Tech-invite  3GPPspecsRELsGlossariesSIP

Top   in Index   Prev   Next

TR 33.860SA3
Study on EGPRS Access Security enhancements
with relation to Cellular Internet of Things (CIoT)

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V13.1.0 (Wzip)  2016/06  46 p.

Rapporteur:  Mr. Torvinen, Vesa

The present document contains a study of the EGPRS (Enhanced General Packet Radio Service) access security in relation to cellular IoT, and an evaluation of possible technical security enhancements needed to support such services. Different possible deployment scenarios for Cellular IoT, and related stage 2 solutions are being studied in TR 45.820. The scope of this study is limited to investigate the feasibility of improving the access security aspects of Gb mode. In more detail, the scope includes:
  1. Investigate potential security threats, such as man in the middle attacks.
  2. Investigate potential security enhancements between the UE and SGSN to mitigate said threats.
  3. Define what security procedures and security algorithms that are recommended to be used by for Cellular IoT devices in Gb mode. This may be procedures and algorithms already specified in earlier 3GPP releases or it could be new procedures and algorithms being introduced as part of this feasibility study.
  4. The potential security enhancements as part of this study item should aim at minimising the impacts to the GPRS core network.

full Table of Contents for  TR 33.860  Word version:   13.1.0

Here   Top
1  ScopeWord-p. 7
2  References
3  Definitions and abbreviationsWord-p. 8
4  Cellular IoT
5  Key IssuesUp
6  SolutionsWord-p. 14
6.1  Solution #1: Integrity protection of signalling and algorithm negotiation
6.2  Solution #2: Data efficient rekeyingWord-p. 17
6.3  Solution #3: Algorithms for ciphering and integrity protectionWord-p. 19
6.4  Solution #4: Protection for CIoT enhanced GPRS Layer 3 - GMM messagesWord-p. 22
6.5  Solution #5: Activating integrity protection for user data in bearer layerWord-p. 25
6.6  Solution #6: Authenticated encryption
6.7  Solution #7: GIA with INPUT-I and CONSTANT-F
6.8  Solution #8: Implementation of integrity protection in LLC protocolUp
7  EvaluationWord-p. 29
8  ConclusionsWord-p. 30
A  Solution #A: Early solution for EASEWord-p. 31
B  Analysis of data efficient rekeyingWord-p. 34
C  Access security related functions for enhanced General Packet Radio Service (GPRS) in relation to Cellular Internet of Things (CIoT)Word-p. 40
D  Comparison of authenticated encryption schemesWord-p. 46
E  Change historyWord-p. 47

Up   Top