1 / 5

Marcus Wong Vice-Chair, 3GPP SA3 Security Working Group mwong@huawei

Marcus Wong Vice-Chair, 3GPP SA3 Security Working Group mwong@huawei.com. 3GPP Security. 3GPP Security. 3GPP TSG SA WG3 has the overall responsibility for security in 3GPP performing analysis of potential threats to the system setting security requirements

dorcas
Download Presentation

Marcus Wong Vice-Chair, 3GPP SA3 Security Working Group mwong@huawei

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Marcus Wong Vice-Chair, 3GPP SA3 Security Working Group mwong@huawei.com 3GPP Security

  2. 3GPP Security • 3GPP TSG SA WG3 has the overall responsibility for security in 3GPP • performing analysis of potential threats to the system • setting security requirements • specifying the security architecture and protocols

  3. Security Features (I) • Security for 3GPP Radio Access Networks • GERAN (GSM, GPRS, EDGE) • RAN • UTRAN (UMTS, HSPA) • E-UTRAN (LTE) • includes the needed security features for different types of base stations • eNBs, Home (e)NBs, relay nodes • Security interworking of Wireless Local Area Network (WLAN) and other access technologies with 3GPP networks • Security for the communication between the user equipment and the 3GPP network (core network) • authentication, integrity protection, confidentiality, etc. • Security for system improvement for machine-type communications • Network Domain Security • How to protect communications between network elements

  4. Security Features (II) • IMS Security • security for the IMS signalling • security for real-time media • work ongoing on specifying security for use cases like conferencing • presence and list management • protection against unsolicited communication in IMS (PUCI) • Security of Multimedia Broadcast/Multicast Service (MBMS) • Generic Bootstrapping Architecture • re-using the UICC-based authentication protocol for network access for securing access to network applications and services • Technical Reports describing interworking with • Liberty Alliance features • OpenID features • Key establishment features • between a UICC and a terminal • between a UICC hosting device and a remote device

More Related