Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.891
Study on Security of Phase 2 for
Uncrewed Aerial System (UAS),
Uncrewed Aerial Vehicle (UAV) and
Urban Air Mobility (UAM)

V18.0.0 (Wzip)  2023/03  22 p.
Rapporteur:
Dr. Escott, Adrian
Qualcomm CDMA Technologies

full Table of Contents for  TR 33.891  Word version:  18.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 7
2References  p. 7
3Definitions of terms, symbols and abbreviations  p. 7
3.1Terms  p. 7
3.2Symbols  p. 7
3.3Abbreviations  p. 8
4Overview  p. 8
5Key Issues  p. 8
5.1Key issue #1: Direct C2 Security  p. 8
5.1.1Key issue details  p. 8
5.1.2Security threats  p. 8
5.1.3Potential security requirements  p. 9
5.2Key issue #2: Security of DAA unicast connection  p. 9
5.2.1Key issue details  p. 9
5.2.2Security threats  p. 9
5.2.3Potential security requirements  p. 9
5.3Key issue #3: Direct C2 Authorization  p. 9
5.3.1Key issue details  p. 9
5.3.2Security threats  p. 9
5.3.3Potential security requirement  p. 10
5.4Key issue #4: UAV/UAV-C Privacy over PC5 link for C2  p. 10
5.4.1Key issue details  p. 10
5.4.2Security threats  p. 10
5.4.3Potential security requirement  p. 10
5.5Key issue #5: Privacy protection over PC5 for DAA unicast messages  p. 10
5.5.1Key issue details  p. 10
5.5.2Security threats  p. 11
5.5.3Potential security requirements  p. 11
5.6Key issue #6: Privacy and security aspects of broadcast DAA traffic  p. 11
5.6.1Key Issue Details  p. 11
5.6.2Security Threats  p. 11
5.6.3Potential Security Requirements  p. 11
5.7Key issue #7: Privacy and security aspects of Broadcast Remote ID  p. 11
5.7.1Key Issue Details  p. 11
5.7.2Security Threats  p. 11
5.7.3Potential Security Requirements  p. 11
6Solutions  p. 12
6.1Solution #1: Security establishment and link security protection of unicast PC5 communication  p. 12
6.1.1Introduction  p. 12
6.1.2Solution details  p. 12
6.1.3Evaluation  p. 12
6.2Solution #2: Solution to secure direct C2 and DAA connection  p. 13
6.2.1Introduction  p. 13
6.2.2Solution details  p. 13
6.2.3Evaluation  p. 15
6.3Solution #3: C2 and DAA unicast security using V2X unicast solution  p. 15
6.3.1Introduction  p. 15
6.3.2Solution details  p. 16
6.3.3Evaluation  p. 16
6.4Solution #4: Direct C2 communication over PC5 security  p. 16
6.4.1Introduction  p. 16
6.4.2Solution details  p. 17
6.4.3Evaluation  p. 18
6.5Solution #5: Restricted Discovery for Direct C2  p. 18
6.5.1Introduction  p. 18
6.5.2Solution details  p. 18
6.5.3Evaluation  p. 19
6.6Solution #6: Privacy for 3GPP identifiers used to transport DAA traffic  p. 19
6.6.1Introduction  p. 19
6.6.2Solution details  p. 19
6.6.3Evaluation  p. 19
6.7Solution #7: Privacy for 3GPP identifiers used to transport Broadcast Remote ID  p. 19
6.7.1Introduction  p. 19
6.7.2Solution details  p. 20
6.7.3Evaluation  p. 20
7Conclusions  p. 20
7.1Conclusion for Key issue #1  p. 20
7.2Conclusion for Key issue #2  p. 20
7.3Conclusion for Key issue #3  p. 20
7.4Conclusion for Key issue #4  p. 21
7.5Conclusion for Key Issue #5  p. 21
7.6Conclusion for Key Issue #6  p. 21
7.7Conclusion for Key Issue #7  p. 21
$Change history  p. 22

Up   Top