Tech-invite3GPPspaceIETF RFCsSIP

Content for  TR 33.863  Word version:  14.2.0

Top   Top   None   None   Next
1…   4…


1  Scopep. 8

The present document's objectives are to:
  1. Investigate whether battery efficient 'device to enterprise' mechanisms to provide sufficient security exist.
  2. Investigate potential enhancements to 3GPP's security architecture(s) that enable the Home Operator to be able to offer well guaranteed security to enterprises e.g. to provide security between the UE and a node in the home operator domain.
  3. Both S1 and Gb based architectures should be considered when undertaking b, above.
The impacts of relevant authentication and key agreement procedures are also presented.
The following should be taken into account for the study:
  • The potential solutions should aim at minimising the energy consumption of devices to help meet the objective of a ten year battery life in the extended coverage situation and take into consideration the very low data rate capability of the radio interface when using the Energy Consumption Evaluation Methodology described in TR 45.820.

2  Referencesp. 8

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
TR 21.905: "Vocabulary for 3GPP Specifications".
TR 41.001: "GSM Release specifications".
→ to date, withdrawn by 3GPP
[3]  Void
IETF Transport Layer Security (tls) Working Group, Charter,
RFC 7252:  "The Constrained Application Protocol (CoAP)".
draft-ypoeluev-tls-m2mcertificate-00  "Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Authentication Using M2M Certificate".
draft-ietf-tls-cached-info-19  "Transport Layer Security (TLS) Cached Information Extension".
draft-ietf-tls-tls13-05  "The Transport Layer Security (TLS) Protocol Version 1.3".
RFC 5246:  "The Transport Layer Security (TLS) Protocol Version 1.2".
draft-ietf-dice-profile-13  "A TLS/DTLS Profile for the Internet of Things".
TS 23.060: "General Packet Radio Service (GPRS); Service description; Stage 2".
TS 24.008: "Mobile radio interface Layer 3 specification; Core network protocols; Stage 3".
TS 48.018: "General Packet Radio Service (GPRS); Base Station System (BSS) - Serving GPRS Support Node (SGSN); BSS GPRS protocol (BSSGP)".
TS 44.064: "Mobile Station - Serving GPRS Support Node (MS-SGSN); Logical Link Control (LLC) Layer Specification".
TS 44.065: "Mobile Station (MS) - Serving GPRS Support Node (SGSN); Subnetwork Dependent Convergence Protocol (SNDCP)".
TS 23.401: "General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access".
[17]  Void.
TS 36.413: "Evolved Universal Terrestrial Radio Access Network (E-UTRAN); S1 Application Protocol (S1AP)".
TS 33.187: "Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements".
TS 33.220: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)".
TS 33.223: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function".
TS 22.368: "Service requirements for Machine-Type Communications (MTC); Stage 1".
TS 36.323: "Evolved Universal Terrestrial Radio Access (E-UTRA); Packet Data Convergence Protocol (PDCP) specification".
TS 29.281: "General Packet Radio System (GPRS) Tunnelling Protocol User Plane (GTPv1-U)".
TR 45.820: "Cellular system support for ultra-low complexity and low throughput Internet of Things (CIoT)".
NIST SP 800-38D.
TS 33.102: "3G security; Security architecture".
TS 33.401: "3GPP System Architecture Evolution (SAE); Security architecture".
TS 29.060: "General Packet Radio Service (GPRS); GPRS Tunnelling Protocol (GTP) across the Gn and Gp interface".
TS 24.301: "Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3".
TS 23.002: "Network architecture".
RFC 6347.:  "Datagram Transport Layer Security" [33] IETF RFC 4492. "Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) ".
TS 24.109: "Bootstrapping interface (Ub) and network application function interface (Ua); Protocol details".
TS 33.222: "Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS)".
RFC 4303:  "IP Encapsulation Security Payload (ESP)".
TS 33.210: "Network Domain Security (NDS); IP network layer security".
TS 55.241: " Specification of the GIA4 integrity algorithm for GPRS; GIA4 specification".
TS 55.251: " Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS; GEA5 and GIA5 specification".
TS 35.205: "3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General".
TS 35.215: "Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications".
[42]  Void
TS 35.221: " Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications".
RFC 7296:  "Internet Key Exchange Protocol Version 2 (IKEv2)"
TS 33.310: "Network Domain Security (NDS); Authentication Framework (AF)"
TS 23.682: "Architecture enhancements to facilitate communications with packet data networks and applications"
TS 43.020: "Security related network functions"

3  Definitions, symbols and abbreviationsp. 10

3.1  Definitionsp. 10

For the purposes of the present document, the terms and definitions given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.
End to middle
Gb architecture:
a system architecture described in TS 23.060 that uses the protocols defined in e.g. 3GPP TSs 24.008 [12], 48.018 [13], 44.064 [14] and 44.065 [15].
S1 architecture:
a system architecture described in TS 23.401 that uses the protocols defined in e.g. 3GPP TSs 24.301 [30] and 36.413 [18].

3.2  Symbolsp. 10

For the purposes of the present document, the following symbols apply:
Communication between

3.3  Abbreviationsp. 10

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply.
An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
Authentication and Key Agreement
Authentication Management Field
Authentication Centre
Cellular Internet of Things
Ciphering Key
replacement CK for ait interface security to withhold CK from the visited network
Constrained Application Protocol
Datagram Transport Layer Security
Evolved Universal Terrestrial Radio Access Network
End to End
End to End Security Endpoint
End to Middle Key Server
E2M Security Endpoint
Evolved Packet System
Generic Bootstrapping Architecture
GSM EDGE Radio Access Network
Gateway GPRS Support Node
GPRS Tunnelling Protocol
Home Location Registry
Home Subscriber Server
Integrity Key
replacement for IK for air interface security to withhold IK from the visited network
Internet of Things
Key Derivation Function
Logical Link Controller
Mobility Management Entity
Machine Type Communications
PDN Gateway
Packet Data Network
Public Land Mobile Network
Serving Gateway
Serving GPRS Support Node
Sequence Number
Transport Layer Security
User Equipment
Universal Mobile Telecommunication System
User Plane
Universal Subscriber Identity Module

Up   Top   ToC