Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.879  Word version:  13.1.0

Top   Top   Up   Prev   None
1…   4…

 

4  Overview of Mission Critical Push-to-Talk (MCPTT)p. 10

5  List of assetsp. 14

6  Security analysis of MCPTTp. 15

6.1  General security requirementsp. 15

6.2  Key Issue # 1: Configuration & service accessp. 15

6.3  Key Issue # 2: Group Key Managementp. 16

6.4  Key Issue # 3: On-Network Operation: denial of servicep. 17

6.5  Key Issue # 4: Ambient Listeningp. 17

6.6  Key Issue # 5: Data communication security between MCPTT network entitiesp. 18

6.7  Key Issue # 6: On-Network Operation: impersonationp. 18

6.8  Key Issue # 7: On-Network Operation: manipulationp. 19

6.9  Key Issue # 8: On-network operation: traffic analysisp. 20

6.10  Key Issue # 9: On-network operation: interception of user trafficp. 20

6.11  Key Issue # 10: Key Stream Re-usep. 21

6.12  Key Issue # 11: Late Entry to Group Communicationp. 22

6.13  Key Issue # 12: Private Call Confidentialityp. 22

6.14  Key Issue # 13: Off-network operation: denial of servicep. 23

6.15  Key Issue # 14: Off-Network Operation: interception of user trafficp. 23

6.16  Key Issue # 15: Off-network operation: impersonationp. 24

6.17  Key Issue # 16: Off-network operation: manipulationp. 24

6.18  Key Issue # 17: Off-network operation: traffic analysisp. 25

6.19  Key Issue #18: Privacy of MCPTT identitiesp. 25

7  Proposed Solutionsp. 26

7.1  Solution #1: Signalling protection and authentication procedure for MCPTT servicesp. 26

7.2  Solution #2: MCPTT User authentication and registration based on OpenID Connectp. 28

7.3  Solution #3: Addition of KMS function and interfacesp. 32

7.4  Solution #4: Distribution of a group security contextp. 35

7.5  Solution #5: Private call securityp. 40

7.6  Solution #6: End-to-end protection for private call in on-networkp. 44

7.7  Solution #7: Media stream protectionp. 48

7.8  Solution #8: Protection of floor control signalling (SRTCP)p. 50

7.9  Solution #9: GCSE based security for MCPTT servicep. 52

7.10  Solution #10: Inter/Intra domain protection for MCPTT servicep. 53

7.11  Solution #11: HTTP-1 interface protectionp. 53

7.12  Solution #12: Using S/MIME to protect MCPTT Application plane messaging in SIP messagesp. 54

7.13  Solution #13: KMS managed Content Encryption Key (CEK) for S/MIMEp. 58

7.14  Solution #14: Identity based cryptography managed Content Encryption Key (CEK) for S/MIMEp. 63

7.15  Solution #15: Using content indirection and XCAP to hide MCPTT sensitive application information in SIP messagesp. 65

7.16  Solution #16: Protecting the location objectp. 68

7.17  Solution #17: Protection of sensitive application data based on xmlsecp. 71

8  Evaluation of solutionsp. 73

9  Conclusionp. 82

A  Authentication call-flowsp. 84

$  Change Historyp. 88


Up   Top