Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.879
Study on Security enhancements for
Mission Critical Push To Talk (MCPTT) over LTE

V13.1.0 (Wzip)  2016/06  88 p.
Rapporteur:
Mr. Haigh, Peter
CESG

full Table of Contents for  TR 33.879  Word version:  13.1.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 8
2References  p. 8
3Definitions and abbreviations  p. 9
3.1Definitions  p. 9
3.2Abbreviations  p. 10
4Overview of Mission Critical Push-to-Talk (MCPTT)  p. 10
4.1Introduction  p. 10
4.2Architecture  p. 11
4.2.1General  p. 11
4.2.2MCPTT application plane  p. 11
4.2.3MCPTT signalling plane  p. 13
4.2.4Off-network functional model  p. 14
4.3MCPTT identity definition and usage  p. 14
5List of assets  p. 14
6Security analysis of MCPTT  p. 15
6.1General security requirements  p. 15
6.2Key Issue # 1: Configuration & service access  p. 15
6.2.1Issue details  p. 15
6.2.2Security threats  p. 15
6.2.3Potential security requirements  p. 16
6.3Key Issue # 2: Group Key Management  p. 16
6.3.1Issue details  p. 16
6.3.2Security threats  p. 16
6.3.3Potential security requirements  p. 16
6.4Key Issue # 3: On-Network Operation: denial of service  p. 17
6.4.1Issue details  p. 17
6.4.2Security threats  p. 17
6.4.3Potential security requirements  p. 17
6.5Key Issue # 4: Ambient Listening  p. 17
6.5.1Key issue details  p. 17
6.5.2Security threats  p. 18
6.5.3Potential security requirements  p. 18
6.6Key Issue # 5: Data communication security between MCPTT network entities  p. 18
6.6.1Issue details  p. 18
6.6.2Security threats  p. 18
6.6.3Potential security requirements  p. 18
6.7Key Issue # 6: On-Network Operation: impersonation  p. 18
6.7.1Issue details  p. 18
6.7.2Security threats  p. 19
6.7.3Potential security requirements  p. 19
6.8Key Issue # 7: On-Network Operation: manipulation  p. 19
6.8.1Issue details  p. 19
6.8.2Security threats  p. 19
6.8.3Potential security requirements  p. 19
6.9Key Issue # 8: On-network operation: traffic analysis  p. 20
6.9.1Issue details  p. 20
6.9.2Security threats  p. 20
6.9.3Potential security requirements  p. 20
6.10Key Issue # 9: On-network operation: interception of user traffic  p. 20
6.10.1Issue details  p. 20
6.10.2Security threats  p. 20
6.10.3Potential security requirements  p. 21
6.11Key Issue # 10: Key Stream Re-use  p. 21
6.11.1Key issue details  p. 21
6.11.2Security threats  p. 21
6.11.3Potential security requirements  p. 21
6.12Key Issue # 11: Late Entry to Group Communication  p. 22
6.12.1Issue details  p. 22
6.12.2Security threats  p. 22
6.12.3Potential security requirements  p. 22
6.13Key Issue # 12: Private Call Confidentiality  p. 22
6.13.1Issue details  p. 22
6.13.2Security threats  p. 22
6.13.3Potential security requirements  p. 23
6.14Key Issue # 13: Off-network operation: denial of service  p. 23
6.14.1Issue details  p. 23
6.14.2Security threats  p. 23
6.14.3Potential security requirements  p. 23
6.15Key Issue # 14: Off-Network Operation: interception of user traffic  p. 23
6.15.1Issue details  p. 23
6.15.2Security threats  p. 23
6.15.3Potential security requirements  p. 23
6.16Key Issue # 15: Off-network operation: impersonation  p. 24
6.16.1Issue details  p. 24
6.16.2Security threats  p. 24
6.16.3Potential security requirements  p. 24
6.17Key Issue # 16: Off-network operation: manipulation  p. 24
6.17.1Issue details  p. 24
6.17.2Security threats  p. 24
6.17.3Potential security requirements  p. 24
6.18Key Issue # 17: Off-network operation: traffic analysis  p. 25
6.18.1Issue details  p. 25
6.18.2Security threats  p. 25
6.18.3Potential security requirements  p. 25
6.19Key Issue #18: Privacy of MCPTT identities  p. 25
6.19.1Issue details  p. 25
6.19.2Security threats  p. 25
6.19.3Potential security requirements  p. 26
7Proposed Solutions  p. 26
7.1Solution #1: Signalling protection and authentication procedure for MCPTT services  p. 26
7.2Solution #2: MCPTT User authentication and registration based on OpenID Connect  p. 28
7.2.0Introduction  p. 28
7.2.1OpenID Connect (OIDC)  p. 30
7.2.1.0General  p. 30
7.2.1.1OpenID Connect Authorization Code flow using Proof Key for Code Exchange  p. 30
7.2.2Detailed flow for MCPTT User Authentication and Registration using OpenID Connect  p. 31
7.3Solution #3: Addition of KMS function and interfaces  p. 32
7.3.1General  p. 32
7.3.2Functional model for the MCPTT KMS  p. 32
7.3.2.0Introduction  p. 32
7.3.2.1Reference point CSC-8 (between key management client and key management server)  p. 33
7.3.2.2Reference point CSC-9 (between the key management server and the MCPTT Server)  p. 33
7.3.2.3Reference point CSC-10 (between the key management server and a group management server)  p. 33
7.3.3Security Procedures  p. 33
7.3.4Key material provisioned to support Solution #4 and #5  p. 34
7.4Solution #4: Distribution of a group security context  p. 35
7.4.1General  p. 35
7.4.2Security procedures for GMK provisioning  p. 36
7.4.3Group keying for media protection and floor control  p. 37
7.4.4Group creation procedure  p. 38
7.4.5Dynamic Group Keying  p. 38
7.4.5.1General  p. 38
7.4.5.2Group regrouping procedures (within a single MCPTT system)  p. 38
7.4.5.3Group regrouping procedures (involving multiple MCPTT systems)  p. 38
7.4.6Derivation of SRTP/SRTCP master keys  p. 39
7.5Solution #5: Private call security  p. 40
7.5.1General  p. 40
7.5.2Security procedures (on-network)  p. 41
7.5.3Off-network security procedures  p. 42
7.5.4Media stream protection  p. 43
7.6Solution #6: End-to-end protection for private call in on-network  p. 44
7.6.1General  p. 44
7.6.2End-to-end protection using SDES  p. 44
7.6.3End-to-access edge using SDES  p. 46
7.6.4End-to-end protection using KMS  p. 46
7.6.5Feasibility analysis of SDES and KMS mechanism  p. 47
7.6.5.1SDES and KMS mechanisms  p. 47
7.6.5.2MCPTT media plane security  p. 47
7.6.5.3Feasibility of SDES and KMS  p. 48
7.6.5.4Conclusion  p. 48
7.7Solution #7: Media stream protection  p. 48
7.7.1General  p. 48
7.7.2Security procedures for media stream protection  p. 49
7.8Solution #8: Protection of floor control signalling (SRTCP)  p. 50
7.8.1General  p. 50
7.8.3Floor control protection (SRTCP)  p. 50
7.8.4Security procedures for floor control protection  p. 51
7.9Solution #9: GCSE based security for MCPTT service  p. 52
7.9.1Introduction  p. 52
7.9.2Potential GCSE based security solutions for MCPTT  p. 52
7.9.2.0Introduction  p. 52
7.9.2.1Security for unicast delivery mode  p. 52
7.9.2.2Security for multicast delivery mode  p. 52
7.10Solution #10: Inter/Intra domain protection for MCPTT service  p. 53
7.11Solution #11: HTTP-1 interface protection  p. 53
7.11.1General  p. 53
7.11.2Authentication for Common Service Core (CSC) access  p. 53
7.11.3HTTP-1 interface security  p. 53
7.12Solution #12: Using S/MIME to protect MCPTT Application plane messaging in SIP messages  p. 54
7.12.1General  p. 54
7.12.2Cryptographic Message Syntax (CMS)  p. 54
7.12.3S/MIME  p. 55
7.12.4Confidentiality and integrity protection of MCPTT application information using asymmetric keys  p. 55
7.12.5Confidentiality protection of MCPTT application information  p. 58
7.13Solution #13: KMS managed Content Encryption Key (CEK) for S/MIME  p. 58
7.13.0Introduction  p. 58
7.13.1Authorizing the distribution of the Content Encryption Key (CEK)  p. 58
7.13.2Creation and distribution of the Content Encryption Key (CEK)  p. 58
7.13.3Key management of the Content Encryption Key (CEK)  p. 60
7.14Solution #14: Identity based cryptography managed Content Encryption Key (CEK) for S/MIME  p. 63
7.14.0Introduction  p. 63
7.14.1Authorizing the distribution of the Content Encryption Key (CEK)  p. 63
7.14.2Creation and distribution of the Content Encryption Key (CEK)  p. 63
7.14.3Key management of the Content Encryption Key (CEK)  p. 63
7.14.4Transfer of the Content Encryption Key (CEK)  p. 64
7.15Solution #15: Using content indirection and XCAP to hide MCPTT sensitive application information in SIP messages  p. 65
7.15.1General  p. 65
7.15.2Content indirection  p. 66
7.15.3XCAP URIs  p. 67
7.15.4Contact list organisation  p. 67
7.16Solution #16: Protecting the location object  p. 68
7.16.1General  p. 68
7.16.2Cryptographic Message Syntax (CMS)  p. 68
7.16.3MCPTT client signing and encrypting the location object  p. 69
7.16.4MCPTT server retrieving the location object  p. 70
7.17Solution #17: Protection of sensitive application data based on xmlsec  p. 71
7.17.1General  p. 71
7.17.2Protected content  p. 71
7.17.3Key agreement  p. 72
7.17.3aConfidentiality protection using XML encryption (xmlenc)  p. 72
7.17.4Integrity protection using XML signature (xmlsig)  p. 72
7.17.5Calculation of keys for application data protection  p. 73
8Evaluation of solutions  p. 73
8.1Signaling protection and IMS authentication  p. 74
8.1.0Introduction  p. 74
8.1.0aPotential requirements relating to application layer security  p. 74
8.1.1S/MIME CEK Key management  p. 74
8.1.2Evaluation of sensitive application signalling  p. 75
8.2MCPTT User authentication and authorisation  p. 75
8.2.1Introduction  p. 75
8.2.2MCPTT requirements relating to user authentication and authorisation  p. 76
8.2.3Evaluation of user authentication and authorisation solutions  p. 76
8.3Group call key distribution solutions  p. 77
8.3.1General  p. 77
8.3.2Potential requirements relating to group call security  p. 77
8.3.3Evaluation of solution #4 against requirements  p. 77
8.3.4System impact evaluation  p. 78
8.3.5Summary of evaluation  p. 78
8.4Private call key distribution solutions  p. 78
8.4.1General  p. 78
8.4.2Potential requirements relating to private call security  p. 79
8.4.3Evaluation of key distribution solutions against requirements  p. 79
8.4.4System impact evaluation  p. 81
8.4.5Summary of evaluation  p. 81
8.5Media and floor control protection  p. 81
8.5.1General  p. 81
8.5.2Potential sequirements relating to media and floor control  p. 81
8.5.3Comparison of solutions  p. 82
8.5.4Choice of algorithm  p. 82
8.5.5Summary of evaluation  p. 82
9Conclusion  p. 82
9.1Signaling protection and IMS authentication  p. 83
9.1.0Introduction  p. 83
9.1.1S/MIME CEK key management  p. 83
9.1.2Sensitive application signalling protection  p. 83
9.2MCPTT User authentication and registration  p. 83
9.3Group call key distribution solutions  p. 83
9.4Private call key distribution solutions  p. 83
9.5Media and floor control protection  p. 83
AAuthentication call-flows  p. 84
A.1MCPTT service authentication call-flow example-1  p. 84
A.2MCPTT service authentication call-flow example-2  p. 86
$Change History  p. 88

Up   Top