Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TR 33.851  Word version:  17.1.0

Top   Top   None   None   Next
1…   5…

 

1  ScopeWord‑p. 7

The present document studies the security impact of time sensitive communication aspects in Industrial IoT based on FS_IIoT study in TR 23.700-20 and the architecture described in TS 23.501.

2  ReferencesWord‑p. 7

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
TS 33.501: "Security architecture and procedures for 5G System".
[3]
TS 23.501: "System architecture for the 5G System (5GS)".
[4]
TR 23.700-20: "Study on enhanced support of Industrial Internet of Things (IIoT) in the 5G System (5GS)".
[5]
IEEE 802.1Qcc: "IEEE Standard for Local and Metropolitan Area Networks--Bridges and Bridged Networks -- Amendment 31: Stream Reservation Protocol (SRP) Enhancements and Performance Improvements".
[6]  Void
[7]
RFC 7384:  "Security Requirements of Time Protocols in Packet Switched Networks".
[8]
Robert Annessi, Joachim Fabini, Felix Iglesias, and Tanja Zseby: "Encryption is Futile: Delay Attacks on High-Precision Clock Synchronization"; https://arxiv.org/pdf/1811.08569.pdf.
[9]
Sergio Barreto; Aswin Suresh; Jean-Yves Le Boudec: "Cyber-attack on Packet-Based Time Synchronization Protocols: the Undetectable Delay Box"; published in: 2016 IEEE International Instrumentation and Measurement Technology Conference Proceedings; https://ieeexplore.ieee.org/document/7520408.
[10]
Markus Ullmann; Matthias Vógeler: "Delay Attacks - Implication on NTP and PTP Time Synchronization"; published in: 2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication; https://ieeexplore.ieee.org/abstract/document/5340224/.
[11]
RFC 6749:  "OAuth2.0 Authorization Framework".
Up

3  Definitions of terms, symbols and abbreviationsWord‑p. 7

3.1  TermsWord‑p. 7

For the purposes of the present document, the terms given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.

3.2  SymbolsWord‑p. 8

Void

3.3  AbbreviationsWord‑p. 8

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
5G
Fifth Generation
5GS
Fifth Generation System
ARP
Address Resolution Protocol
BMCA
Best Master Clock Algorithm
CNC
Centralized Network Configuration
CP
Control Plane
CUC
Centralized User Configuration
DoS
Denial of Service
DS-TT
Device Side Translator
gPTP
generalized Precision Time Protocol
IIoT
Industrial Internet of Things
IP
Internet Protocol
KI
Key Issue
Ln
Layer n
MAC
Media Access Control
NW-TT
Network Side Translator
PTP
Precision Time Protocol
Rel
Release
TSC
Time Sensitive Communication
TSN AF
TSN Application Function
TSN
Time Sensitive Networking
UE
User Equipment
UP
User Plane
UPF
User Plane Function
Up

4  Architectural considerationsWord‑p. 8

4.1  Rel-16 reference architectureWord‑p. 8

The 5G TSC service is described in TS 23.501. It allows the 5G System to be integrated transparently as a bridge in an IEEE TSN network [5], where the 5GS system acts as one or more TSN Bridges of a TSN network with DS-TT and NW-TT introduced in Rel-16 to transparently process and transfer UP TSN messages.
TSN AF is used to configure the 5GS on CP via a CNC. Only the fully centralized model is supported in Rel-16. gPTP is used for time synchronization. In Rel-16, only downlink time synchronization has been addressed, with the GM clock being always on the NW-TT/UPF side.
The security for the TSC service is addressed in TS 33.501 Annex L.
Up

4.2  Enhancements for time synchronizationWord‑p. 8

TR 23.700-20 is studying several enhancements in for the centralized model:
  • PTP support, a time-synch protocol based on IP
  • Support for uplink time synchronization for gPTP and PTP
  • Support for multiple TSN clock domains UE-to-UE communication
  • Exposure of TSC capabilities of the 5GS using the NEF framework

Up   Top   ToC