Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.743
Study on Security aspects of enhancement for Proximity-based Services (ProSe) in the 5GS Phase 3

V19.0.0 (Wzip)  2025/03  50 p.
Rapporteur:
Dr. Lei, Ao
HUAWEI TECHNOLOGIES Co. Ltd.

full Table of Contents for  TR 33.743  Word version:  19.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 7
2References  p. 7
3Definitions of terms, symbols and abbreviations  p. 7
3.1Terms  p. 7
3.2Symbols  p. 8
3.3Abbreviations  p. 8
4Overview and Security Assumptions  p. 8
5Key issues  p. 9
5.1Key issue #1: Security for multi-hop UE-to-Network Relay  p. 9
5.1.1Key issue details  p. 9
5.1.2Threats  p. 9
5.1.3Potential security requirements  p. 9
5.2Key Issue #2: Security for Multi-hop UE-to-UE Relay  p. 10
5.2.1Key issue details  p. 10
5.2.2Security threats  p. 10
5.2.3Potential security requirements  p. 10
6Solutions  p. 10
6.1Solution #1: Security for multi-hop UE-to-Network Relay using an intermediate key  p. 10
6.1.1Introduction  p. 10
6.1.2Solution details  p. 11
6.1.2.1Security procedure over User Plane  p. 11
6.1.2.2Security procedure over Control Plane  p. 12
6.1.2.3Key Hierarchy  p. 13
6.1.3Evaluation  p. 13
6.2Solution #2: Security of multi-hop UE-to-Network Relay discovery Model A  p. 14
6.2.1Introduction  p. 14
6.2.2Solution details  p. 14
6.2.2.0Security procedure  p. 14
6.2.2.1Provisioning the intermediate relay discovery security material  p. 17
6.2.3Evaluation  p. 18
6.3Solution #3: Security of multi-hop UE-to-Network Relay discovery Model B  p. 18
6.3.1Introduction  p. 18
6.3.2Solution details  p. 19
6.3.2.0Security procedure  p. 19
6.3.2.1Provisioning the intermediate relay discovery security material  p. 21
6.3.3Evaluation  p. 22
6.4Solution #4: Security of multi-hop UE-to-Network Relay communication  p. 22
6.4.1Introduction  p. 22
6.4.2Solution details  p. 23
6.4.3Evaluation  p. 25
6.5Solution #5: Security establishment for multi-hop UE-to-Network Relay  p. 25
6.5.1Introduction  p. 25
6.5.2Solution details  p. 26
6.5.3Evaluation  p. 27
6.6Solution #6: Security for multi-hop UE-to-Network Relay Communication  p. 28
6.6.1Introduction  p. 28
6.6.2Security procedure for each hop PC5 Link  p. 29
6.6.3Security procedure for 5G ProSe Multi-hop Layer-3 UE-to-Network Relay Communication with N3IWF support  p. 29
6.6.4Security procedure for 5G ProSe Multi-hop Layer-3 UE-to-Network Relay Communication without N3IWF support  p. 29
6.6.5Security procedure for 5G ProSe Multi-hop Layer-2 UE-to-Network Relay Communication  p. 30
6.6.6Evaluation  p. 30
6.7Solution #7: Multi-hop UE-to-network Relay discovery security procedure  p. 31
6.7.1Introduction  p. 31
6.7.2Solution details  p. 31
6.7.2.1Multi-hop UE-to-Network Relay Discovery security procedure with Model A  p. 31
6.7.2.2Multi-hop UE-to-Network Relay Discovery security procedure with Model B  p. 32
6.7.3Evaluation  p. 33
6.8Solution #8: Multi-hop UE-to-network Relay security establishment procedure  p. 33
6.8.1Introduction  p. 33
6.8.2Solution details  p. 34
6.8.3Evaluation  p. 34
6.9Solution #9: Multi-hop UE-to-Network Relay discovery security  p. 35
6.9.1Introduction  p. 35
6.9.2Solution details  p. 35
6.9.2.1Discovery with Model A  p. 35
6.9.2.2Discovery with Model B  p. 36
6.9.3Evaluation  p. 37
6.10Solution #10: Multi-hop UE-to-Network Relay communication security  p. 37
6.10.1Introduction  p. 37
6.10.2Solution details  p. 37
6.10.3Evaluation  p. 38
6.11Solution #11: Security establishment for multi-hop UE-to-UE Relay  p. 39
6.11.1Introduction  p. 39
6.11.2Solution details  p. 39
6.11.2.0General  p. 39
6.11.2.1Security mechanism with network assistance  p. 39
6.11.2.2Security mechanism without network assistance  p. 40
6.11.3Evaluation  p. 40
6.12Solution #12: Solution of multi-hop UE-to-UE Relay Communication  p. 40
6.12.1Introduction  p. 40
6.12.2Solution details  p. 40
6.12.3Evaluation  p. 41
6.13Solution #13: Solution of multi-hop UE-to-UE Relays Discovery Model B  p. 41
6.13.1Introduction  p. 41
6.13.2Solution details  p. 41
6.13.3Evaluation  p. 43
6.14Solution #14: Multi-hop UE-to-UE Relay discovery security  p. 43
6.14.1Introduction  p. 43
6.14.2Solution details  p. 43
6.14.3Evaluation  p. 44
6.15Solution #15: Multi-hop UE-to-UE Relay communication security  p. 44
6.15.1Introduction  p. 44
6.15.2Solution details  p. 44
6.15.3Evaluation  p. 45
6.16Solution #16: Multi-hop UE-to-Network Relay communication security after discovery with Model B  p. 45
6.16.1Introduction  p. 45
6.16.2Solution details  p. 45
6.16.3Evaluation  p. 46
6.17Solution #17: Multi-hop UE-to-UE Model A discovery security in non-IP scenario  p. 46
6.17.1Introduction  p. 46
6.17.2Solution details  p. 46
6.17.3Evaluation  p. 47
7Conclusions  p. 47
7.1Key Issue #2: Security for Multi-hop UE-to-UE Relay  p. 47
7.2Key issue #1: Security for multi-hop UE-to-Network Relay  p. 48
$Change history  p. 50

Up   Top