Tech-invite3GPPspecsSIPRFCs
Overview21222324252627282931323334353637384‑5x

3GPP 33-series — Security aspects

33.1…   33.2…   33.3…   33.4…   33.5…   33.8…   33.9…


TS 33.102
REL  3 → 16
3G security – Security architecture

TS 33.103
REL  3 → 4
3G security – Integration Guidelines

TS 33.105
REL  3 → 16
3G security – Cryptographic Algorithm Requirements

Lawful Interception – Legacy Systems, up to EPS


TS 33.110
REL  7 → 16
Key Establishment
between a UICC and a Terminal

TS 33.116
REL  14 → 16
Security Assurance Specification (SCAS)
for the MME Network Product Class

TS 33.117
REL  14 → 16
Catalogue of General Security Assurance Requirements

TS 33.120
REL  3 → 4
Security Objectives and Principles

TS 33.122
REL  15 → 16
Security Aspects of
Common API Framework (CAPIF)
for 3GPP Northbound APIs

Lawful Interception – 5GS/EPS


TS 33.141
REL  6 → 16
Presence Service Security

TS 33.163
REL  15 → 16
Battery Efficient Security
for Very Low Throughput MTC Devices

TS 33.179
SA3REL  13
Security of Mission Critical Push To Talk (MCPTT) over LTE

TS 33.180
REL  14 → 16
Security of the Mission Critical Service

TS 33.185
REL  14 → 16
Security aspect for LTE Support of V2X services

TS 33.187
REL  12 → 16
Security aspects of MTC
and other Mobile Data Applications Communications Enhancements

Up

TS 33.200
REL  4 → 6
NDS — MAP Application Layer Security

TS 33.203
REL  5 → 16
Access Security for IP-based Services

TS 33.204
REL  7 → 16
NDS — TCAP User Security

TS 33.210
REL  5 → 16
NDS — IP Network Layer Security

TS 33.216
REL  15 → 16
Security Assurance Specification (SCAS)
for eNB Network Product Class

TS 33.220
REL  6 → 16
GAA — GBA: Generic Bootstrapping Architecture

TS 33.221
REL  6 → 16
GAA — Support for Subscriber Certificates

TS 33.222
REL  6 → 16
GAA — Access to NAFs using HTTPS

TS 33.223
REL  8 → 16
GAA — GBA Push function

TS 33.224
REL  9 → 16
GAA — Generic Push layer

TS 33.234
REL  6 → 16
I-WLAN Security

TS 33.246
REL  7 → 16
MBMS Security

TS 33.250
REL  14 → 16
Security Assurance Specification
for PGW Network Product Class

TS 33.259
REL  7 → 16
Key Establishment
between a UICC Hosting Device
and a Remote Device

Up

TS 33.303
REL  12 → 16
Proximity-based Services (ProSe) –
Security aspects

TS 33.310
REL  6 → 16
NDS — Authentication Framework

TS 33.320
REL  9 → 16
Security of HNB / HeNB

TS 33.328
REL  9 → 16
IMS Media Plane Security

Up

TS 33.401
REL  8 → 16
SAE — Security Architecture

TS 33.402
REL  8 → 16
SAE — Security aspects of non-3GPP Accesses

TS 33.434
REL  16 New 
Security aspects of Service Enabler Architecture Layer (SEAL) for verticals

Up

TS 33.501
REL  15 → 16
Security Architecture and Procedures for 5G System

TS 33.511
REL  16
Security Assurance Specification (SCAS)
for the Next Generation Node B (gNodeB) Network Product Class

TS 33.512
REL  16
5G Security Assurance Specification (SCAS) –
Access and Mobility management Function (AMF)

TS 33.513
REL  16
5G Security Assurance Specification (SCAS) –
User Plane Function (UPF)

TS 33.514
REL  16
5G Security Assurance Specification (SCAS)
for the Unified Data Management (UDM) Network Product Class

TS 33.515
REL  16
5G Security Assurance Specification (SCAS) –
Session Management Function (SMF)

TS 33.516
REL  16
5G Security Assurance Specification (SCAS) –
Authentication Server Function (AUSF)

TS 33.517
REL  16
5G Security Assurance Specification (SCAS)
for the Security Edge Protection Proxy (SEPP) Network Product Class

TS 33.518
REL  16
5G Security Assurance Specification (SCAS)
for the Network Repository Function (NRF) Network Product Class

TS 33.519
REL  16
5G Security Assurance Specification (SCAS)
for the Network Exposure Function (NEF) Network Product Class

TS 33.535
REL  16 New 
Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)

TS 33.536
REL  16 New 
Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services

Up

TR 33.803
REL  7
Coexistence between TISPAN
and 3GPP Authentication Schemes

TR 33.804
REL  11 → 12
Single Sign On (SSO) Application Security
for Common IMS based on SIP Digest

TR 33.805
REL  12
Study on Security Assurance Methodology
for 3GPP Network Products

TR 33.807
REL  16
Study on the Security
of the Wireless and Wireline Convergence
for the 5G System Architecture

TR 33.810
REL  6
Feasibility Study to support NDS/IP Evolution

TR 33.811
REL  15
Study on Security aspects
of 5G Network Slicing Management

TR 33.812
REL  9
Feasibility Study on Remote Management
of USIM Application on M2M Equipment

TR 33.813
REL  16 New 
Study on Security aspects of Network Slicing enhancement

TR 33.814
REL  16
Study on the Security of the enhancement
to the 5GC Location Services (LCS)

TR 33.815
REL  16
Study on Security aspects
of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS)

TR 33.816
REL  10
Feasibility Study on LTE Relay Node Security

TR 33.817
REL  6
Feasibility Study on (U)SIM Security Reuse
by Peripheral Devices on Local Interfaces

TR 33.819
REL  16
Study on Security enhancements of 5GS
for Vertical and Local Area Network (LAN) Services

TR 33.820
REL  8
Security of H(e)NB

TR 33.821
REL  8 → 9
Rationale and Track of Security Decisions
in LTE RAN / 3GPP SAE

TR 33.822
REL  8
Security aspects for inter-Access Mobility
between non 3GPP and 3GPP Access Network

TR 33.823
REL  12
Security for Usage of GBA with a UE Browser

TR 33.825
REL  16
Study on the Security
of Ultra-Reliable Low-Latency Communication (URLLC) for 5GS

TR 33.827
REL  14
Study on providing for Lawful Interception (LI)
in the S8 Home Routeing (S8HR) Architecture
for Voice over LTE (VoLTE)

TR 33.828
REL  9 → 11
IMS Media Plane Security

TR 33.829
REL  12
IMS Media Plane Security Services

TR 33.831
REL  12
Study on Security on Spoofed Call Detection and Prevention

TR 33.833
REL  13
Study on Security issues to support Proximity Services (ProSe)

TR 33.834
REL  16
Study on Long Term Key Update Procedures (LTKUP)

TR 33.835
REL  16
Study on Authentication and Key Management
for Applications based on 3GPP Credential in 5G

TR 33.836
REL  16 New 
Study on Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X)

TR 33.838
REL  11
Study on Protection against Unsolicited Communication for IMS (PUCI)

TR 33.841
REL  16
Study on the support of 256-bit Algorithms for 5G

TR 33.843
REL  15
Study on Security aspect of Architecture enhancements
to ProSe UE-to-Network Relay

TR 33.844
REL  11
Security Study on IMS Based Peer-to-Peer Content Distribution Services

TR 33.849
REL  14
Study on Subscriber Privacy impact in 3GPP

TR 33.855
REL  16 New 
Study on Security aspects of the 5G Service Based Architecture (SBA)

TR 33.856
REL  16
Study on Security aspects
of Single Radio Voice Continuity from 5G to UTRAN

TR 33.859
REL  11
Study on the Introduction of Key Hierarchy in UTRAN

TR 33.860
REL  13
Study on enhanced General Packet Radio Service (EGPRS) Access Security enhancements
with relation to Cellular Internet of Things (IoT)

TR 33.861
REL  16 New 
Study on evolution of Cellular Internet of Things (CIoT) Security for the 5G System

TR 33.863
REL  14
Study on Battery efficient Security
for Very Low Throughput Machine Type Communication (MTC) Devices

TR 33.868
REL  12
Study on Security aspects of MTC
and other Mobile Data Applications Communications enhancements

TR 33.871
REL  12
Study on Security for WebRTC IMS Client Access to IMS

TR 33.872
REL  13
Study on Security enhancements
to Web Real Time Communication (WebRTC) Access to IMS

TR 33.879
REL  13
Study on Security enhancements
for Mission Critical Push To Talk (MCPTT) over LTE

TR 33.880
REL  15
Study on Mission Critical Security enhancements

TR 33.885
REL  14
Study on Security aspects
for LTE support of V2X Services

TR 33.888
REL  12
Study on Security issues
to support Group Communication System Enablers (GCSE) for LTE

TR 33.889
REL  13
Study on Security aspects
of Machine-Type Communications (MTC) Architecture and Feature enhancements

TR 33.897
REL  13
Study on Isolated E-UTRAN operation
for Public Safety – Security aspects

Up

TR 33.901
REL  3 → 4
Criteria for cryptographic Algorithm design process

TR 33.902
REL  3 → 4
Formal Analysis of the 3G Authentication Protocol

TR 33.905
REL  7 → 16
Recommendations for Trusted Open Platforms

TR 33.908
REL  3 → 4
Report on design, specification and evaluation of 3GPP confidentiality and integrity algorithms

TR 33.909
REL  4
Report on the design and evaluation of the MILENAGE algorithm set

TR 33.916
REL  14 → 16
Security Assurance Methodology for 3GPP network products

TR 33.918
REL  7
GAA — Early implementation of HTTPS connection between a UICC and a NAF

TR 33.919
REL  6 → 16
GAA — System description

TR 33.920
REL  7
SIM Card based GBA — Early implementation feature

TR 33.924
REL  9 → 16
Identity management and GAA interworking

TR 33.926
REL  13 → 16
Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes

TR 33.935
REL  16 New 
Study on detailed Long Term Key Update Process (LTKUP) detailed solutions

TR 33.937
REL  9 → 16
Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI)

TR 33.969
REL  12 → 16
Study on security aspects of Public Warning System (PWS)

TR 33.978
REL  6 → 7
Security aspects of early IMS

TR 33.980
REL  7 → 16
Liberty Alliance ID-FF, ID-WSF and GAA

TR 33.995
REL  13 → 16
Study on Security aspects of integration of Single Sign-On (SSO) frameworks with 3GPP operator-controlled resources and mechanisms

Up