Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Top   in Index   Prev   Next

TS 33.501 (SA3)
Security Architecture and Procedures for 5G System

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V16.0.0 (Wzip)2019/09  196 p.
V15.6.0 (PDF)2019/09  194 p.

Rapporteur:  Dr. Zugenmaier, Alf

The present document specifies the security architecture, i.e., the security features and the security mechanisms for the 5G System and the 5G Core, and the security procedures performed within the 5G System including the 5G Core and the 5G New Radio.

short Table of Contents for  TS 33.501  Word version:   16.0.0

each title links to the equivalent title in the full ToC


Here   Top


1  ScopeWord-p. 13
2  ReferencesWord-p. 13
3  Definitions and abbreviationsWord-p. 16
4  Overview of security architectureWord-p. 20
5  Security requirements and featuresWord-p. 22
6  Security procedures between UE and 5G network functionsWord-p. 33
6.0  GeneralUpWord-p. 33
6.1  Primary authentication and key agreementWord-p. 33
6.2  Key hierarchy, key derivation, and distribution schemeWord-p. 45
6.3  Security contextsWord-p. 52
6.4  NAS security mechanismsWord-p. 53
6.5  RRC security mechanismsWord-p. 58
6.6  UP security mechanismsWord-p. 59
6.7  Security algorithm selection, key establishment and security mode command procedureWord-p. 61
6.8  Security handling in state transitionsWord-p. 67
6.9  Security handling in mobilityWord-p. 75
6.10  Dual connectivityWord-p. 85
6.11  Security handling for RRC connection re-establishment procedureWord-p. 91
6.12  Subscription identifier privacyWord-p. 92
6.13  Signalling procedure for PDCP COUNT checkWord-p. 95
6.14  Steering of roaming security mechanismWord-p. 96
6.15  UE parameters update via UDM control plane procedure security mechanismWord-p. 99
7  Security for non-3GPP access to the 5G core networkUpWord-p. 101
8  Security of interworkingWord-p. 104
9  Security procedures for non-service based interfacesUpWord-p. 114
10  Security aspects of IMS emergency session handlingWord-p. 117
11  Security procedures between UE and external data networks via the 5G NetworkWord-p. 121
12  Security aspects of Network Exposure Function (NEF)Word-p. 125
13  Service Based Interfaces (SBI)Word-p. 126
14  Security related servicesWord-p. 152
15  Management security for network slicesWord-p. 155
A (Normative)  Key derivation functionsWord-p. 156
B  Using additional EAP methods for primary authenticationWord-p. 164
C (Normative)  Protection schemes for concealing the subscription permanent identifierWord-p. 170
D (Normative)  Algorithms for ciphering and integrity protectionWord-p. 176
E  UE-assisted network-based detection of false base stationWord-p. 180
F (Normative)  3GPP 5G profile for EAP-AKA'Word-p. 181
G  Application layer security on the N32 interfaceWord-p. 182
I (Normative)  Non-public networks [R16]Word-p. 186
J (Normative)  SRVCC from 5G to UTRAN [R16]Word-p. 189
K  Change historyWord-p. 191

Up   Top