Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.821  Word version:  9.0.0

Top   Top   Up   Prev   Next
0…   4…   6…   8…

 

6  User Plane Securityp. 33

7  Control Plane Securityp. 35

7.1  MAC, RLC and RRC layer securityp. 35

7.2  SAE/LTE AKAp. 36

7.3  Security set-up procedurep. 47

7.4  Key handlingp. 51

7.4.1  UMTS AKAp. 51

7.4.2  Serving Network Authentication for LTEp. 51

7.4.3  Key derivationp. 55

7.4.4  Key management aspects for LTE/UMTS interworkingp. 56

7.4.5Void

7.4.6  Key identities in LTE/SAEp. 57

7.4.7  Hierarchy of user-related keys in SAE/LTEp. 59

7.4.8  Use of AMF for SAE bindingp. 66

7.4.9  Key handling on active to idle and idle to active transitions in SAEp. 68

7.4.10  Key handling on mobility within an SAE/LTE network and between two different SAE/LTE networksp. 69

7.4.11  K_eNB refresh at state transitionsp. 69

7.4.12  Key handling on idle mode mobilityp. 70

7.4.13  Key handling on active mode mobilityp. 75

7.4.14  Security algorithm negotiation and Security mode command in SAE/LTE networksp. 88

7.4.15  Key-change-on-the-flyp. 97

7.4.16  Independence of keys at different eNodeBsp. 99

7.5  START value transferp. 99

7.6  Security algorithmsp. 100

7.6.1  Choice of algorithmsp. 100

7.6.2  Terminal supportp. 101

7.6.3  Network supportp. 101

7.6.4  Algorithm inputp. 101

7.6.5  Algorithm IDs in EPSp. 105

7.6.6  KDF negotiationp. 106

7.7  Rationale for approach to security handling in inter-RAT mobility proceduresp. 112

7.8  Track of decisionp. 114


Up   Top   ToC