Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.824  Word version:  17.0.0

Top   Top   Up   Prev   Next
1…   4…   5…   6.3…   7…

 

6.3  Solutions for protection of the F1*-U/C interfaces (wireless backhaul links)p. 19

6.3.1  Solution #3.1: F1 interface security for IABp. 19

6.3.1.1  Introductionp. 19

This solution addresses the key issue #3.1: F1 interface security for IAB.

6.3.1.2  Solution detailsp. 19

The control plane signalling between the IAB node and the IAB-donor node is confidentiality, integrity and replay protected in an end-to-end manner in the same way as the wireline fronthaul control (F1-C) protection using IPsec ESP and IKEv2 as specified in TS 33.501. Alternatively, the F1-C interface could be protected using DTLS. Figure 6.3.2-1 shows the protocol stack when IPsec is used for F1-C protection.
Copy of original 3GPP image for 3GPP TS 33.824, Fig. 6.3.2-1: F1-C protocol stack for IAB
Figure 6.3.2-1: F1-C protocol stack for IAB
(⇒ copy of original 3GPP image)
Up
The user plane traffic between the IAB node and the IAB-donor node is confidentiality, integrity and replay protected in an end-to-end manner in the same way as the wireline fronthaul user plane (F1-U) protection specified in TS 33.501. F1-U is used to transport traffic between UE and CU that is protected in PDCP layer as shown in Figure 6.3.1.2-2.
Copy of original 3GPP image for 3GPP TS 33.824, Fig. 6.3.1.2-2: F1-U protocol stack for IAB
Figure 6.3.1.2-2: F1-U protocol stack for IAB
(⇒ copy of original 3GPP image)
Up

6.3.1.3  Evaluationp. 20

The solution provides confidentiality and integrity protection of both control plane (i.e., F1-C) and user plane (i.e., F1-U) interfaces between the IAB node and IAB-donor, in an end-to-end manner. Therefore, the solution fulfils the potential security requirements of KI #3.1.
Furthermore, the solution allows to reuse the F1 security protocols for the wireline F1 interface as specified in TS 33.501. This simplifies the handling of the security in an environment that supports both wireline F1 interface and wireless F1 interface as the same security protocol is used for both interfaces.
Up

6.3.2  Solution #3.2: F1 security context establishmentp. 20

6.3.2.1  Introductionp. 20

This solution addresses the F1 security establishment requirements for IAB in key issue #3.1.

6.3.2.2  Solution detailsp. 21

IAB integration procedure consists of 3 phases [3].
  1. IAB-MT setup:
    The IAB-MT performs registration to the network as a UE and consequently, the AS security is established between the IAB-MT and IAB donor.
  2. Backhaul RLC channel establishment and routing update:
    If the IAB-MT is authorized to run as an IAB node based on the CN indication to the IAB donor, the backhaul RLC channels and the BAP layer are established and configured using the secure RRC signalling to support routing between the IAB node and the IAB donor.
  3. IAB-DU setup:
    F1 security establishment for IAB is performed over the RLC channel using the procedure specified in clause 9.8.2 of TS 33.501.
The first phase results in AS security establishment between the IAB donor and IAB node; and the third phase results in the establishment of secure F1 between the IAB donor and IAB node.
Up

6.3.2.3  Evaluationp. 21

This solution supports a mechanism to fulfil the security requirements of key issue #3.1.
This solution supports a unified F1 security context establishment procedure for both wireline and wireless F1 interfaces.

Up   Top   ToC