Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.740
Study on Security aspects of
Proximity Based Services (ProSe) in 5GS
Phase 2

V18.1.0 (Wzip)  2023/09  117 p.
Rapporteur:
Mr. Zhou, Wei
CATT

full Table of Contents for  TR 33.740  Word version:  18.1.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 10
2References  p. 10
3Definitions of terms, symbols and abbreviations  p. 11
3.1Terms  p. 11
3.2Abbreviations  p. 11
4Security Aspects of 5G ProSe  p. 11
4.1General  p. 11
4.2Architecture assumption  p. 12
5Key issues  p. 12
5.1Key Issue #1: Security for UE-to-UE Relay discovery  p. 12
5.1.1Key issue details  p. 12
5.1.2Security threats  p. 12
5.1.3Potential security requirements  p. 12
5.2Key Issue #2: Security of UE-to-UE Relay  p. 12
5.2.1Key issue details  p. 12
5.2.2Security threats  p. 13
5.2.3Potential security requirements  p. 13
5.3Key issue #3: Authorization in the UE-to-UE Relay Scenario  p. 13
5.3.1Key issue details  p. 13
5.3.2Security threats  p. 13
5.3.3Potential security requirements  p. 13
5.4Key Issue #4: Privacy of information over the UE-to-UE Relay  p. 14
5.4.1Key issue details  p. 14
5.4.2Security threats  p. 14
5.4.3Potential security requirements  p. 14
5.5Key Issue #5: Security of source and target UE communication via U2U relay  p. 14
5.5.1Key issue details  p. 14
5.5.2Security threats  p. 15
5.5.3Potential security requirements  p. 15
5.6Key Issue #6: Support for Emergency service over UE-to-Network Relaying  p. 15
5.6.1Key issue details  p. 15
5.6.2Security threats  p. 15
5.6.3Potential security requirements  p. 15
6Solutions  p. 16
6.0Mapping of Solutions to Key Issues  p. 16
6.1Solution #1: Restricted Peer UE IP Discovery with Layer-3 UE-to-UE Relay  p. 17
6.1.1Introduction  p. 17
6.1.2Solution details  p. 17
6.1.3Evaluation  p. 18
6.2Solution #2: Privacy handling for Layer-3 UE-to-UE Relay based on IP routing  p. 18
6.2.1Introduction  p. 18
6.2.2Solution details  p. 19
6.2.3Evaluation  p. 20
6.3Solution #3: PC5 security establishment when L3 UE-to-UE relay is in coverage  p. 20
6.3.1Introduction  p. 20
6.3.2Solution details  p. 21
6.3.2.1Procedure for PC5 security establishment between the 5G ProSe Source UE and 5G ProSe UE-to-UE Relay  p. 21
6.3.2.2Procedure for PC5 security establishment between the 5G ProSe Target UE and 5G ProSe UE-to-UE Relay  p. 23
6.3.3Evaluation  p. 23
6.4Solution #4: PC5 security establishment when L3 UE-to-UE relay is out of coverage  p. 24
6.4.1Introduction  p. 24
6.4.2Solution details  p. 24
6.4.3Evaluation  p. 26
6.5Solution #5: PC5 link security establishment for Layer-3 U2U Relay  p. 26
6.5.1Introduction  p. 26
6.5.2Solution details  p. 26
6.5.2.0General  p. 26
6.5.2.1PC5 link security establishment procedure over User Plane  p. 26
6.5.2.2PC5 link security establishment procedure over Control Plane  p. 29
6.5.3Evaluation  p. 31
6.6Solution #6: End-to-end security establishment for Layer-2 UE-to-UE relay  p. 31
6.6.1Introduction  p. 31
6.6.2Solution details  p. 32
6.6.2.1End-to-end security establishment for Layer-2 UE-to-UE relay  p. 32
6.6.2.2Key Hierarchy for UE-to-UE relay  p. 34
6.6.2.3Key derivation functions  p. 35
6.6.2.3.1KD-sess derivation function  p. 35
6.6.2.3.2Integrity and encryption keys derivation function  p. 35
6.6.3Evaluation  p. 35
6.7Solution #7: Non-network-assisted Security Establishment Procedure for 5G ProSe Layer-3 UE-to-UE Relay  p. 35
6.7.1Introduction  p. 35
6.7.2Solution details  p. 36
6.7.3Evaluation  p. 37
6.8Solution #8: Restricted 5G ProSe UE-to-UE Relay Discovery Model A  p. 37
6.8.1Introduction  p. 37
6.8.2Solution details  p. 38
6.8.3Evaluation  p. 40
6.9Solution #9: Restricted 5G ProSe UE-to-UE Relay Discovery Model B  p. 40
6.9.1Introduction  p. 40
6.9.2Solution details  p. 41
6.9.3Evaluation  p. 43
6.10Solution #10: PAKE-based security for UE-to-UE relay  p. 43
6.10.1Introduction  p. 43
6.10.2Solution details  p. 44
6.10.2.0General  p. 44
6.10.2.1Parameter provisioning in-coverage and out-of coverage  p. 45
6.10.2.2PAKE protocols  p. 45
6.10.2.3Parameters exchanged prior to the PAKE execution  p. 46
6.10.2.4PAKE execution  p. 46
6.10.2.5Secure exchange of data  p. 46
6.10.2.6PAKE-based authorization  p. 46
6.10.3Evaluation  p. 47
6.11Solution #11: Security for UE-to-UE Relay (Model A) discovery  p. 47
6.11.1Introduction  p. 47
6.11.2Solution details  p. 48
6.11.2.1Restricted 5G ProSe UE-to-UE Relay discovery Model A  p. 48
6.11.3Evaluation  p. 50
6.12Solution #12: Security of Layer-2 UE-to-UE Relay and Adaptation Layer  p. 50
6.12.1Introduction  p. 50
6.12.2Solution details  p. 51
6.12.2.1End-to-End PC5 unicast link establishment and data forwarding  p. 51
6.12.2.2Privacy of identifiers for End-to-End PC5 unicast link  p. 52
6.12.3Evaluation  p. 53
6.13Solution #13: E2E authentication with Layer-3 UE-to-UE Relay  p. 54
6.13.1Introduction  p. 54
6.13.2Solution details  p. 54
6.13.3Evaluation  p. 56
6.14Solution #14: path switching with Layer-2 UE-to-UE Relay  p. 56
6.14.1Introduction  p. 56
6.14.2Solution details  p. 56
6.14.3Evaluation  p. 58
6.15Solution #15: Selection and authorization of in-coverage and out-of-coverage authentication and key establishment  p. 58
6.15.1Introduction  p. 58
6.15.2Solution details  p. 59
6.15.3Evaluation  p. 60
6.16Solution #16: Centralized discovery key management and U2U relay authorization  p. 60
6.16.1Introduction  p. 60
6.16.2Solution details  p. 61
6.16.3Evaluation  p. 61
6.17Solution #17: U2U relay discovery security material retrieval and authorization across PLMNs  p. 62
6.17.1Introduction  p. 62
6.17.2Solution details  p. 63
6.17.3Evaluation  p. 64
6.18Solution #18: UE-to-UE Relay security  p. 64
6.18.1Introduction  p. 64
6.18.2Solution details  p. 65
6.18.3Evaluation  p. 65
6.19Solution #19: End-to-end security establishment over the UE-to-UE Relay  p. 66
6.19.1Introduction  p. 66
6.19.2Solution details  p. 66
6.19.2.1End-to-end security establishment procedure over the L3 UE-to-UE Relay  p. 66
6.19.2.2End-to-end security establishment procedure over the L2 UE-to-UE Relay  p. 68
6.19.2.3Authorization and Parameter Provisioning to the UEs  p. 68
6.19.3Evaluation  p. 69
6.20Solution #20: Network-assisted security establishment procedure for 5G ProSe Layer-3 UE-to-UE Relay  p. 69
6.20.1Introduction  p. 69
6.20.2Solution details  p. 70
6.20.3Evaluation  p. 72
6.21Solution #21: E2E security establishment procedure for 5G ProSe Layer-3 UE-to-UE Relay  p. 72
6.21.1Introduction  p. 72
6.21.2Solution details  p. 72
6.21.3Evaluation  p. 73
6.22Solution #22: Common security protection setup via UE-to-UE Relay  p. 73
6.22.1Introduction  p. 73
6.22.2Solution details  p. 74
6.22.3Evaluation  p. 75
6.23Solution #23: Security mechanism for UE-to-UE Relay Model A discovery  p. 75
6.23.1Introduction  p. 75
6.23.2Solution details  p. 75
6.23.3Evaluation  p. 76
6.24Solution #24: Security mechanism for UE-to-UE Relay Model B discovery  p. 76
6.24.1Introduction  p. 76
6.24.2Solution details  p. 77
6.24.3Evaluation  p. 78
6.25Solution #25: PC5 link setup for Layer-3 UE-to-UE Relay  p. 78
6.25.1Introduction  p. 78
6.25.2Solution details  p. 79
6.25.3Evaluation  p. 79
6.26Solution #26: UE-to-UE relay PC5 connection security establishment  p. 80
6.26.1Introduction  p. 80
6.26.2Solution details  p. 80
6.26.3Evaluation  p. 81
6.27Solution #27: Support Emergency Service over L3 and L2 UE-to-Network Relay  p. 81
6.27.1Introduction  p. 81
6.27.2Solution details  p. 81
6.27.3Evaluation  p. 83
6.28Solution #28: UE-to-UE relay discovery security  p. 84
6.28.1Introduction  p. 84
6.28.2Solution details  p. 85
6.28.2.1UE-to-UE relay discovery security of Model A  p. 85
6.28.2.2UE-to-UE relay discovery security of Model B  p. 87
6.28.3Evaluation  p. 89
6.29Solution #29: Hop-by-hop security establishment for the UE-to-UE Relay  p. 90
6.29.1Introduction  p. 90
6.29.2Solution details  p. 90
6.29.2.1Hop-by-hop security establishment procedure for the UE-to-UE Relay  p. 90
6.29.2.2Authorization and Parameter Provisioning to the UEs  p. 91
6.29.3Evaluation  p. 92
6.30Solution #30: Security for discovery integrated into PC5 link establishment  p. 93
6.30.1Introduction  p. 93
6.30.2Solution details  p. 94
6.30.2.1Security for discovery integrated into PC5 link establishment  p. 94
6.30.2.2Privacy protection of User Info ID and RSC in DCR  p. 96
6.30.3Evaluation  p. 96
6.31Solution #31: Security for discovery integrated into PC5 link establishment when L3 UE-to-UE relay is in coverage  p. 97
6.31.1Introduction  p. 97
6.31.2Solution details  p. 97
6.31.2.1Procedure for PC5 security establishment between the 5G ProSe Source UE and 5G ProSe UE-to-UE Relay and between the 5G ProSe Target UE and 5G ProSe UE-to-UE Relay  p. 97
6.31.3Evaluation  p. 100
6.32Solution #32: Security for discovery integrated into PC5 link establishment procedure  p. 100
6.32.1Introduction  p. 100
6.32.2Solution details  p. 101
6.32.3Evaluation  p. 102
6.33Solution #33: Security policy negotiation for Layer-3 UE-to-UE Relay Communication  p. 102
6.33.1Introduction  p. 102
6.33.2Solution details  p. 102
6.33.3Evaluation  p. 104
6.34Solution #34: L2 U2U Relay reselection using Re-Keying  p. 104
6.34.1Introduction  p. 104
6.34.2Solution details  p. 105
6.34.3Evaluation  p. 106
6.35Solution #35: KNRP ID privacy in L2 U2U Relay reselection  p. 107
6.35.1Introduction  p. 107
6.35.2Solution details  p. 107
6.35.2.1New KNRP ID establishment using LMR/LMA  p. 107
6.35.2.2New KNRP ID establishment using coordinated Link Release  p. 108
6.35.3Evaluation  p. 109
6.36Solution #36: Model A Relay discovery using multiple key sets  p. 109
6.36.1Introduction  p. 109
6.36.2Solution details  p. 109
6.36.2.1UE-to-UE Relay Scheduling of Direct Discovery Set Announcements  p. 109
6.36.2.2U2U Relay on-demand direct discovery set protection  p. 111
6.36.3Evaluation  p. 112
6.37Solution #37: PC5 link establishment with secure integrated discovery  p. 112
6.37.1Introduction  p. 112
6.37.2Solution details  p. 113
6.37.3Evaluation  p. 114
7Conclusions  p. 114
7.1Key Issue #1: Security for UE-to-UE Relay discovery  p. 114
7.2Key Issue #2: Security of UE-to-UE Relay  p. 115
7.3Key issue #3: Authorization in the UE-to-UE Relay Scenario  p. 115
7.4Key Issue #4: Privacy of information over the UE-to-UE Relay  p. 115
7.5Key Issue #5: Security of source and target UE communication via U2U relay  p. 116
7.6Key Issue #6: Support for Emergency service over UE-to-Network Relaying  p. 116
$Change history  p. 117

Up   Top