没有合适的资源?快使用搜索试试~ 我知道了~
首页3GPP TS 33.102
3GPP TS 33.102
4星 · 超过85%的资源 需积分: 31 71 下载量 101 浏览量
更新于2023-03-16
评论 3
收藏 472KB PDF 举报
3GPP TS 33.102 version 10.0.0 Release 10
资源详情
资源评论
资源推荐
ETSI TS 133 102 V10.0.0 (2011-05
)
Technical Specification
Universal Mobile Telecommunications System (UMTS);
LTE;
3G security;
Security architecture
(3GPP TS 33.102 version 10.0.0 Release 10
)
ETSI
ETSI TS 133 102 V10.0.0 (2011
-
05)
1
3GPP TS 33.102 version 10.0.0 Release 10
Reference
RTS/TSGS-0333102va00
Keywords
LTE, SECURITY, UMTS
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a
specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
http://portal.etsi.org/chaircor/ETSI_support.asp
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2011.
All rights reserved.
DECT
TM
, PLUGTESTS
TM
, UMTS
TM
, TIPHON
TM
, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered
for the benefit of its Members.
3GPP
TM
is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.
LTE™ is a Trade Mark of ETSI currently being registered
for the benefit of its Members and of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI
ETSI TS 133 102 V10.0.0 (2011
-
05)
2
3GPP TS 33.102 version 10.0.0 Release 10
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (http://webapp.etsi.org/IPR/home.asp
).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Technical Specification (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP).
The present document may refer to technical specifications or reports using their 3GPP identities, UMTS identities or
GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables.
The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under
http://webapp.etsi.org/key/queryform.asp
.
ETSI
ETSI TS 133 102 V10.0.0 (2011
-
05)
3
3GPP TS 33.102 version 10.0.0 Release 10
Contents
Intellectual Property Rights ................................................................................................................................ 2
Foreword ............................................................................................................................................................. 2
Foreword ............................................................................................................................................................. 6
1 Scope ........................................................................................................................................................ 7
2 References ................................................................................................................................................ 7
3 Definitions, symbols abbreviations and conventions ............................................................................... 9
3.1 Definitions .......................................................................................................................................................... 9
3.2 Symbols ............................................................................................................................................................ 10
3.3 Abbreviations ................................................................................................................................................... 10
3.4 Conventions ...................................................................................................................................................... 11
4 Overview of the security architecture..................................................................................................... 12
5 Security features ..................................................................................................................................... 13
5.1 Network access security ................................................................................................................................... 13
5.1.1 User identity confidentiality ....................................................................................................................... 13
5.1.2 Entity authentication ................................................................................................................................... 14
5.1.3 Confidentiality ............................................................................................................................................ 14
5.1.4 Data integrity .............................................................................................................................................. 14
5.1.5 Mobile equipment identification ................................................................................................................. 15
5.2 Network domain security ................................................................................................................................. 15
5.2.1 Void ............................................................................................................................................................ 15
5.2.2 Void ............................................................................................................................................................ 15
5.2.3 Void ............................................................................................................................................................ 15
5.2.4 Fraud information gathering system ........................................................................................................... 15
5.3 User domain security ........................................................................................................................................ 15
5.3.1 User-to-USIM authentication...................................................................................................................... 15
5.3.2 USIM-Terminal Link .................................................................................................................................. 15
5.4 Application security ......................................................................................................................................... 16
5.4.1 Secure messaging between the USIM and the network .............................................................................. 16
5.4.2 Void ............................................................................................................................................................ 16
5.4.3 Void ............................................................................................................................................................ 16
5.4.4 Void ............................................................................................................................................................ 16
5.5 Security visibility and configurability .............................................................................................................. 16
5.5.1 Visibility ..................................................................................................................................................... 16
5.5.2 Configurability ............................................................................................................................................ 16
6 Network access security mechanisms .................................................................................................... 17
6.1 Identification by temporary identities............................................................................................................... 17
6.1.1 General ........................................................................................................................................................ 17
6.1.2 TMSI reallocation procedure ...................................................................................................................... 17
6.1.3 Unacknowledged allocation of a temporary identity .................................................................................. 17
6.1.4 Location update .......................................................................................................................................... 18
6.2 Identification by a permanent identity .............................................................................................................. 18
6.3 Authentication and key agreement ................................................................................................................... 18
6.3.1 General ........................................................................................................................................................ 18
6.3.2 Distribution of authentication data from HE to SN .................................................................................... 20
6.3.3 Authentication and key agreement .............................................................................................................. 22
6.3.4 Distribution of IMSI and temporary authentication data within one serving network domain ................... 25
6.3.5 Re-synchronisation procedure .................................................................................................................... 26
6.3.6 Reporting authentication failures from the SGSN/VLR to the HLR .......................................................... 27
6.3.6.1 Authentication re-attempt ...................................................................................................................... 27
6.3.7 Length of authentication parameters ........................................................................................................... 28
6.4 Local authentication and connection establishment ......................................................................................... 28
6.4.1 Cipher key and integrity key setting ........................................................................................................... 28
ETSI
ETSI TS 133 102 V10.0.0 (2011
-
05)
4
3GPP TS 33.102 version 10.0.0 Release 10
6.4.2 Ciphering and integrity mode negotiation .................................................................................................. 28
6.4.3 Cipher key and integrity key lifetime ......................................................................................................... 29
6.4.4 Cipher key and integrity key identification ................................................................................................. 29
6.4.5 Security mode set-up procedure .................................................................................................................. 30
6.4.6 Signalling procedures in the case of an unsuccessful integrity check ......................................................... 33
6.4.7 Signalling procedure for periodic local authentication ............................................................................... 33
6.4.8 Initialisation of synchronisation for ciphering and integrity protection ...................................................... 33
6.4.9 Emergency call handling ............................................................................................................................ 34
6.4.9.1 Security procedures applied .................................................................................................................. 34
6.4.9.2 Security procedures not applied ............................................................................................................ 34
6.5 Access link data integrity ................................................................................................................................. 35
6.5.1 General ........................................................................................................................................................ 35
6.5.2 Layer of integrity protection ....................................................................................................................... 35
6.5.3 Data integrity protection method ................................................................................................................ 35
6.5.4 Input parameters to the integrity algorithm ................................................................................................. 36
6.5.4.1 COUNT-I .............................................................................................................................................. 36
6.5.4.2 IK .......................................................................................................................................................... 36
6.5.4.3 FRESH .................................................................................................................................................. 37
6.5.4.4 DIRECTION ......................................................................................................................................... 37
6.5.4.5 MESSAGE ............................................................................................................................................ 37
6.5.5 Integrity key selection ................................................................................................................................. 37
6.5.6 UIA identification ....................................................................................................................................... 37
6.6 Access link data confidentiality ........................................................................................................................ 38
6.6.1 General ........................................................................................................................................................ 38
6.6.2 Layer of ciphering ....................................................................................................................................... 38
6.6.3 Ciphering method ....................................................................................................................................... 38
6.6.4 Input parameters to the cipher algorithm .................................................................................................... 39
6.6.4.1 COUNT-C ............................................................................................................................................. 39
6.6.4.2 CK ......................................................................................................................................................... 40
6.6.4.3 BEARER ............................................................................................................................................... 41
6.6.4.4 DIRECTION ......................................................................................................................................... 41
6.6.4.5 LENGTH ............................................................................................................................................... 41
6.6.5 Cipher key selection.................................................................................................................................... 41
6.6.6 UEA identification ...................................................................................................................................... 41
6.7 Void .................................................................................................................................................................. 42
6.8 Interoperation and handover between UMTS and GSM .................................................................................. 42
6.8.1 Authentication and key agreement of UMTS subscribers .......................................................................... 42
6.8.1.1 General .................................................................................................................................................. 42
6.8.1.2 R99+ HLR/AuC .................................................................................................................................... 43
6.8.1.3 R99+ VLR/SGSN ................................................................................................................................. 44
6.8.1.4 R99+ ME ............................................................................................................................................... 45
6.8.1.5 USIM ..................................................................................................................................................... 45
6.8.2 Authentication and key agreement for GSM subscribers............................................................................ 46
6.8.2.1 General .................................................................................................................................................. 46
6.8.2.2 R99+ HLR/AuC .................................................................................................................................... 47
6.8.2.3 VLR/SGSN ........................................................................................................................................... 47
6.8.2.4 R99+ ME ............................................................................................................................................... 47
6.8.3 Distribution and use of authentication data between VLRs/SGSNs ........................................................... 47
6.8.4 Intersystem handover for CS Services – from UTRAN to GSM BSS ........................................................ 48
6.8.4.1 UMTS security context ......................................................................................................................... 49
6.8.4.2 GSM security context ............................................................................................................................ 49
6.8.5 Intersystem handover for CS Services – from GSM BSS to UTRAN ........................................................ 50
6.8.5.1 UMTS security context ......................................................................................................................... 50
6.8.5.2 GSM security context ............................................................................................................................ 50
6.8.6 Intersystem change for PS Services – from UTRAN to GSM BSS ............................................................ 51
6.8.6.1 UMTS security context ......................................................................................................................... 51
6.8.6.2 GSM security context ............................................................................................................................ 51
6.8.7 Intersystem change for PS services – from GSM BSS to UTRAN............................................................. 51
6.8.7.1 UMTS security context ......................................................................................................................... 51
6.8.7.2 GSM security context ............................................................................................................................ 52
6.8.8 PS handover from Iu to Gb mode ............................................................................................................... 52
6.8.8.1 UMTS security context ......................................................................................................................... 52
剩余72页未读,继续阅读
cjblove2008
- 粉丝: 7
- 资源: 5
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- ExcelVBA中的Range和Cells用法说明.pdf
- 基于单片机的电梯控制模型设计.doc
- 主成分分析和因子分析.pptx
- 共享笔记服务系统论文.doc
- 基于数据治理体系的数据中台实践分享.pptx
- 变压器的铭牌和额定值.pptx
- 计算机网络课程设计报告--用winsock设计Ping应用程序.doc
- 高电压技术课件:第03章 液体和固体介质的电气特性.pdf
- Oracle商务智能精华介绍.pptx
- 基于单片机的输液滴速控制系统设计文档.doc
- dw考试题 5套.pdf
- 学生档案管理系统详细设计说明书.doc
- 操作系统PPT课件.pptx
- 智慧路边停车管理系统方案.pptx
- 【企业内控系列】企业内部控制之人力资源管理控制(17页).doc
- 温度传感器分类与特点.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论3