Tech-invite   3GPPspecs   Glossaries   IETFRFCs   Groups   SIP   ABNFs   Ti+   Search in Tech-invite

Top   in Index   Prev   Next

TR 33.969 (SA3)
Study on Security aspects
of Public Warning System (PWS)

3GPP‑Page   ETSI‑search   full‑ToC    
use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V15.0.0 (PDF)  2018/06  116 p.
V14.0.0  2017/03  … p.
V13.0.0  2016/01  118 p.
V12.0.0  2014/09  … p.

Rapporteur:  Mr. Mattsson, John
See also:

The present document studies security features and mechanisms for protection against false Base Stations broadcasting False Warning Notifications.

The default terminal behaviour is to accept all Warning Notifications even if their authenticity is unknown (i.e. no security protection). The default terminal behaviour is therefore open to the presentation of false Warning Notifications issued by false BSs even in countries without a Public Warning System (PWS) deployed.

Examples of false BS risks include, but are not limited to:
  • False Warning Notifications to induce panic;
  • Abuse of warning system broadcast channel to send advertising / spam.

full Table of Contents for  TR 33.969  Word version:   15.0.0


Here   Top


1  ScopeWord-p. 8
2  ReferencesWord-p. 9
3  AbbreviationsWord-p. 10
4  Recommendations on security requirements of PWSWord-p. 12
5  System architecture of PWSWord-p. 13
6  Security features of PWSWord-p. 14
6.1  PWS threats and analysis
6.2  Proposed security features of PWS
7  Possible Security solutions of PWS
7.0  General
7.3  Solution 3: NAS based solutionWord-p. 35
7.4  Solution 4: GBA based protectionWord-p. 49
7.5  Solution 5: using NAS layer securityWord-p. 56
7.6  Solution 6: implicit certificate PKI based PWS solutionWord-p. 59
7.7  Solution 7: generalized certificate-based approach for PWSWord-p. 71
7.8  Solution 8: national PWS solution based on UICC OTAWord-p. 78
7.9  Solutions to counter the PWS Security circumvention attack and to mitigate the risk of displaying false unprotected warning messagesWord-p. 81
7.10  The use of signing proxiesWord-p. 85
8  Evaluation of different solutionsWord-p. 88
9  Key issues for establishing service requirements and designing a PWS security systemWord-p. 100
10  ConclusionWord-p. 101
A  Archived solutionsWord-p. 102
B  Threat discussion depending on the PWS settings in the UE relating to roamingWord-p. 112
C  Change historyWord-p. 116

Up   Top