Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Top   in Index   Prev   Next

TS 33.179 (SA3)
Security of Mission Critical Push To Talk (MCPTT) over LTE

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V13.9.0 (PDF)  2019/06  94 p.

Rapporteur:  Mr. Haigh, Peter

The present document specifies the security architecture, procedures and information flows needed to protect the mission critical push to talk (MCPTT) service. The architecture includes mechanisms for authentication, protection of MCPTT signalling and protection of MCPTT media. Security for both MCPTT group calls and MCPTT private calls operating in on-network and off-network modes of operation is specified.
The functional architecture for MCPTT is defined in TS 23.179, the corresponding service requirements are defined in TS 22.179.
The MCPTT service can be used for public safety applications and also for general commercial applications e.g. utility companies and railways. As the security model is based on the public safety environment, some security features may not be applicable to MCPTT for commercial purposes.

full Table of Contents for  TS 33.179  Word version:   13.9.0


Here   Top


1  ScopeWord-p. 8
2  References
3  Definitions and abbreviationsWord-p. 10
4  Overview of MCPTT security
5  Authentication and authorizationWord-p. 16
6  Signalling plane protectionWord-p. 25
7  End-to-end communication security
7.1  Overview
7.2  Key provisioning and managementWord-p. 26
7.3  Group call key distribution
7.4  Private call key distribution
7.5  Protection of media stream (SRTP)Word-p. 40
7.6  Protection of offline floor and media control signalling (SRTCP)Word-p. 42
7.7  Protection of MBMS subchannel control messages (SRTCP)Word-p. 44
8  Inter/Intra domain interface securityWord-p. 46
9  Protection of floor control and sensitive application signalling
A (Normative)  Security requirementsWord-p. 56
B (Normative)  OpenID connect profile for MCPTTWord-p. 60
C  OpenID connect detailed flowWord-p. 68
D (Normative)  KMS provisioning messages to support MCPTTWord-p. 70
E (Normative)  MIKEY message formats for media securityWord-p. 82
F (Normative)  Key derivation and hash functionsWord-p. 89
G  Change historyWord-p. 91

Up   Top