Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.814
Study on the Security of the enhancement
to the 5GC Location Services (LCS)

V16.0.1 (Wzip)  2019/09  19 p.
Rapporteur:
Mr. Zhou, Wei
HuaWei Technologies Co., Ltd

full Table of Contents for  TR 33.814  Word version:  16.0.1

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
0Introduction  p. 6
1Scope  p. 7
2References  p. 7
3Definitions of terms, symbols and abbreviations  p. 7
3.1Terms  p. 7
3.2Symbols  p. 8
3.3Abbreviations  p. 8
4Security aspects of eLCS in the 5G System  p. 8
4.1Introduction  p. 8
5Key issues  p. 9
5.1Key Issue #1: Security and privacy in Bluetooth positioning  p. 9
5.1.1Key issue details  p. 9
5.1.2Security threats  p. 9
5.1.3Potential security requirements  p. 9
5.2Key Issue #2: Security and privacy in TBS positioning  p. 9
5.2.1Key issue details  p. 9
5.2.2Security threats  p. 10
5.2.3Potential security requirements  p. 10
5.3Key Issue #3: Security and privacy in WLAN positioning  p. 10
5.3.1Key issue details  p. 10
5.3.2Security threats  p. 10
5.3.3Potential security requirements  p. 10
5.4Key Issue #4: Privacy control in LCS  p. 10
5.4.1Key issue details  p. 10
5.4.2Security threats  p. 11
5.4.3Potential security requirements  p. 11
5.5Key Issue #5: UE faking/altering location estimate or measurements  p. 11
5.5.1Key issue details  p. 11
5.5.2Security threats  p. 12
5.5.3Potential security requirements  p. 12
5.6Key Issue #6: Positioning data confidentiality between UE and network  p. 12
5.6.1Key issue details  p. 12
5.6.2Security threats  p. 12
5.6.3Potential security requirements  p. 12
6Solutions  p. 13
6.1Solution #1: Supervised Bluetooth measurements from UEs  p. 13
6.1.1Introduction  p. 13
6.1.2Solution details  p. 13
6.1.3Evaluation  p. 14
6.2Solution #2: Solution for TBS measurements from UEs  p. 14
6.2.1Introduction  p. 14
6.2.2Solution details  p. 14
6.2.3Evaluation  p. 14
6.3Solution #3: Supervised WLAN measurements from UEs  p. 15
6.3.1Introduction  p. 15
6.3.2Solution details  p. 15
6.3.3Evaluation  p. 16
6.4Solution #4: Enhanced privacy control in LCS  p. 16
6.4.1Introduction  p. 16
6.4.2Solution details  p. 16
6.4.3Evaluation  p. 18
7Conclusions  p. 18
7.1General conclusions  p. 18
7.2Conclusions on Key Issue #1  p. 18
7.3Conclusions on Key Issue #2  p. 18
7.4Conclusions on Key Issue #3  p. 18
7.5Conclusions on Key Issue #4  p. 18
$Change History  p. 19

Up   Top