Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.969  Word version:  17.1.0

Top   Top   Up   Prev   None
1…   4…

 

4  Recommendations on security requirements of PWSp. 12

5  System architecture of PWSp. 13

6  Security features of PWSp. 14

6.1  PWS threats and analysisp. 14

6.2  Proposed security features of PWSp. 16

6.2.1  Generalp. 16

6.2.2  Restrictions on the PWS message signature lengthp. 18

6.2.3  Algorithm agility of PWSp. 20

6.2.4  Security level and key length of signature algorithms proposedp. 22

6.2.5  Verification of PWS Warning Notification messagep. 24

6.2.6  Primary and secondary notificationsp. 25

6.2.7  Network sharing impact to PWS Securityp. 26

6.2.8  Triggering condition for public key updatep. 28

6.2.9  Roaming impact to PWS Securityp. 29

6.2.10  Discussion on parameters to be sent when distributing public keys or broadcasting warning messagesp. 31

6.2.11  Considerations on networks in disaster areasp. 34

7  Possible Security solutions of PWSp. 34

7.0  Generalp. 34

7.1Void

7.2Void

7.3  Solution 3: NAS based solutionp. 35

7.4  Solution 4: GBA based protectionp. 49

7.5  Solution 5: using NAS layer securityp. 56

7.6  Solution 6: implicit certificate PKI based PWS solutionp. 59

7.7  Solution 7: generalized certificate-based approach for PWSp. 71

7.8  Solution 8: national PWS solution based on UICC OTAp. 78

7.9  Solutions to counter the PWS Security circumvention attack and to mitigate the risk of displaying false unprotected warning messagesp. 81

7.10  The use of signing proxiesp. 85

8  Evaluation of different solutionsp. 88

9  Key issues for establishing service requirements and designing a PWS security systemp. 100

10  Conclusionp. 101

A  Archived solutionsp. 102

B  Threat discussion depending on the PWS settings in the UE relating to roamingp. 112

$  Change Historyp. 116


Up   Top