Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TR 33.814
Study on the Security of the enhancement
to the 5GC Location Services (LCS)
3GPP‑Page
fToC
↓
Partial Content
→
V16.0.1 (Wzip)
2019/09 19 p.
Rapporteur:
Mr. Zhou, Wei
HuaWei Technologies Co., Ltd
full Table of Contents for
TR 33.814
Word version: 16.0.1
each clause number in
'red'
refers to the equivalent title in the Partial Content
0
Introduction
p. 6
1
Scope
p. 7
2
References
p. 7
3
Definitions of terms, symbols and abbreviations
p. 7
3.1
Terms
p. 7
3.2
Symbols
p. 8
3.3
Abbreviations
p. 8
4
Security aspects of eLCS in the 5G System
p. 8
4.1
Introduction
p. 8
5
Key issues
p. 9
5.1
Key Issue #1: Security and privacy in Bluetooth positioning
p. 9
5.1.1
Key issue details
p. 9
5.1.2
Security threats
p. 9
5.1.3
Potential security requirements
p. 9
5.2
Key Issue #2: Security and privacy in TBS positioning
p. 9
5.2.1
Key issue details
p. 9
5.2.2
Security threats
p. 10
5.2.3
Potential security requirements
p. 10
5.3
Key Issue #3: Security and privacy in WLAN positioning
p. 10
5.3.1
Key issue details
p. 10
5.3.2
Security threats
p. 10
5.3.3
Potential security requirements
p. 10
5.4
Key Issue #4: Privacy control in LCS
p. 10
5.4.1
Key issue details
p. 10
5.4.2
Security threats
p. 11
5.4.3
Potential security requirements
p. 11
5.5
Key Issue #5: UE faking/altering location estimate or measurements
p. 11
5.5.1
Key issue details
p. 11
5.5.2
Security threats
p. 12
5.5.3
Potential security requirements
p. 12
5.6
Key Issue #6: Positioning data confidentiality between UE and network
p. 12
5.6.1
Key issue details
p. 12
5.6.2
Security threats
p. 12
5.6.3
Potential security requirements
p. 12
6
Solutions
p. 13
6.1
Solution #1: Supervised Bluetooth measurements from UEs
p. 13
6.1.1
Introduction
p. 13
6.1.2
Solution details
p. 13
6.1.3
Evaluation
p. 14
6.2
Solution #2: Solution for TBS measurements from UEs
p. 14
6.2.1
Introduction
p. 14
6.2.2
Solution details
p. 14
6.2.3
Evaluation
p. 14
6.3
Solution #3: Supervised WLAN measurements from UEs
p. 15
6.3.1
Introduction
p. 15
6.3.2
Solution details
p. 15
6.3.3
Evaluation
p. 16
6.4
Solution #4: Enhanced privacy control in LCS
p. 16
6.4.1
Introduction
p. 16
6.4.2
Solution details
p. 16
6.4.3
Evaluation
p. 18
7
Conclusions
p. 18
7.1
General conclusions
p. 18
7.2
Conclusions on Key Issue #1
p. 18
7.3
Conclusions on Key Issue #2
p. 18
7.4
Conclusions on Key Issue #3
p. 18
7.5
Conclusions on Key Issue #4
p. 18
$
Change History
p. 19