| 7.1 | Solution #1: Signalling protection and authentication procedure for MCPTT services p. 26
|
| 7.2 | Solution #2: MCPTT User authentication and registration based on OpenID Connect p. 28
| 7.2.0 | Introduction p. 28
|
| 7.2.1 | OpenID Connect (OIDC) p. 30
| 7.2.1.0 | General p. 30
|
| 7.2.1.1 | OpenID Connect Authorization Code flow using Proof Key for Code Exchange p. 30
|
|
| 7.2.2 | Detailed flow for MCPTT User Authentication and Registration using OpenID Connect p. 31
|
|
| 7.3 | Solution #3: Addition of KMS function and interfaces p. 32
| 7.3.1 | General p. 32
|
| 7.3.2 | Functional model for the MCPTT KMS p. 32
| 7.3.2.0 | Introduction p. 32
|
| 7.3.2.1 | Reference point CSC-8 (between key management client and key management server) p. 33
|
| 7.3.2.2 | Reference point CSC-9 (between the key management server and the MCPTT Server) p. 33
|
| 7.3.2.3 | Reference point CSC-10 (between the key management server and a group management server) p. 33
|
|
| 7.3.3 | Security Procedures p. 33
|
| 7.3.4 | Key material provisioned to support Solution #4 and #5 p. 34
|
|
| 7.4 | Solution #4: Distribution of a group security context p. 35
| 7.4.1 | General p. 35
|
| 7.4.2 | Security procedures for GMK provisioning p. 36
|
| 7.4.3 | Group keying for media protection and floor control p. 37
|
| 7.4.4 | Group creation procedure p. 38
|
| 7.4.5 | Dynamic Group Keying p. 38
| 7.4.5.1 | General p. 38
|
| 7.4.5.2 | Group regrouping procedures (within a single MCPTT system) p. 38
|
| 7.4.5.3 | Group regrouping procedures (involving multiple MCPTT systems) p. 38
|
|
| 7.4.6 | Derivation of SRTP/SRTCP master keys p. 39
|
|
| 7.5 | Solution #5: Private call security p. 40
| 7.5.1 | General p. 40
|
| 7.5.2 | Security procedures (on-network) p. 41
|
| 7.5.3 | Off-network security procedures p. 42
|
| 7.5.4 | Media stream protection p. 43
|
|
| 7.6 | Solution #6: End-to-end protection for private call in on-network p. 44
| 7.6.1 | General p. 44
|
| 7.6.2 | End-to-end protection using SDES p. 44
|
| 7.6.3 | End-to-access edge using SDES p. 46
|
| 7.6.4 | End-to-end protection using KMS p. 46
|
| 7.6.5 | Feasibility analysis of SDES and KMS mechanism p. 47
| 7.6.5.1 | SDES and KMS mechanisms p. 47
|
| 7.6.5.2 | MCPTT media plane security p. 47
|
| 7.6.5.3 | Feasibility of SDES and KMS p. 48
|
| 7.6.5.4 | Conclusion p. 48
|
|
|
| 7.7 | Solution #7: Media stream protection p. 48
| 7.7.1 | General p. 48
|
| 7.7.2 | Security procedures for media stream protection p. 49
|
|
| 7.8 | Solution #8: Protection of floor control signalling (SRTCP) p. 50
| 7.8.1 | General p. 50
|
| 7.8.3 | Floor control protection (SRTCP) p. 50
|
| 7.8.4 | Security procedures for floor control protection p. 51
|
|
| 7.9 | Solution #9: GCSE based security for MCPTT service p. 52
| 7.9.1 | Introduction p. 52
|
| 7.9.2 | Potential GCSE based security solutions for MCPTT p. 52
| 7.9.2.0 | Introduction p. 52
|
| 7.9.2.1 | Security for unicast delivery mode p. 52
|
| 7.9.2.2 | Security for multicast delivery mode p. 52
|
|
|
| 7.10 | Solution #10: Inter/Intra domain protection for MCPTT service p. 53
|
| 7.11 | Solution #11: HTTP-1 interface protection p. 53
| 7.11.1 | General p. 53
|
| 7.11.2 | Authentication for Common Service Core (CSC) access p. 53
|
| 7.11.3 | HTTP-1 interface security p. 53
|
|
| 7.12 | Solution #12: Using S/MIME to protect MCPTT Application plane messaging in SIP messages p. 54
| 7.12.1 | General p. 54
|
| 7.12.2 | Cryptographic Message Syntax (CMS) p. 54
|
| 7.12.3 | S/MIME p. 55
|
| 7.12.4 | Confidentiality and integrity protection of MCPTT application information using asymmetric keys p. 55
|
| 7.12.5 | Confidentiality protection of MCPTT application information p. 58
|
|
| 7.13 | Solution #13: KMS managed Content Encryption Key (CEK) for S/MIME p. 58
| 7.13.0 | Introduction p. 58
|
| 7.13.1 | Authorizing the distribution of the Content Encryption Key (CEK) p. 58
|
| 7.13.2 | Creation and distribution of the Content Encryption Key (CEK) p. 58
|
| 7.13.3 | Key management of the Content Encryption Key (CEK) p. 60
|
|
| 7.14 | Solution #14: Identity based cryptography managed Content Encryption Key (CEK) for S/MIME p. 63
| 7.14.0 | Introduction p. 63
|
| 7.14.1 | Authorizing the distribution of the Content Encryption Key (CEK) p. 63
|
| 7.14.2 | Creation and distribution of the Content Encryption Key (CEK) p. 63
|
| 7.14.3 | Key management of the Content Encryption Key (CEK) p. 63
|
| 7.14.4 | Transfer of the Content Encryption Key (CEK) p. 64
|
|
| 7.15 | Solution #15: Using content indirection and XCAP to hide MCPTT sensitive application information in SIP messages p. 65
|
| 7.16 | Solution #16: Protecting the location object p. 68
| 7.16.1 | General p. 68
|
| 7.16.2 | Cryptographic Message Syntax (CMS) p. 68
|
| 7.16.3 | MCPTT client signing and encrypting the location object p. 69
|
| 7.16.4 | MCPTT server retrieving the location object p. 70
|
|
| 7.17 | Solution #17: Protection of sensitive application data based on xmlsec p. 71
| 7.17.1 | General p. 71
|
| 7.17.2 | Protected content p. 71
|
| 7.17.3 | Key agreement p. 72
|
| 7.17.3a | Confidentiality protection using XML encryption (xmlenc) p. 72
|
| 7.17.4 | Integrity protection using XML signature (xmlsig) p. 72
|
| 7.17.5 | Calculation of keys for application data protection p. 73
|
|