Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TR 33.836
Study on Security aspects of 3GPP support
for advanced Vehicle-to-Everything (V2X) services
3GPP‑Page
ETSI‑search
fToC
↓
Partial Content
→
V16.1.0 (Wzip)
2020/09 51 p.
Rapporteur:
Mr. Kim, Dongjoo
LG Electronics Inc.
full Table of Contents for
TR 33.836
Word version: 16.1.0
each clause number in
'red'
refers to the equivalent title in the Partial Content
1
Scope
p. 8
2
References
p. 8
3
Definitions of terms, symbols and abbreviations
p. 9
3.1
Terms
p. 9
3.2
Symbols
p. 9
3.3
Abbreviations
p. 9
4
Security Aspects of Advanced V2X Services
p. 9
5
Key Issues
p. 10
5.1
Key Issue #1: Privacy protection for unicast messages over PC5
p. 10
5.1.1
Key issue details
p. 10
5.1.2
Security threats
p. 10
5.1.3
Potential security requirements
p. 10
5.2
Key Issue #2: Security for eV2X unicast messages over PC5.
p. 10
5.2.1
Key issue details
p. 10
5.2.2
Security threats
p. 11
5.2.3
Potential security requirements
p. 11
5.3
Key Issue #3: Privacy protection for groupcast messages over PC5
p. 11
5.3.1
Key issue details
p. 11
5.3.2
Security threats
p. 11
5.3.3
Potential security requirements
p. 12
5.4
Key Issue #4: Security of identifier conversion in groupcast communication
p. 12
5.4.1
Key issue details
p. 12
5.4.2
Security threats
p. 12
5.4.3
Potential security requirements
p. 12
5.5
Key Issue #5: Security for setting up groupcast
p. 13
5.5.1
Key issue details
p. 13
5.5.2
Security threats
p. 13
5.5.3
Potential security requirements
p. 13
5.6
Key Issue #6: Security of the UE service authorization and revocation
p. 13
5.6.1
Key issue details
p. 13
5.6.2
Security threats
p. 13
5.6.3
Potential security requirements
p. 13
5.7
Key Issue #7: Cross-RAT PC5 control authorization indication
p. 13
5.7.1
Key issue details
p. 13
5.7.2
Security threats
p. 14
5.7.3
Potential security requirements
p. 14
5.8
Key Issue #8: Privacy protection for broadcast messages over PC5
p. 14
5.8.1
Key issue details
p. 14
5.8.2
Security threats
p. 14
5.8.3
Potential security requirements
p. 14
5.9
Key Issue #9: Minimizing the impact of privacy protection mechanism in the application layer communication
p. 15
5.9.1
Key issue details
p. 15
5.9.2
Security threats
p. 16
5.9.3
Potential security requirements
p. 16
5.10
Key Issue #10: UP security policy handling for PC5 and Uu interface
p. 16
5.10.1
Key issue details
p. 16
5.10.2
Security threats
p. 17
5.10.3
Potential security requirements
p. 17
5.11
Key Issue #11: Security for eV2X broadcast messages over PC5
p. 17
5.11.1
Key issue details
p. 17
5.11.2
Security threats
p. 17
5.11.3
Potential security requirements
p. 17
6
Solutions
p. 17
6.1
Solution #1: Privacy protection for unicast messages over PC5
p. 17
6.1.1
Introduction
p. 17
6.1.2
Solution details
p. 18
6.1.3
Evaluation
p. 20
6.2
Solution #2: Security for eV2X unicast messages over PC5
p. 20
6.2.1
Introduction
p. 20
6.2.2
Solution details
p. 21
6.2.3
Evaluation
p. 22
6.3
Solution #3: Security for eV2X unicast messages over PC5
p. 22
6.3.1
Introduction
p. 22
6.3.2
Solution details
p. 23
6.3.3
Evaluation
p. 25
6.4
Solution #4: Privacy protection for unicast messages over PC5
p. 25
6.4.1
Introduction
p. 25
6.4.2
Solution details
p. 26
6.4.3
Evaluation
p. 27
6.5
Solution #5: Security protection of service authorisation
p. 27
6.5.1
Introduction
p. 27
6.5.2
Solution details
p. 27
6.5.3
Evaluation
p. 28
6.6
Solution #6: V2X Group Key Provisioning
p. 28
6.6.1
Introduction
p. 28
6.6.2
Solution details
p. 28
6.6.3
Evaluation
p. 29
6.7
Solution #7: Cross-RAT PC5 control authorization indication
p. 29
6.7.1
Introduction
p. 29
6.7.2
Solution details
p. 29
6.7.3
Evaluation
p. 29
6.8
Solution #8: Deriving PC5 layer keys based on higher layer keys
p. 29
6.8.1
Introduction
p. 29
6.8.2
Solution details
p. 29
6.8.3
Evaluation
p. 31
6.9
Solution #9: Security for eV2X unicast messages over PC5 using ECCSI and SAKKE
p. 32
6.9.1
Introduction
p. 32
6.9.2
Solution details
p. 32
6.9.2.1
Initial Security Link Establishment
p. 32
6.9.2.2
Procedure for privacy protection of unicast communication
p. 34
6.9.3
Evaluation
p. 35
6.10
Solution #10: Privacy protection for unicast message over PC5
p. 35
6.10.1
Introduction
p. 35
6.10.2
Solution details
p. 35
6.10.3
Evaluation
p. 36
6.11
Solution #11: Solution on minimizing the impact of privacy protection mechanism in the application layer communication
p. 37
6.11.1
Introduction
p. 37
6.11.2
Solution details
p. 37
6.11.3
Evaluation
p. 38
6.12
Solution #12: Protecting the traffic at the PDCP layer
p. 39
6.12.1
Introduction
p. 39
6.12.2
Solution details
p. 39
6.12.2.1
General
p. 39
6.12.2.2
Integrity protection
p. 39
6.12.2.3
Confidentiality protection
p. 39
6.12.2.4
Security contents in the PCDP header
p. 39
6.12.3
Evaluation
p. 40
6.13
Solution #13: Solution against V2X UE tracking based on PC5 identifiers
p. 40
6.13.1
Introduction
p. 40
6.13.2
Solution details
p. 40
6.13.3
Evaluation
p. 40
6.14
Solution #14: Identifier conversion in groupcast communication
p. 41
6.14.1
Introduction
p. 41
6.14.2
Solution details
p. 41
6.14.3
Evaluation
p. 41
6.15
Solution #15: Solution on minimizing the impact of privacy protection mechanism in the application layer communication
p. 42
6.15.1
Introduction
p. 42
6.15.2
Solution details
p. 42
6.15.3
Solution Evaluation
p. 43
6.16
Solution #16: Solution for the activation of user plane security in NR PC5 unicast
p. 43
6.16.1
Introduction
p. 43
6.16.2
Solution details
p. 43
6.16.3
Evaluation
p. 44
6.17
Solution #17: PC5 layer key derivation using the 5G network keys
p. 44
6.17.1
Introduction
p. 44
6.17.2
Solution details
p. 44
6.17.3
Evaluation
p. 46
6.18
Solution #18: Solution for the UP security activation policy handling in NR PC5 unicast
p. 46
6.18.1
Introduction
p. 46
6.18.2
Solution details
p. 46
6.18.3
Evaluation
p. 47
6.19
Solution #19: Protection of IEs in Direct Communication Request message
p. 47
6.19.1
Introduction
p. 47
6.19.2
Solution details
p. 47
6.19.3
Evaluation
p. 47
6.20
Solution #20: Solution on securely creating destination Layer-2 ID in groupcast communication
p. 48
6.20.1
Introduction
p. 48
6.20.2
Solution details
p. 48
6.20.3
Evaluation
p. 48
7
Conclusions
p. 49
7.1
Conclusion on KI #7
p. 49
7.2
Conclusion on KI #5
p. 49
7.3
Conclusion on KI #11
p. 49
7.4
Conclusion on KI #3 and #8
p. 49
7.5
Conclusion on KI #6
p. 49
7.6
Conclusion on KI #1
p. 49
7.7
Conclusion on KI #2
p. 49
7.8
Conclusion on KI #10
p. 49
7.9
Conclusion on KI#4
p. 49
7.10
Conclusion on KI#9
p. 50
$
Change History
p. 51