TS 121 133 : 4.1.0
Current
The latest, up-to-date edition.
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); 3G SECURITY; SECURITY THREATS AND REQUIREMENTS
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Foreword
1 Scope
2 References
3 Definitions and Abbreviations
3.1 Definitions
3.2 Abbreviations
4 General objectives for 3G security features
5 Security context
5.1 System assumptions
5.2 3G roles
5.3 3G architecture
5.4 3G identities
5.5 3G data types and data groups
6 Security threats
6.1 Threats associated with attacks on the radio interface
6.2 Threats associated with attacks on other parts of the
system
6.3 Threats associated with attacks on the terminal and
UICC/USIM
7 Risk Assessment
7.1 Evaluation of threats
8 Security Requirements
8.1 Requirements derived from threat analysis
8.2 External requirements
Annex A (Informative): Threats linked to active attacks on
the radio access link
A.1 User identity catching
A.2 Suppression of encryption between target and intruder
A.3 Compromise of authentication data
A.4 Hijacking of services
Annex B: Change history
History
Provides an evaluation of perceived threats to 3GPP and produces subsequently a list of security requirements to address these threats.
Committee |
3GPP SA 3
|
DocumentType |
Standard
|
Pages |
27
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
I.S. EN 16062:2015 | INTELLIGENT TRANSPORT SYSTEMS - ESAFETY - ECALL HIGH LEVEL APPLICATION REQUIREMENTS (HLAP) USING GSM/UMTS CIRCUIT SWITCHED NETWORKS |
12/30242166 DC : 0 | BS ISO 26683-2 - INTELLIGENT TRANSPORT SYSTEMS - FREIGHT AND CONVEYANCE CONTENT IDENTIFICATION AND COMMUNICATION - PART 2: APPLICATION INTERFACE PROFILES |
BS ISO 26683-2:2013 | Intelligent transport systems. Freight land conveyance content identification and communication Application interface profiles |
ISO 26683-2:2013 | Intelligent transport systems — Freight land conveyance content identification and communication — Part 2: Application interface profiles |
TR 101 957 : 1.1.1 | BROADBAND RADIO ACCESS NETWORKS (BRAN); HIPERLAN TYPE 2; REQUIREMENTS AND ARCHITECTURES FOR INTERWORKING BETWEEN HIPERLAN/2 AND 3RD GENERATION CELLULAR SYSTEMS |
10/30214021 DC : 0 | BS EN 16062 - INTELLIGENT TRANSPORT SYSTEMS - ESAFETY - ECALL HIGH LEVEL APPLICATION REQUIREMENTS (HLAP) |
DIN EN 16062:2015-08 | Intelligent transport systems - ESafety - eCall high level application requirements (HLAP) using GSM/UMTS circuit switched networks |
BS EN 16072:2015 | Intelligent transport systems. ESafety. Pan-European eCall operating requirements |
DIN EN 16072:2015-08 | Intelligent transport systems - ESafety - Pan-European eCall operating requirements |
EN 16072:2015 | Intelligent transport systems - ESafety - Pan-European eCall operating requirements |
EN 16062:2015 | Intelligent transport systems - ESafety - eCall high level application requirements (HLAP) using GSM/UMTS circuit switched networks |
UNE-EN 16062:2015 | Intelligent transport systems - ESafety - eCall high level application requirements (HLAP) using GSM/UMTS circuit switched networks |
UNE-EN 16072:2015 | Intelligent transport systems - ESafety - Pan-European eCall operating requirements |
BS EN 16062:2015 | Intelligent transport systems. ESafety. eCall high level application requirements (HLAP) using GSM/UMTS circuit switched networks |
I.S. EN 16072:2015 | INTELLIGENT TRANSPORT SYSTEMS - ESAFETY - PAN-EUROPEAN ECALL OPERATING REQUIREMENTS |
TS 102 556 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ETR 331 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - DEFINITION OF USER REQUIREMENTS FOR LAWFUL INTERCEPTION OF TELECOMMUNICATIONS |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
ETR 332 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.