Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+
Top   in Index   Prev   Next

TR 33.861 (SA3) ☆ (Rel-16 draft)
Study on evolution of CIoT Security
for the 5G System

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V1.1.0 (Wzip)  2019/05  51 p.

Rapporteur:  Mr. Normann, Henrik Andreas

The scope of this study is the following:
  • Capture massive MTC related 5G requirements in other 3GPP documents and further analyse them from security point of view.
  • Study security for supporting EPS CIoT/MTC functionalities in 5GS, e.g.
    • security for infrequent and frequent small data transmission
    • security for inter-RAT mobility to/from NB-IoT or modifications in the EPC-5GC interworking security specific to CIoT.
  • Study security enhancements based on the architectural study in TR 23.724, e.g.
    • security for transport of user plane over 5G NAS or
    • termination of user plane security in 5GC.
  • Study the security aspects of the architectural enhancements addressing the 5G service requirements in TS 22.261 and TR 38.913.
  • Study the need for additional mechanisms to improve protection of the network from maliciously behaving IoT devices.

full Table of Contents for  TR 33.861  Word version:   1.1.0

 

Here   Top

 

1  ScopeWord-p. 8
2  References
3  Definitions and abbreviationsWord-p. 9
4  Security aspects of the CIoT features in the 5G SystemWord-p. 10
5  Key issues
5.1  Key Issue #1: Efficient frequent small data transmissions
5.2  Key Issue #2: Integrity protection of small dataWord-p. 11
5.3  Key Issue #3: Encryption of small data
5.4  Key Issue #4: Signalling overload due to Malicious Applications on the UE
5.5  Key Issue #5: gNB Protection from CIoT DoS attack
5.6  Key issue #6: Avoiding AS security for application security enabled UEs.
5.7  Key Issue #7: Key refreshing for protection of small dataWord-p. 14
5.8  Key Issue #8: Key and mac size for protection of small data
5.9  Key Issue #9: Protection of NIDD interfacesWord-p. 15
5.10  Key issue #10: User Plane data transmission with Connectionless signalling.
5.11  Key Issue #11: Privacy protection of new parameters for CIoT included in NAS messageWord-p. 17
6  Solutions
6.1  Solution #1: Security Solution for small data transmission via NAS signaling
6.2  Solution #2: Efficient integrity protection for frequent small data transmissions
6.3  Solution #3: Security solution for MO SMS at AMF re-allocationWord-p. 20
6.4  Solution #4: Security solution for UL small data transfer in RRC Suspend and Resume with early data transmission (EDT)
6.5  Solution #5: Security solution for small data included in initial NAS signalling at mobility
6.6  Solution #6: Detecting and handling signalling overload due to Malicious Applications on the UE
6.7  Solution #7: Procedure for protecting gNB from RRC resume and RRC Re-establishment DoS attackWord-p. 30
6.8  Solution #8: Security solution for protection of interface used by NIDD procedures
6.9  Solution #9: Security protection of small data at idle mobilityWord-p. 33
6.10  Solution #10: Security solution for small data at idle mobility using the Registration Complete message
6.11  Solution #11: Security-Property-Group-based Mitigation for DDoS Attack Triggered by Malicious Applications on the UE
6.12  Solution #12: Security Solution on DDoS attack mitigation
6.13  Solution #13: Security solution for protection of interface used by NIDD proceduresWord-p. 40
6.14  Solution #14: Privacy protection of new parameters for CIoT included in NAS messagesUp
6.15  Solution #15: Efficient integrity protection for small data transmissions with immediate result
6.16  Solution #16: Solution to Identify Misbehaving UEs
6.17  Solution #17: Solution to Mitigate DDoS Attack based on RAN caused by Massive Number of Misbehaving CIoT UEs
6.18  Solution #18: Security solution for UL small data transfer in RRC Suspend and Resume with early data transmission (EDT)
6.19  Solution #19: Solution to Mitigate DDoS Attack on AMF caused by Massive Number of Misbehaving CIoT UEsWord-p. 48
7  Conclusions
A  Change historyWord-p. 51

Up   Top