Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TS 33.200
3G Security –
Network Domain Security (NDS) –
Mobile Application Part (MAP) Application Layer Security
3GPP‑Page
ETSI‑search
ToC
↓
V6.1.0 (PDF)
2005/04 24 p.
V5.1.0
2002/12 21 p.
V4.3.0
2002/03 21 p.
Rapporteur:
Dr. Escott, Adrian
full Table of Contents for
TS 33.200
Word version: 6.1.0
0
Introduction
Word‑p. 4
1
Scope
Word‑p. 5
2
References
Word‑p. 5
3
Definitions, symbols and abbreviations
Word‑p. 5
3.1
Definitions
Word‑p. 5
3.2
Symbols
Word‑p. 6
3.3
Abbreviations
Word‑p. 6
3.4
Conventions
Word‑p. 6
4
Principles of MAP application layer security
Word‑p. 7
5
MAP security (MAPsec)
Word‑p. 7
5.1
Security services provided by MAPsec
Word‑p. 7
5.2
Properties and tasks of MAPsec enabled network elements
Word‑p. 7
5.3
Policy requirements for the MAPsec Security Policy Database (SPD)
Word‑p. 8
5.4
MAPsec security association attribute definition
Word‑p. 8
5.5
MAPsec structure of protected messages
Word‑p. 9
5.5.1
MAPsec security header
Word‑p. 10
5.5.2
Protected payload
Word‑p. 10
5.5.2.1
Protection Mode 0
Word‑p. 10
5.5.2.2
Protection Mode 1
Word‑p. 10
5.5.2.3
Protection Mode 2
Word‑p. 11
5.6
MAPsec algorithms
Word‑p. 11
5.6.1
Mapping of MAPsec-SA encryption algorithm identifiers
Word‑p. 11
5.6.1.1
Description of MEA-1
Word‑p. 11
5.6.2
Mapping of MAPsec-SA integrity algorithm identifiers
Word‑p. 11
5.6.2.1
Description of MIA-1
Word‑p. 11
5.6.3
Construction of IV
Word‑p. 12
6
MAPsec protection profiles
Word‑p. 12
6.1
Granularity of protection
Word‑p. 12
6.2
MAPsec protection groups
Word‑p. 12
6.2.1
MAPsec protection groups
Word‑p. 12
6.2.1.1
MAP-PG(0) - No Protection
Word‑p. 12
6.2.1.2
MAP-PG(1) - Protection for Reset
Word‑p. 13
6.2.1.3
MAP-PG(2) - Protection for Authentication Information except Handover Situations
Word‑p. 13
6.2.1.4
MAP-PG(3) - Protection for Authentication Information in Handover Situations
Word‑p. 13
6.2.1.5
MAP-PG(4) - Protection of non location dependant HLR data
Word‑p. 14
6.3
MAPsec protection profiles
Word‑p. 14
A
Guidelines for manual key management
Word‑p. 15
A.1
Inter-domain Security Association and Key Management Procedures
Word‑p. 15
A.2
Local Security Association Distribution
Word‑p. 15
B
(Normative) MAPsec message flows
Word‑p. 16
C
(Normative) Using TCAP handshake for SMS transfer
Word‑p. 19
C.1
Mobile Terminated SMS
Word‑p. 19
C.2
Mobile Originated SMS
Word‑p. 20
$
Change History
Word‑p. 22