Tech-invite  3GPPspecsRELsGlossariesSIP

Top   in Index   Prev   Next

TS 33.501SA3
Security Architecture and Procedures for 5G System

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V16.2.0 (Wzip)2020/03  227 p.
V15.8.0 (PDF)2020/03  195 p.

WI Acronym:  5GS_Ph1-SEC
Rapporteur:  Dr. Zugenmaier, Alf

The present document specifies the security architecture, i.e., the security features and the security mechanisms for the 5G System and the 5G Core, and the security procedures performed within the 5G System including the 5G Core and the 5G New Radio.

short Table of Contents for  TS 33.501  Word version:   16.1.0

each title links to the equivalent title in the full ToC
Here   Top
1  ScopeWord-p. 13
2  ReferencesWord-p. 13
3  Definitions and abbreviationsWord-p. 16
4  Overview of security architectureWord-p. 20
5  Security requirements and featuresWord-p. 22
6  Security procedures between UE and 5G network functionsWord-p. 34
6.0  GeneralWord-p. 34
6.1  Primary authentication and key agreementWord-p. 34
6.2  Key hierarchy, key derivation, and distribution schemeWord-p. 46
6.3  Security contextsWord-p. 53
6.4  NAS security mechanismsWord-p. 54
6.5  RRC security mechanismsWord-p. 59
6.6  UP security mechanismsWord-p. 60
6.7  Security algorithm selection, key establishment and security mode command procedureWord-p. 62
6.8  Security handling in state transitionsWord-p. 68
6.9  Security handling in mobilityWord-p. 76
6.10  Dual connectivityWord-p. 86
6.11  Security handling for RRC connection re-establishment procedureWord-p. 92
6.12  Subscription identifier privacyWord-p. 93
6.13  Signalling procedure for PDCP COUNT checkWord-p. 96
6.14  Steering of roaming security mechanismWord-p. 97
6.15  UE parameters update via UDM control plane procedure security mechanismWord-p. 101
7  Security for non-3GPP access to the 5G core networkWord-p. 103
8  Security of interworkingWord-p. 106
9  Security procedures for non-service based interfacesWord-p. 116
10  Security aspects of IMS emergency session handlingWord-p. 119
11  Security procedures between UE and external data networks via the 5G NetworkWord-p. 123
12  Security aspects of Network Exposure Function (NEF)Word-p. 127
13  Service Based Interfaces (SBI)Word-p. 128
14  Security related servicesWord-p. 155
15  Management security for network slicesWord-p. 158
A (Normative)  Key derivation functionsWord-p. 159
B  Using additional EAP methods for primary authenticationWord-p. 168
C (Normative)  Protection schemes for concealing the subscription permanent identifierWord-p. 174
D (Normative)  Algorithms for ciphering and integrity protectionWord-p. 180
E  UE-assisted network-based detection of false base stationWord-p. 184
F (Normative)  3GPP 5G profile for EAP-AKA'Word-p. 185
G  Application layer security on the N32 interfaceWord-p. 186
J (Normative)  SRVCC from 5G to UTRAN [R16]Word-p. 193
K (Normative)  Security for 5GLAN services [R16]Word-p. 195
L (Normative)  Security for TSC service [R16]Word-p. 196
M  Change historyWord-p. 197

Up   Top