Tech-invite   3GPPspecs   Glossaries   IETFRFCs   Groups   SIP   ABNFs   Ti+   Search in Tech-invite

Top   in Index   Prev   Next

TR 33.863 (SA3)
Study on Battery efficient Security
for Very Low Throughput Machine Type Communication (MTC) Devices

3GPP‑Page   full‑ToC    
use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V14.2.0 (Wzip)  2017/06  109 p.


Rapporteur:  Mr. Evans, Tim P.
See also:

The present document's objectives are to:
  1. Investigate whether battery efficient 'device to enterprise' mechanisms to provide sufficient security exist.
  2. Investigate potential enhancements to 3GPP's security architecture(s) that enable the Home Operator to be able to offer well guaranteed security to enterprises e.g. to provide security between the UE and a node in the home operator domain.
  3. Both S1 and Gb based architectures should be considered when undertaking b, above.
The impacts of relevant authentication and key agreement procedures are also presented.

The following should be taken into account for the study:
  • The potential solutions should aim at minimising the energy consumption of devices to help meet the objective of a ten year battery life in the extended coverage situation and take into consideration the very low data rate capability of the radio interface when using the Energy Consumption Evaluation Methodology described in TS 45.820.

full Table of Contents for  TR 33.863  Word version:   14.2.0

 

Here   Top

 

1  ScopeWord-p. 8
2  References
3  Definitions, symbols and abbreviationsWord-p. 10
4  Background and key objectivesWord-p. 12
5  Key issuesWord-p. 16
6  Candidate solutions
6.0  General
6.1  Solution #1: "UE to HPLMN" security solutions based on UMTS/EPS AKA enhancements.
6.2  Solution #2: "End-to-middle security based on AKA"
6.3  Solution #3: "Independent VPLMN and e2m security associations"Up
6.4  Solution #4: "Security policies"
6.5  Solution #5: "End-to-end security solution"Word-p. 31
6.6  Solution #6: Bearer protection
6.7  Solution #X: "End-to-end" for solutions 1 and 2
6.8  Solution #8: Complete end to middle solutionWord-p. 34
6.9  Solution #9: Complete end to end solutionWord-p. 51
6.10  Solution #10: "AKA-based session key generation for application protocols"
6.11  Solution #11: A method for IoT service layer security bootstrapping solution
6.12  Solution #12: A method for IoT service layer security bootstrapping solution
7  ConclusionsWord-p. 82
A  AKA procedures assessment in very low data throughput environmentWord-p. 87
B  Review of security standardization efforts in other SDOsWord-p. 105
C  Proposed normative changesWord-p. 107
D  Change historyWord-p. 109

Up   Top