Tech-invite  3GPPspecsRELsGlossariesSIP

Top   in Index   Prev   Next

TR 33.868SA3
Study on Security aspects of
Machine-Type Communications (MTC)
and other Mobile Data Applications Communications enhancements

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V12.1.0 (Wzip)  2014/06  116 p.

Rapporteur:  Mr. Rajadurai, Rajavelsamy

This TR studies the security aspects of System Improvements for Machine Type Communication. In particular, the goals of the present document are:
  • To identify and analyze the threats to the MTC system within the scope of the service requirements, functionality and use cases as specified in TS 22.368.
  • To identify possible security and privacy impacts induced by the system architecture improvement for machine type communications based on TR 23.887 and TS 23.682.
  • To determine possible security requirements based on the analysis above and describe the possible solutions to meet those requirements.
Machine-type communication aspects of (x)SIMs and/or new models for the management of (x)SIM are out of scope of the present document.

full Table of Contents for  TR 33.868  Word version:   12.1.0

Here   Top
1  ScopeWord-p. 8
2  References
3  Definitions and abbreviationsWord-p. 10
4  Overview of Security ArchitectureWord-p. 13
5  Description of envisioned security aspects of Machine-Type and other Mobile Data Applications Communications EnhancementsWord-p. 15
5.1  Device Triggering Enhancements
5.2  Secure ConnectionWord-p. 32
5.3  External Interface SecurityWord-p. 40
5.4  Restricting the USIM to specific UEs
5.5  Privacy concernUp
5.6  UE Power Consumption Optimizations
5.7  Security of Small Data TransmissionWord-p. 71
5.7.1  Issue Details
5.7.2  Threats
5.7.3  Security requirementsWord-p. 74
5.7.4  SolutionsWord-p. 75  Small data transfer in NAS PDU  Small Data Fast Path in User PlaneWord-p. 78  Connectionless Data Transmission solution  MTC-IWF based Secure Solution for Small data transmissionWord-p. 93  Connectionless Data Transmission Solution Using Separate Security ContextWord-p. 100
5.7.6  EvaluationWord-p. 104
6  General Security RequirementWord-p. 109
7  Conclusions
A  Key Issues and Solutions deferred from Rel-12Word-p. 110
B  Change historyWord-p. 119

Up   Top