ImageVerifierCode 换一换
格式:PDF , 页数:21 ,大小:117.42KB ,
资源ID:727427      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-727427.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI 3GPP TS 33 210-2003 See TS 133 210 V5 4 0 (Version 5 4 0 Release 5).pdf)为本站会员(deputyduring120)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI 3GPP TS 33 210-2003 See TS 133 210 V5 4 0 (Version 5 4 0 Release 5).pdf

1、 ETSI TS 133 210 V5.4.0 (2003-06)Technical Specification Digital cellular telecommunications system (Phase 2+);Universal Mobile Telecommunications System (UMTS);3G security;Network Domain Security (NDS);IP network layer security(3GPP TS 33.210 version 5.4.0 Release 5)GLOBAL SYSTEM FOR MOBILE COMMUNI

2、CATIONSRETSI ETSI TS 133 210 V5.4.0 (2003-06) 1 3GPP TS 33.210 version 5.4.0 Release 5 Reference RTS/TSGS-0333210v540 Keywords GSM, UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Associatio

3、n but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or percei

4、ved difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be

5、 aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, send your comment to: editoretsi.org Copyright Notificati

6、on No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2003. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for t

7、he benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TS 133 210 V5.4.0 (2003-06) 2 3GPP TS

8、33.210 version 5.4.0 Release 5 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR

9、000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Po

10、licy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Te

11、chnical Specification (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP). The present document may refer to technical specifications or reports using their 3GPP identities, UMTS identities or GSM identities. These should be interpreted as being references to the corresponding E

12、TSI deliverables. The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under http:/webapp.etsi.org/key/queryform.asp . ETSI ETSI TS 133 210 V5.4.0 (2003-06) 3 3GPP TS 33.210 version 5.4.0 Release 5 Contents Intellectual Property Rights2 Foreword.2 Foreword.4 Introduction 4 1

13、Scope 5 2 References 5 3 Definitions, symbols and abbreviations .6 3.1 Definitions6 3.2 Symbols7 3.3 Abbreviations .7 4 Overview over UMTS network domain security for IP based protocols .8 4.1 Introduction 8 4.2 Protection at the network layer.8 4.3 Security for native IP based protocols8 4.4 Securi

14、ty domains 8 4.4.1 Security domains and interfaces .8 4.5 Security Gateways (SEGs) .8 5 Key management and distribution architecture for NDS/IP.9 5.1 Security services afforded to the protocols.9 5.2 Security Associations (SAs).9 5.2.1 Security Policy Database (SPD) .10 5.2.2 Security Association Da

15、tabase (SAD) 10 5.3 Profiling of IPsec10 5.3.1 Support of ESP .10 5.3.2 Support of tunnel mode 10 5.3.3 Support of ESP encryption transforms .11 5.3.4 Support of ESP authentication transforms11 5.3.5 Requirements on the construction of the IV .11 5.4 Profiling of IKE11 5.5 Security policy granularit

16、y .12 5.6 UMTS key management and distribution architecture for native IP based protocols 12 5.6.1 Network domain security architecture outline 12 5.6.2 Interface description .13 Annex A (informative): Other issues 15 A.1 Network Address Translators (NATs) and Transition Gateways (TrGWs) .15 A.2 Fil

17、tering routers and firewalls 15 A.3 The relationship between BGs and SEGs.15 Annex B (normative): Security protection for GTP16 B.1 The need for security protection.16 B.2 Policy discrimination of GTP-C and GTP-U .16 Annex C (normative): Security protection of IMS protocols .18 C.1 The need for secu

18、rity protection.18 C.2 Protection of IMS protocols and interfaces18 Annex D (informative): Change history .19 History 20 ETSI ETSI TS 133 210 V5.4.0 (2003-06) 4 3GPP TS 33.210 version 5.4.0 Release 5 Foreword This Technical Specification has been produced by the 3rdGeneration Partnership Project (3G

19、PP). The contents of the present document are subject to continuing work within the TSG and may change following formal TSG approval. Should the TSG modify the contents of the present document, it will be re-released by the TSG with an identifying change of release date and an increase in version nu

20、mber as follows: Version x.y.z where: x the first digit: 1 presented to TSG for information; 2 presented to TSG for approval; 3 or greater indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, u

21、pdates, etc. z the third digit is incremented when editorial only changes have been incorporated in the document. Introduction An identified security weakness in 2G systems is the absence of security in the core network. This was formerly perceived not to be a problem, since the 2G networks previous

22、ly were the provinces of a small number of large institutions. This is no longer the case, and so there is now a need for security precautions. Another significant development has been the introduction of IP as the network layer in the GPRS backbone network and then later in the UMTS network domain.

23、 Furthermore, IP is not only used for signalling traffic, but also for user traffic. The introduction of IP therefore signifies not only a shift towards packet switching, which is a major change by its own accounts, but also a shift towards completely open and easily accessible protocols. The implic

24、ation is that from a security point of view, a whole new set of threats and risks must be faced. For 3G systems it is a clear goal to be able to protect the core network signalling protocols, and by implication this means that security solutions must be found for both SS7 and IP based protocols. Thi

25、s technical specification is the stage-2 specification for IP related security in the UMTS core network. The security services that have been identified as being needed are confidentiality, integrity, authentication and anti-replay protection. These will be ensured by standard procedures, based on c

26、ryptographic techniques. ETSI ETSI TS 133 210 V5.4.0 (2003-06) 5 3GPP TS 33.210 version 5.4.0 Release 5 1 Scope The present document defines the security architecture for the UMTS network domain IP based control plane. The scope of the UMTS network domain control plane security is to cover the contr

27、ol signalling on selected interfaces between UMTS network elements. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication, edition number, version

28、 number, etc.) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that do

29、cument in the same Release as the present document. 1 3GPP TS 21.133: “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Threats and Requirements“. 2 3GPP TR 21.905: “3rd Generation Partnership Project; Technical Specification Group

30、Services and System Aspects; Vocabulary for 3GPP Specifications“. 3 3GPP TS 23.002: “3rd Generation Partnership Project; Technical Specification Group Services and Systems Aspects; Network architecture“. 4 3GPP TS 23.060: “3rd Generation Partnership Project; Technical Specification Group Services an

31、d System Aspects; General Packet Radio Service (GPRS); Service description; Stage 2“. 5 3GPP TS 23.228: “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS); Stage 2“. 6 3GPP TS 29.060: “3rd Generation Partnership Project; Tech

32、nical Specification Group Core Network; General Packet Radio Service (GPRS); GPRS Tunnelling Protocol (GTP) across the Gn and Gp Interface“. 7 3GPP TS 33.102: “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Architecture“. 8 3GPP T

33、S 33.103: “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Integration guidelines“. 9 3GPP TS 33.120: “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Principles and Objec

34、tives“. 10 3GPP TS 33.203: “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Access security for IP-based services“. 11 RFC-2393: “IP Payload Compression Protocol (IPComp)“. 12 RFC-2401: “Security Architecture for the Internet Protocol“. 13 RFC-2402: “IP

35、 Authentication Header“. 14 RFC-2403: “The Use of HMAC-MD5-96 within ESP and AH“. 15 RFC-2404: “The Use of HMAC-SHA-1-96 within ESP and AH“. 16 RFC-2405: “The ESP DES-CBC Cipher Algorithm With Explicit IV“. ETSI ETSI TS 133 210 V5.4.0 (2003-06) 6 3GPP TS 33.210 version 5.4.0 Release 5 17 RFC-2406: “

36、IP Encapsulating Security Payload“. 18 RFC-2407: “The Internet IP Security Domain of Interpretation for ISAKMP“. 19 RFC-2408: “Internet Security Association and Key Management Protocol (ISAKMP)“. 20 RFC-2409: “The Internet Key Exchange (IKE)“. 21 RFC-2410: “The NULL Encryption Algorithm and Its Use

37、With IPsec“. 22 RFC-2411: “IP Security Document Roadmap“. 23 RFC-2412: “The OAKLEY Key Determination Protocol“. 24 RFC-2451: “The ESP CBC-Mode Cipher Algorithms“. 25 RFC-2521: “ICMP Security Failures Messages“. 26 Internet Draft: “On the Use of SCTP with IPsec “, available as “draft-ietf-ipsec-sctp-

38、03.txt“ 27 RFC-1750: “Randomness Recommendations for Security“. 3 Definitions, symbols and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply. Anti-replay protection: Anti-replay protection is a special case of integrity protection. Its

39、main service is to protect against replay of self-contained packets that already have a cryptographical integrity mechanism in place. Confidentiality: The property that information is not made available or disclosed to unauthorised individuals, entities or processes. Data integrity: The property tha

40、t data has not been altered in an unauthorised manner. Data origin authentication: The corroboration that the source of data received is as claimed. Entity authentication: The provision of assurance of the claimed identity of an entity. Key freshness: A key is fresh if it can be guaranteed to be new

41、, as opposed to an old key being reused through actions of either an adversary or authorised party. NDS/IP Traffic: Traffic that requires protection according to the mechanisms defined in this specification. ISAKMP Security Association: A bi-directional logical connection created for security purpos

42、es. All traffic traversing a SA is provided the same security protection. The SA itself is a set of parameters to define security protection between two entities. IPsec Security Association: A unidirectional logical connection created for security purposes. All traffic traversing a SA is provided th

43、e same security protection. The SA itself is a set of parameters to define security protection between two entities. A IPsec Security Association includes the cryptographic algorithms, the keys, the duration of the keys, and other parameters. Security Domain: Networks that are managed by a single ad

44、ministrative authority. Within a security domain the same level of security and usage of security services will be typical. Transport mode: Mode of operation that primarily protects the payload of the IP packet, in effect giving protection to higher level layers. Tunnel mode: Mode of operation that

45、protects the whole IP packet by tunnelling it so that the whole packet is protected. ETSI ETSI TS 133 210 V5.4.0 (2003-06) 7 3GPP TS 33.210 version 5.4.0 Release 5 3.2 Symbols For the purposes of the present document, the following symbols apply: Gi Reference point between GPRS and an external packe

46、t data network Gn Interface between two GSNs within the same PLMN Gp Interface between two GSNs in different PLMNs. The Gp interface allows support of GPRS network services across areas served by the co-operating GPRS PLMNs Mm Interface between a CSCF and an IP multimedia network Mw Interface betwee

47、n a CSCF and another CSCF Za Interface between SEGs belonging to different networks/security domains Zb Interface between SEGs and NEs and interface between NEs within the same network/security domain 3.3 Abbreviations For the purposes of the present document, the following abbreviations apply: AAA

48、Authentication Authorization Accounting AES Advanced Encryption Standard AH Authentication Header BG Border Gateway CS Circuit SwitchedCSCF Call State Control Function DES Data Encryption StandardDoI Domain of Interpretation ESP Encapsulating Security Payload GTP GPRS Tunnelling Protocols IESG Inter

49、net Engineering Steering Group IETF Internet Engineering Task Force IKE Internet Key Exchange IP Internet Protocol IPsec IP security - a collection of protocols and algorithms for IP security incl. key mngt. ISAKMP Internet Security Association Key Management Protocol IV Initialisation VectorMAC Message Authentication Code NAT Network Address Translator NDS Network Domain Security NDS/IP NDS for IP based protocols NE Network Entity PS Packet Switched SA Security Association SAD Security Association Database (sometimes

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1