Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.836  Word version:  16.1.0

Top   Top   Up   Prev   None
1…   5…

 

5  Key Issuesp. 10

5.1  Key Issue #1: Privacy protection for unicast messages over PC5p. 10

5.2  Key Issue #2: Security for eV2X unicast messages over PC5.p. 10

5.3  Key Issue #3: Privacy protection for groupcast messages over PC5p. 11

5.4  Key Issue #4: Security of identifier conversion in groupcast communicationp. 12

5.5  Key Issue #5: Security for setting up groupcastp. 13

5.6  Key Issue #6: Security of the UE service authorization and revocationp. 13

5.7  Key Issue #7: Cross-RAT PC5 control authorization indicationp. 13

5.8  Key Issue #8: Privacy protection for broadcast messages over PC5p. 14

5.9  Key Issue #9: Minimizing the impact of privacy protection mechanism in the application layer communicationp. 15

5.10  Key Issue #10: UP security policy handling for PC5 and Uu interfacep. 16

5.11  Key Issue #11: Security for eV2X broadcast messages over PC5p. 17

6  Solutionsp. 17

6.1  Solution #1: Privacy protection for unicast messages over PC5p. 17

6.2  Solution #2: Security for eV2X unicast messages over PC5p. 20

6.3  Solution #3: Security for eV2X unicast messages over PC5p. 22

6.4  Solution #4: Privacy protection for unicast messages over PC5p. 25

6.5  Solution #5: Security protection of service authorisationp. 27

6.6  Solution #6: V2X Group Key Provisioningp. 28

6.7  Solution #7: Cross-RAT PC5 control authorization indicationp. 29

6.8  Solution #8: Deriving PC5 layer keys based on higher layer keysp. 29

6.9  Solution #9: Security for eV2X unicast messages over PC5 using ECCSI and SAKKEp. 32

6.10  Solution #10: Privacy protection for unicast message over PC5p. 35

6.11  Solution #11: Solution on minimizing the impact of privacy protection mechanism in the application layer communicationp. 37

6.12  Solution #12: Protecting the traffic at the PDCP layerp. 39

6.13  Solution #13: Solution against V2X UE tracking based on PC5 identifiersp. 40

6.14  Solution #14: Identifier conversion in groupcast communicationp. 41

6.15  Solution #15: Solution on minimizing the impact of privacy protection mechanism in the application layer communicationp. 42

6.16  Solution #16: Solution for the activation of user plane security in NR PC5 unicastp. 43

6.17  Solution #17: PC5 layer key derivation using the 5G network keysp. 44

6.18  Solution #18: Solution for the UP security activation policy handling in NR PC5 unicastp. 46

6.19  Solution #19: Protection of IEs in Direct Communication Request messagep. 47

6.20  Solution #20: Solution on securely creating destination Layer-2 ID in groupcast communicationp. 48

7  Conclusionsp. 49

$  Change Historyp. 51


Up   Top