024/03  56 p.
V17.0.0  2021/12  56 p.
V16.2.0  2019/09  45 p.
V15.6.0  2019/09  44 p.
Rapporteur:
Mr. Evans, Tim P.
VODAFONE Group Plc

essential Table of Contents for  TS 33.163  Word version:  18.0.0

each title, in the "available" or "not available yet" area, links to the equivalent title in the CONTENT
Here   Top

List of Figures and Tables

Figure 4.2.1-1The architecture of the extended user plane protection service (P-GW Terminated PDN Connection Option)
Figure 4.2.1-2The architecture of the extended user plane protection service (SCEF Terminated PDN Connection Option)
Figure 4.2.2-1The architecture of the extended user plane protection service
Figure 4.3.1-1Generalised BEST service flow
Figure 4.4.1-1Generalised BEST EAS service flow
Figure 4.6.1.1-1Generic BEST key agreement process for EPS networks
Figure 4.6.1.1-2Generic BEST key agreement process for 5GS networks
Figure 4.6.2.2-1Key Hierarchy
Figure 4.6.2.2-2BEST Key Hierarchy for EPS networks and BEST UEs
Figure 4.6.2.2-3BEST Key Hierarchy for 5GS networks
Figure 4.6.2.2-4BEST Key Hierarchy for GBA and 5G GBA based key agreement
Figure 4.6.2.2-5BEST Key Hierarchy for AKMA based key agreement
Figure 4.6.2.2-6BEST Key Hierarchy for proprietary key agreement
Table 5.1.1-1Algorithm type distinguishers
Table 5.1.3-1Algorithm type distinguishers
Figure 6.2.1-1Non-IP PDU Type data stack for the EMSDP transfers over UP
Figure 6.2.1-2Non-IP PDU Type data stack for the EMSDP transfers over NAS via the PDN GW
Figure 6.2.1-3Non-IP PDU Type data stack for the EMSDP transfers over NAS via the SCEF
Figure 6.2.1-4IP PDU Type data stack for the EMSDP transfers
Figure 6.2.2-1data stack for the EMSDP transfers
Table 6.2.6.1-1EMSDP commands
Table 6.2.6.1.1-1EMSDP session request command options
Table 6.2.6.1.1-2IMSI TLV
Table 6.2.6.1.1-3SUCI TLV
Table 6.2.6.1.1-3aBEST UE configuration TLV
Table 6.2.6.1.1-4Enterprise Setup Information Element TLV
Table 6.2.6.1.1-5Serving Network TLV
Table 6.2.6.1.2-1EMSDP Session Start command options
Table 6.2.6.1.2-2BEST Service configuration TLV
Table 6.2.6.1.2-3Key Agreement TLV
Table 6.2.6.1.2-4Additional information
Table 6.2.6.1.2-5EMSDP session request MAC TLV
Table 6.2.6.1.2-6HSE Identity TLV
Table 6.2.6.1.2-7EAS Container TLV
Table 6.2.6.1.3-1EMSDP start session confirmation command options
Table 6.2.6.1.3-2AUTHENTICATION RESPONSE TLV
Table 6.2.6.1.3-3Key Information
Table 6.2.6.1.6-1EMSDP Manage Keys command options
Table 6.2.6.1.6-2Key Management TLV
Table 6.2.6.1.6-3Key Information
Table 6.2.6.1.7-1Request Rejected command options
Table 6.2.6.1.7-2Rejection details TLV
Table 6.2.6.1.7-3AUTS TLV
Figure 6.2.7.2-1BEST Session Setup Procedure for BEST Key Agreement Only Service using EMSDP
Figure 6.2.7.2-2BEST Procedure for Key Refresh using EMSDP
Figure 6.2.7.3-1BEST Session Setup Procedure for BEST User Plane Integrity Only Service using EMSDP
Figure 6.2.7.3-2Best Session for Key Refresh Procedure for BEST User Plane Integrity Only Service using EMSDP
Figure B.2.1-1RESTful HTTPS between EMKS(HSE) and EMSE(EAS)

Top