| 6.0 | Mapping of Solutions to Key Issues p. 16
|
| 6.1 | Solution #1: Restricted Peer UE IP Discovery with Layer-3 UE-to-UE Relay p. 17
|
| 6.2 | Solution #2: Privacy handling for Layer-3 UE-to-UE Relay based on IP routing p. 18
|
| 6.3 | Solution #3: PC5 security establishment when L3 UE-to-UE relay is in coverage p. 20
| 6.3.1 | Introduction p. 20
|
| 6.3.2 | Solution details p. 21
| 6.3.2.1 | Procedure for PC5 security establishment between the 5G ProSe Source UE and 5G ProSe UE-to-UE Relay p. 21
|
| 6.3.2.2 | Procedure for PC5 security establishment between the 5G ProSe Target UE and 5G ProSe UE-to-UE Relay p. 23
|
|
| 6.3.3 | Evaluation p. 23
|
|
| 6.4 | Solution #4: PC5 security establishment when L3 UE-to-UE relay is out of coverage p. 24
|
| 6.5 | Solution #5: PC5 link security establishment for Layer-3 U2U Relay p. 26
| 6.5.1 | Introduction p. 26
|
| 6.5.2 | Solution details p. 26
| 6.5.2.0 | General p. 26
|
| 6.5.2.1 | PC5 link security establishment procedure over User Plane p. 26
|
| 6.5.2.2 | PC5 link security establishment procedure over Control Plane p. 29
|
|
| 6.5.3 | Evaluation p. 31
|
|
| 6.6 | Solution #6: End-to-end security establishment for Layer-2 UE-to-UE relay p. 31
| 6.6.1 | Introduction p. 31
|
| 6.6.2 | Solution details p. 32
| 6.6.2.1 | End-to-end security establishment for Layer-2 UE-to-UE relay p. 32
|
| 6.6.2.2 | Key Hierarchy for UE-to-UE relay p. 34
|
| 6.6.2.3 | Key derivation functions p. 35
| 6.6.2.3.1 | KD-sess derivation function p. 35
|
| 6.6.2.3.2 | Integrity and encryption keys derivation function p. 35
|
|
|
| 6.6.3 | Evaluation p. 35
|
|
| 6.7 | Solution #7: Non-network-assisted Security Establishment Procedure for 5G ProSe Layer-3 UE-to-UE Relay p. 35
|
| 6.8 | Solution #8: Restricted 5G ProSe UE-to-UE Relay Discovery Model A p. 37
|
| 6.9 | Solution #9: Restricted 5G ProSe UE-to-UE Relay Discovery Model B p. 40
|
| 6.10 | Solution #10: PAKE-based security for UE-to-UE relay p. 43
|
| 6.11 | Solution #11: Security for UE-to-UE Relay (Model A) discovery p. 47
| 6.11.1 | Introduction p. 47
|
| 6.11.2 | Solution details p. 48
| 6.11.2.1 | Restricted 5G ProSe UE-to-UE Relay discovery Model A p. 48
|
|
| 6.11.3 | Evaluation p. 50
|
|
| 6.12 | Solution #12: Security of Layer-2 UE-to-UE Relay and Adaptation Layer p. 50
| 6.12.1 | Introduction p. 50
|
| 6.12.2 | Solution details p. 51
| 6.12.2.1 | End-to-End PC5 unicast link establishment and data forwarding p. 51
|
| 6.12.2.2 | Privacy of identifiers for End-to-End PC5 unicast link p. 52
|
|
| 6.12.3 | Evaluation p. 53
|
|
| 6.13 | Solution #13: E2E authentication with Layer-3 UE-to-UE Relay p. 54
|
| 6.14 | Solution #14: path switching with Layer-2 UE-to-UE Relay p. 56
|
| 6.15 | Solution #15: Selection and authorization of in-coverage and out-of-coverage authentication and key establishment p. 58
|
| 6.16 | Solution #16: Centralized discovery key management and U2U relay authorization p. 60
|
| 6.17 | Solution #17: U2U relay discovery security material retrieval and authorization across PLMNs p. 62
|
| 6.18 | Solution #18: UE-to-UE Relay security p. 64
|
| 6.19 | Solution #19: End-to-end security establishment over the UE-to-UE Relay p. 66
| 6.19.1 | Introduction p. 66
|
| 6.19.2 | Solution details p. 66
| 6.19.2.1 | End-to-end security establishment procedure over the L3 UE-to-UE Relay p. 66
|
| 6.19.2.2 | End-to-end security establishment procedure over the L2 UE-to-UE Relay p. 68
|
| 6.19.2.3 | Authorization and Parameter Provisioning to the UEs p. 68
|
|
| 6.19.3 | Evaluation p. 69
|
|
| 6.20 | Solution #20: Network-assisted security establishment procedure for 5G ProSe Layer-3 UE-to-UE Relay p. 69
|
| 6.21 | Solution #21: E2E security establishment procedure for 5G ProSe Layer-3 UE-to-UE Relay p. 72
|
| 6.22 | Solution #22: Common security protection setup via UE-to-UE Relay p. 73
|
| 6.23 | Solution #23: Security mechanism for UE-to-UE Relay Model A discovery p. 75
|
| 6.24 | Solution #24: Security mechanism for UE-to-UE Relay Model B discovery p. 76
|
| 6.25 | Solution #25: PC5 link setup for Layer-3 UE-to-UE Relay p. 78
|
| 6.26 | Solution #26: UE-to-UE relay PC5 connection security establishment p. 80
|
| 6.27 | Solution #27: Support Emergency Service over L3 and L2 UE-to-Network Relay p. 81
|
| 6.28 | Solution #28: UE-to-UE relay discovery security p. 84
| 6.28.1 | Introduction p. 84
|
| 6.28.2 | Solution details p. 85
| 6.28.2.1 | UE-to-UE relay discovery security of Model A p. 85
|
| 6.28.2.2 | UE-to-UE relay discovery security of Model B p. 87
|
|
| 6.28.3 | Evaluation p. 89
|
|
| 6.29 | Solution #29: Hop-by-hop security establishment for the UE-to-UE Relay p. 90
| 6.29.1 | Introduction p. 90
|
| 6.29.2 | Solution details p. 90
| 6.29.2.1 | Hop-by-hop security establishment procedure for the UE-to-UE Relay p. 90
|
| 6.29.2.2 | Authorization and Parameter Provisioning to the UEs p. 91
|
|
| 6.29.3 | Evaluation p. 92
|
|
| 6.30 | Solution #30: Security for discovery integrated into PC5 link establishment p. 93
| 6.30.1 | Introduction p. 93
|
| 6.30.2 | Solution details p. 94
| 6.30.2.1 | Security for discovery integrated into PC5 link establishment p. 94
|
| 6.30.2.2 | Privacy protection of User Info ID and RSC in DCR p. 96
|
|
| 6.30.3 | Evaluation p. 96
|
|
| 6.31 | Solution #31: Security for discovery integrated into PC5 link establishment when L3 UE-to-UE relay is in coverage p. 97
| 6.31.1 | Introduction p. 97
|
| 6.31.2 | Solution details p. 97
| 6.31.2.1 | Procedure for PC5 security establishment between the 5G ProSe Source UE and 5G ProSe UE-to-UE Relay and between the 5G ProSe Target UE and 5G ProSe UE-to-UE Relay p. 97
|
|
| 6.31.3 | Evaluation p. 100
|
|
| 6.32 | Solution #32: Security for discovery integrated into PC5 link establishment procedure p. 100
|
| 6.33 | Solution #33: Security policy negotiation for Layer-3 UE-to-UE Relay Communication p. 102
|
| 6.34 | Solution #34: L2 U2U Relay reselection using Re-Keying p. 104
|
| 6.35 | Solution #35: KNRP ID privacy in L2 U2U Relay reselection p. 107
| 6.35.1 | Introduction p. 107
|
| 6.35.2 | Solution details p. 107
| 6.35.2.1 | New KNRP ID establishment using LMR/LMA p. 107
|
| 6.35.2.2 | New KNRP ID establishment using coordinated Link Release p. 108
|
|
| 6.35.3 | Evaluation p. 109
|
|
| 6.36 | Solution #36: Model A Relay discovery using multiple key sets p. 109
| 6.36.1 | Introduction p. 109
|
| 6.36.2 | Solution details p. 109
| 6.36.2.1 | UE-to-UE Relay Scheduling of Direct Discovery Set Announcements p. 109
|
| 6.36.2.2 | U2U Relay on-demand direct discovery set protection p. 111
|
|
| 6.36.3 | Evaluation p. 112
|
|
| 6.37 | Solution #37: PC5 link establishment with secure integrated discovery p. 112
|