Tech-invite  3GPPspecsRELsGlossariesSIP
Info21222324252627282931323334353637384‑5x

Top   in Index   Prev   Next

TR 33.820SA3
Security of
HNB / HeNB (Home Node B / Home evolved Node B)

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V8.3.0 (Wzip)  2009/12  99 p.

Rapporteur:  Mr. Yang, Yangmei

ThiS TR identifies special security threats of H(e)NB and study the countermeasures to these threats.
The study should include, but not be limited to, threat analysis of H(e)NB, mutual authentication and security protection between H(e)NB and rest of network, maintenance of the security context between H(e)NB and rest of network, security requirements on the H(e)NB, provisioning of security credentials on the H(e)NB, security solution for verifying the location of the H(e)NB etc.
With regard to security protection between the H(e)NB and the rest of the network, bandwidth efficiency should be taken into consideration.

full Table of Contents for  TR 33.820  Word version:   8.3.0

Here   Top
1  ScopeWord-p. 7
2  References
3  Definitions, symbols and abbreviationsWord-p. 8
4  System architectureWord-p. 9
5  Threats analysisWord-p. 13
6  Security Requirements
7  Common Security mechanisms solutions for H(e)NBWord-p. 36
7.1  H(e)NB Authentication Principle
7.2  Secure Storage and ExecutionWord-p. 37
7.3  Comparison of H(e)NB Authentication MethodsWord-p. 39
7.4  Authentication Method Selection
7.5  Device Integrity CheckWord-p. 43
7.6  Authentication Implementation OptionsWord-p. 66
7.7  Backhaul Security MechanismsWord-p. 78
7.8  Location Locking mechanisms
7.9  Access Control Mechanisms for H(e)NB
7.10  Security Mechanisms for OAMWord-p. 88
7.11  Clock Synchronization Security Mechanisms for H(e)NB
7.12  H(e)NB Distress Indication
8  ConclusionsWord-p. 91
A  Security mechanisms for OAMWord-p. 93
B  TrE Types and Corresponding InterfacesWord-p. 97
C  Change historyWord-p. 99

Up   Top