Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.868  Word version:  12.1.0

Top   Top   Up   Prev   None
1…   4…

 

4  Overview of Security Architecturep. 13

5  Description of envisioned security aspects of Machine-Type and other Mobile Data Applications Communications Enhancementsp. 15

5.1  Device Triggering Enhancementsp. 15

5.2  Secure Connectionp. 32

5.3  External Interface Securityp. 40

5.4  Restricting the USIM to specific UEsp. 43

5.5  Privacy concernp. 67

5.6  UE Power Consumption Optimizationsp. 70

5.7  Security of Small Data Transmissionp. 71

5.7.1  Issue Detailsp. 71

5.7.2  Threatsp. 71

5.7.3  Security requirementsp. 74

5.7.4  Solutionsp. 75

5.7.4.1  Small data transfer in NAS PDUp. 75

5.7.4.2  Small Data Fast Path in User Planep. 78

5.7.4.3  Connectionless Data Transmission solutionp. 87

5.7.4.4  MTC-IWF based Secure Solution for Small data transmissionp. 93

5.7.4.5  Connectionless Data Transmission Solution Using Separate Security Contextp. 100

5.7.6  Evaluationp. 104

6  General Security Requirementp. 109

7  Conclusionsp. 109

A  Key Issues and Solutions deferred from Rel-12p. 110

A.1  Time controlledp. 110

A.2  Low Mobilityp. 111

A.3  Security of UE Configurationp. 111

A.4  Reject message without integrity protectionp. 113

A.5  Congestion Controlp. 113

A.6  Group Based Featurep. 114

A.7  Monitoringp. 117

$  Change Historyp. 119


Up   Top