Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TR 33.836  Word version:  16.0.0

Top   Top   Up   Prev   None
1…   5…

 

5  Key IssuesWord‑p. 10

5.1  Key Issue #1: Privacy protection for unicast messages over PC5

5.2  Key Issue #2: Security for eV2X unicast messages over PC5.

5.3  Key Issue #3: Privacy protection for groupcast messages over PC5

5.4  Key Issue #4: Security of identifier conversion in groupcast communication

5.5  Key Issue #5: Security for setting up groupcastWord‑p. 13

5.6  Key Issue #6: Security of the UE service authorization and revocation

5.7  Key Issue #7: Cross-RAT PC5 control authorization indication

5.8  Key Issue #8: Privacy protection for broadcast messages over PC5

5.9  Key Issue #9: Minimizing the impact of privacy protection mechanism in the application layer communicationWord‑p. 15

5.10  Key Issue #10: UP security policy handling for PC5 and Uu interface

5.11  Key Issue #11: Security for eV2X broadcast messages over PC5

6  Solutions

6.1  Solution #1: Privacy protection for unicast messages over PC5

6.2  Solution #2: Security for eV2X unicast messages over PC5

6.3  Solution #3: Security for eV2X unicast messages over PC5

6.4  Solution #4: Privacy protection for unicast messages over PC5

6.5  Solution #5: Security protection of service authorisation

6.6  Solution #6: V2X Group Key Provisioning

6.7  Solution #7: Cross-RAT PC5 control authorization indication

6.8  Solution #8: Deriving PC5 layer keys based on higher layer keys

6.9  Solution #9: Security for eV2X unicast messages over PC5 using ECCSI and SAKKEWord‑p. 32

6.10  Solution #10: Privacy protection for unicast message over PC5

6.11  Solution #11: Solution on minimizing the impact of privacy protection mechanism in the application layer communicationWord‑p. 37

6.12  Solution #12: Protecting the traffic at the PDCP layerWord‑p. 39

6.13  Solution #13: Solution against V2X UE tracking based on PC5 identifiers

6.14  Solution #14: Identifier conversion in groupcast communicationWord‑p. 41

6.15  Solution #15: Solution on minimizing the impact of privacy protection mechanism in the application layer communicationWord‑p. 42

6.16  Solution #16: Solution for the activation of user plane security in NR PC5 unicast

6.17  Solution #17: PC5 layer key derivation using the 5G network keys

6.18  Solution #18: Solution for the UP security activation policy handling in NR PC5 unicast

6.19  Solution #19: Protection of IEs in Direct Communication Request message

6.20  Solution #20: Solution on securely creating destination Layer-2 ID in groupcast communicationWord‑p. 48

7  Conclusions

$  Change HistoryWord‑p. 51


Up   Top