Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.833  Word version:  13.0.0

Top   Top   Up   Prev   Next
1…   4…   7…   A…

 

4  Proximity Services (ProSe)p. 17

5  Key Issues for Rel-12p. 23

5.1  Key Issues on Configurationp. 23

5.2  Key Issues on Discoveryp. 25

5.3  Key Issues on One-to-many communicationsp. 29

5.4  Key Issues on other areasp. 32

6  Solutions for Rel-12p. 36

6.1  Solutions for configuration data transferp. 36

6.2  Solutions for Discoveryp. 40

6.2.1  Solution #2.1: Security for ProSe discoveryp. 40

6.2.2  Solution #2.2:Security for Direct Discoveryp. 42

6.2.3  Solution #2.3: Solution against DOS attack in registration procedurep. 43

6.2.4  Solution #2.4: Security for discovery with network checkingp. 45

6.2.5  Solution #2.5: Security for discovery responsep. 49

6.2.6  Solution #2.6: Security for proximity request authentication and authorizationp. 52

6.3  Solutions for One-to-many Communicationsp. 56

6.3.1  Solution #3.1: Security for ProSe Group Communicationsp. 56

6.3.2  Solution #3.2: Network-supported key distribution for group communicationsp. 73

6.3.3  Solution #3.3: security for D2D communications based on overlayp. 76

6.3.4  Solution #3.4: Security for one-to-many communicationp. 79

6.3.5  Solution #3.5: Security for one-to-many securityp. 81

6.3.6  Solution #3.6: Public safety security layered over network securityp. 86

6.3.7  Solution #3.7: Security for One-to-many ProSe Direct Communicationp. 87

6.3.8  Conclusion on one-to-many securityp. 89

6.4  Solutions for other areasp. 93


Up   Top   ToC