Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+
Top   in Index   Prev   Next

TS 33.401 (SA3)
System Architecture Evolution (SAE) –
Security Architecture

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V16.0.0 (Wzip)2019/09  163 p.
V15.9.0 (PDF)2019/09  166 p.
V14.6.0  2018/09  155 p.
V13.5.0  2016/12  152 p.
V12.16.0  2015/12  134 p.
V11.9.0  2015/12  123 p.
V10.7.0  2015/12  118 p.
V9.9.0  2015/12  107 p.
V8.8.0  2011/06  101 p.

EPS key hierarchy

Rapporteur:  Dr. Prasad, Anand

This TS specifies the security architecture, i.e., the security features and the security mechanisms for the EPS and the EPC, and the security procedures performed within the EPS including the EPC and the E‑UTRAN.

short Table of Contents for  TS 33.401  Word version:   16.0.0

each title links to the equivalent title in the full ToC

 

Here   Top

 

1  ScopeWord-p. 11
2  ReferencesWord-p. 11
3  Definitions, symbols and abbreviationsWord-p. 13
4  Overview of Security ArchitectureWord-p. 17
5  Security FeaturesWord-p. 17
6  Security Procedures between UE and EPC Network ElementsWord-p. 22
7  Security procedures between UE and EPS access network elementsWord-p. 32
8  Security mechanisms for non-access stratum signalling and data via MMEWord-p. 53
9  Security interworking between E-UTRAN and UTRANWord-p. 55
10  Security interworking between E-UTRAN and GERANWord-p. 64
11  Network Domain Control Plane protectionWord-p. 66
12  Backhaul link user plane protectionWord-p. 66
13  Management plane protection over the S1 interfaceWord-p. 67
14  SRVCC between E-UTRAN and Circuit Switched UTRAN/GERANWord-p. 68
15  Security Aspects of IMS Emergency Session Handling [R9]Word-p. 72
16Void
A (Normative)  Key derivation functionsWord-p. 77
B (Normative)  Algorithms for ciphering and integrity protectionWord-p. 83
C  Algorithm test dataWord-p. 87
D (Normative)  Security for Relay Node Architectures [R10]Word-p. 121
E (Normative)  Dual connectivity [R13]Word-p. 130
F  Isolated E-UTRAN Operation for Public Safety [R13]Word-p. 142
G (Normative)  LTE - WLAN aggregation [R13]Word-p. 145
H (Normative)  LTE-WLAN RAN level integration using IPsec tunnelling [R13]Word-p. 152
I (Normative)  Hash functions [R14]Word-p. 157
J  Change historyWord-p. 158

Up   Top