Tech-invite  3GPPspecsRELsGlossariesSIP
21222324252627282931323334353637384‑5x

Top   in Index   Prev   Next

TS 33.401SA3
System Architecture Evolution (SAE) –
Security Architecture

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V16.1.0 (Wzip)2019/12  165 p.
V15.10.0 (PDF)2019/12  166 p.
V14.6.0  2018/09  155 p.
V13.5.0  2016/12  152 p.
V12.16.0  2015/12  134 p.
V11.9.0  2015/12  123 p.
V10.7.0  2015/12  118 p.
V9.9.0  2015/12  107 p.
V8.8.0  2011/06  101 p.

Rapporteur:  Dr. Prasad, AnandNEC Europe Ltd

This TS specifies the security architecture, i.e., the security features and the security mechanisms for the EPS and the EPC, and the security procedures performed within the EPS including the EPC and the E‑UTRAN.
EPS key hierarchy

short Table of Contents for  TS 33.401  Word version:   16.1.0

each title links to the equivalent title in the full ToC
Here   Top
1  ScopeWord-p. 11
2  ReferencesWord-p. 11
3  Definitions, symbols and abbreviationsWord-p. 13
4  Overview of Security ArchitectureWord-p. 17
5  Security FeaturesWord-p. 17
6  Security Procedures between UE and EPC Network ElementsWord-p. 22
7  Security procedures between UE and EPS access network elementsWord-p. 32
8  Security mechanisms for non-access stratum signalling and data via MMEWord-p. 53
9  Security interworking between E-UTRAN and UTRANWord-p. 55
10  Security interworking between E-UTRAN and GERANWord-p. 64
11  Network Domain Control Plane protectionWord-p. 66
12  Backhaul link user plane protectionWord-p. 66
13  Management plane protection over the S1 interfaceWord-p. 67
14  SRVCC between E-UTRAN and Circuit Switched UTRAN/GERANWord-p. 68
15  Security Aspects of IMS Emergency Session Handling [R9]Word-p. 72
16Void
A (Normative)  Key derivation functionsWord-p. 77
B (Normative)  Algorithms for ciphering and integrity protectionWord-p. 83
C  Algorithm test dataWord-p. 87
D (Normative)  Security for Relay Node Architectures [R10]Word-p. 121
E (Normative)  Dual connectivity [R13]Word-p. 130
F  Isolated E-UTRAN Operation for Public Safety [R13]Word-p. 142
G (Normative)  LTE - WLAN aggregation [R13]Word-p. 145
H (Normative)  LTE-WLAN RAN level integration using IPsec tunnelling [R13]Word-p. 152
I (Normative)  Hash functions [R14]Word-p. 157
J (Normative)  Restricted Local Operator Services (RLOS) [R16]Word-p. 158
K  Change historyWord-p. 160

Up   Top