Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.740
Study on Security aspects of
Proximity Based Services (ProSe) in 5GS
Phase 2

3GPP‑Page  
V18.1.0 (Wzip)  2023/09  117 p.
Rapporteur:
Mr. Zhou, Wei
CATT

full Table of Contents for  TR 33.740  Word version:  18.1.0

Here   Top

 

1  Scopep. 10

The present document studies the security and privacy aspects of proximity based services in 5G system phase 2. It ensures that the security solutions are aligned with the work in SA2 (i.e. TR 23.700-33), RANs, SA1 (i.e. TS 22.278, TS 22.261, and TS 22.115) and SA3 (i.e. TS 33.503 and TR 33.870 [7]). The present document covers the following issues:
  • Security and privacy key issues, threats and potential requirements of proximity based services in 5G system phase 2.
  • Potential security solutions to cover these potential requirements.
Both roaming and non-roaming scenarios are considered.
Up

2  Referencesp. 10

3  Definitions of terms, symbols and abbreviationsp. 11

3.1  Termsp. 11

3.2  Abbreviationsp. 11

4  Security Aspects of 5G ProSep. 11

5  Key issuesp. 12

6  Solutionsp. 16

6.0  Mapping of Solutions to Key Issuesp. 16

6.1  Solution #1: Restricted Peer UE IP Discovery with Layer-3 UE-to-UE Relayp. 17

6.2  Solution #2: Privacy handling for Layer-3 UE-to-UE Relay based on IP routingp. 18

6.3  Solution #3: PC5 security establishment when L3 UE-to-UE relay is in coveragep. 20

6.4  Solution #4: PC5 security establishment when L3 UE-to-UE relay is out of coveragep. 24

6.5  Solution #5: PC5 link security establishment for Layer-3 U2U Relayp. 26

6.6  Solution #6: End-to-end security establishment for Layer-2 UE-to-UE relayp. 31

6.7  Solution #7: Non-network-assisted Security Establishment Procedure for 5G ProSe Layer-3 UE-to-UE Relayp. 35

6.8  Solution #8: Restricted 5G ProSe UE-to-UE Relay Discovery Model Ap. 37

6.9  Solution #9: Restricted 5G ProSe UE-to-UE Relay Discovery Model Bp. 40

6.10  Solution #10: PAKE-based security for UE-to-UE relayp. 43

6.11  Solution #11: Security for UE-to-UE Relay (Model A) discoveryp. 47

6.12  Solution #12: Security of Layer-2 UE-to-UE Relay and Adaptation Layerp. 50

6.13  Solution #13: E2E authentication with Layer-3 UE-to-UE Relayp. 54

6.14  Solution #14: path switching with Layer-2 UE-to-UE Relayp. 56

6.15  Solution #15: Selection and authorization of in-coverage and out-of-coverage authentication and key establishmentp. 58

6.16  Solution #16: Centralized discovery key management and U2U relay authorizationp. 60

6.17  Solution #17: U2U relay discovery security material retrieval and authorization across PLMNsp. 62

6.18  Solution #18: UE-to-UE Relay securityp. 64

6.19  Solution #19: End-to-end security establishment over the UE-to-UE Relayp. 66

6.20  Solution #20: Network-assisted security establishment procedure for 5G ProSe Layer-3 UE-to-UE Relayp. 69

6.21  Solution #21: E2E security establishment procedure for 5G ProSe Layer-3 UE-to-UE Relayp. 72

6.22  Solution #22: Common security protection setup via UE-to-UE Relayp. 73

6.23  Solution #23: Security mechanism for UE-to-UE Relay Model A discoveryp. 75

6.24  Solution #24: Security mechanism for UE-to-UE Relay Model B discoveryp. 76

6.25  Solution #25: PC5 link setup for Layer-3 UE-to-UE Relayp. 78

6.26  Solution #26: UE-to-UE relay PC5 connection security establishmentp. 80

6.27  Solution #27: Support Emergency Service over L3 and L2 UE-to-Network Relayp. 81

6.28  Solution #28: UE-to-UE relay discovery securityp. 84

6.29  Solution #29: Hop-by-hop security establishment for the UE-to-UE Relayp. 90

6.30  Solution #30: Security for discovery integrated into PC5 link establishmentp. 93

6.31  Solution #31: Security for discovery integrated into PC5 link establishment when L3 UE-to-UE relay is in coveragep. 97

6.32  Solution #32: Security for discovery integrated into PC5 link establishment procedurep. 100

6.33  Solution #33: Security policy negotiation for Layer-3 UE-to-UE Relay Communicationp. 102

6.34  Solution #34: L2 U2U Relay reselection using Re-Keyingp. 104

6.35  Solution #35: KNRP ID privacy in L2 U2U Relay reselectionp. 107

6.36  Solution #36: Model A Relay discovery using multiple key setsp. 109

6.37  Solution #37: PC5 link establishment with secure integrated discoveryp. 112

7  Conclusionsp. 114

$  Change historyp. 117


Up   Top