Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.880  Word version:  15.1.0

Top   Top   Up   Prev   Next
1…   4…   7…   8…

 

4  Overview of enhanced Mission Critical Servicesp. 15

5  Security analysis of Mission Critical servicesp. 17

5.1  Generalp. 17

5.2  Cross-service key issuesp. 17

5.2.1  Key Issue #1.1: Denial of servicep. 17

5.2.2  Key Issue #1.2: Data communication security between MCX network entitiesp. 18

5.2.3  Key Issue #1.3: User impersonationp. 18

5.2.4  Key Issue #1.4: Manipulationp. 19

5.2.5  Key Issue #1.5: Traffic analysisp. 19

5.2.6  Key Issue #1.6: Privacy of MCX Service identitiesp. 20

5.2.7  Key issue #1.7: Use of multiple security domains for media securityp. 21

5.2.8  Key issue #1.8: Control of use of MBMS within the MC Domainp. 21

5.2.9  Key Issue #1.9: Edge protection of the MC Domainp. 22

5.3  Key issues on Common Functional Architecture (MC_ARCH)p. 23

5.4  Key issues on push-to-talk enhancements (eMCPTT)p. 25

5.5  Key issues on data communications (MCData)p. 28

5.6  Key issues on video communications (MCVideo)p. 29

5.7  Key issues on migration and interconnect (MCSMI)p. 32

5.8  Key Issues on interworking with non-3GPP systemsp. 35

6  List of potential security requirementsp. 36


Up   Top   ToC