Tdoc List

2016-07-29 16:20

TDoc Title Source Type For Agenda Avail Treated Decision Wdrn Replaced-by Replaces
S3‑160900 Agenda WG Chairman agenda  
2Approval of Agenda and Meeting Objectives
Yes
Yes
approved No    
S3‑160901 Report from SA3#83 MCC report  
4.1Approval of the Report from SA3 #82
Yes
Yes
approved No    
S3‑160902 SA3 Work Plan MCC Work Plan  
9Review and Update of Work Plan
Yes
Yes
noted No    
S3‑160903 Report from last SA meeting WG Chairman report  
4.2Report from SA #71
Yes
Yes
noted No    
S3‑160904 SA3 meeting calendar MCC other  
10Future Meeting Dates and Venues
Yes
Yes
revised No S3‑161291  
S3‑160905 Work Plan input from Rapporteurs MCC other  
9Review and Update of Work Plan
Yes
Yes
revised No S3‑161283  
S3‑160906 LS response on LS on confidentiality protection of an identity in a value of an XML attribute of an XML element of an XML document included in a SIP message. C1-162978 LS in  
7.6.10Security of MCPTT (MCPTT)
Yes
YesCESG commented that SA3 had already commented that there is nothing to do here. Why does CT1 want to investigate an option where we have said this is not feasible? Why discussing this in CT1 and not in SA3?
replied to No    
S3‑160907 LS on identification of originating MCPTT ID in GMS C1-163039 LS in  
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
replied to No    
S3‑160908 LS on Protecting UE network capabilities from ‘bidding down attack GSMA FSAG LS in  
7.1SAE/LTE Security
Yes
Yes
replied to No    
S3‑160909 LS on Solving Legacy Security Issues GSMA FSAG LS in  
7.6.4GERAN Network Access Security
Yes
Yes
replied to No    
S3‑160910 Liaison Statement on 5G Capabilities and Requirements GSMA LS in  
6.4GSMA
Yes
YesPresented by David Hutton (GSMA). Vodafone: a guide to obsolete features and suplementary services? David (GSMA): this is directed to other players, not 3GPP SA3. Nokia: Interconnection network is not secure is weak. Using the Internet backbone is multiplying the security issues too. David: A secure model for IPX is the way forward. Nokia: it doesn’t help for misbehaving end points. David: We are working towards that point, e.g.more firewall mechanisms for SS7. The Chairman commented that this LS will help SA3 in the NSA work item. Interdigital: Slicing in serving network for home environment. A slice can be created on demand? David: it can be done that way or operators know who their roaming partners are and build it statically.
replied to No    
S3‑160911 Reply to: LS on Clarifications on RRC Resume Request R2-164414 LS in  
7.4Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
noted No    
S3‑160912 LS to SA3 on LWIP counter R2-164551 LS in  
7.1SAE/LTE Security
Yes
Yes
noted No    
S3‑160913 LS on PDCP ciphering for high data rates in eLWA R2-164557 LS in  
7.1SAE/LTE Security
Yes
Yes
replied to No    
S3‑160914 LS on eDRX paging timing calculation and security concern R2-164582 LS in  
6.13GPP Working Groups
Yes
YesDocomo: clashing on paging needs to be resolved.
replied to No    
S3‑160915 Response LS on Clarifications on RRC Resume Request R3-161426 LS in  
7.4Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
noted No    
S3‑160916 LS on Support of EAP Re-authentication for WLAN Interworking S2-162796 LS in  
6.13GPP Working Groups
Yes
YesDiscussed together with 1146 (WID).
noted No    
S3‑160917 LS on progress of FS_xMBMS study item S4-160837 LS in  
6.13GPP Working Groups
Yes
YesNagendra (Nokia) commented that Diameter based MB2 interface should be reused. This would force SA3 to look at the security aspects. Vodafone: there is an editor's note in the TR that refers to security aspects to be dealt with SA3. It was decided to note it.
noted No    
S3‑160918 Response LS on Progress on Security for LWIP SP-160457 LS in  
7.1SAE/LTE Security
Yes
Yes
noted No    
S3‑160919 LS on I-WLAN handling and specification withdrawal SP-160508 LS in  
6.13GPP Working Groups
Yes
YesDiscussed with 1045. Ericsson will take action on this as stated in 1045.
noted No    
S3‑160920 pCR to 33.863 - addition of recomendation section VODAFONE Group Plc pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
revised No S3‑161255  
S3‑160921 WID for normaitive work of BEST VODAFONE Group Plc WID new Agreement
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
YesHuawei rejected having point a. Vodafone would not agree on a WID without point a. The general agreement was to keep a).
revised No S3‑161256  
S3‑160922 pCR to 33.863 - Editorial updates VODAFONE Group Plc pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
approved No    
S3‑160923 pCR to 33.863 - Addition of annex detailing suggested normaitive changes VODAFONE Group Plc pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
YesNokia wanted to evaluate the solutions from this meeting. Orange: there is no contribution from Nokia to challenge solution 8 and 9. Juniper: no time to re-evaluate all the solutions that we have right now. Nokia: the definition of the protocol itself should not be mandated here. We would agree to have the option of having other new solutions. Vodafone: Nokia's concerns are normative work concerns. This is a TR. The detail will go into normative work. Nokia: let’s put solutions in the TR and with contributions we decide which ones will go to the TS. Orange: the TR will give recommendations. Solution 8 and 9 are the way forward. We cannot have a conclusion saying that we can have any solution. Nokia: we need additional work to be done in the TS to make it modular. Vodafone commented that Nokia's rejection to this normative work is clearly delaying the work on purpose.
revised No S3‑161284  
S3‑160924 pCR to 33.899 - update of the Introduction section VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson and Docomo commented that reference to 3GPP working groups and work items should be removed. They also commented that when referring to white papers of other organizations there should be references to them. This was confirmed by MCC.
revised No S3‑161184  
S3‑160925 pCR to TR 33.899 - update of section 4.2 High level security requirements VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesOrange suggested to add a clause on signalling. Claus (G&D): difference between service, network service and NextGen services? Vodafone: to distinguish the new services that don’t exist in legacy networks. Claus (G&D): we should distinguish the different services. Juniper: an editor's note on the need for clear definitions for these services. Qualcomm: no need to have different clauses, the radio interface clause is too detailed to be high level. NTT-Docomo: subscriber privacy left out? It was agreed to be added.
revised No S3‑161185  
S3‑160926 pCR to 33.899 - update of 5.1.2 Security assumptions (Architectural aspects of 5G security) VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
No
No
withdrawn Yes    
S3‑160927 pCR to 33.899 - Reword section 5.2.3.2.2 and 5.2.3.3 as per editors notes VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
No
No
withdrawn Yes    
S3‑160928 Discussion document on the progress of EASE ALGO work item. VODAFONE Group Plc discussion Information
7.5New GPRS algorithms for EASE (EASE_ALGOs_SA3)
Yes
YesNTT-Docomo commented that trying to rush it didn’t look appropiate and a delay would be acceptable. Orange: SA3 will not comment much on the specs given the lack of expertise in cryptography. Docomo commented that they have insisted on public review, not just in SA3 so external review would be also possible. MCC commented that apparently the papers would be sent on Monday of the meeting week, but they needed confirmation from ETSI. It was agreed to choose option one with an exception to be submitted to SA.
noted No    
S3‑160929 TCG progress report INTERDIGITAL COMMUNICATIONS report Information
6.7TCG
Yes
YesNokia: Network equipment subgroup? Interidigital: It's fdor routers, servers, endpoints in the network. The difference would lie in virtualization. Interdigital agreed to contribute with more info on this group.
noted No    
S3‑160930 Removing Editor’s Note in 6.1.2.2 TNO pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
revised No S3‑161250  
S3‑160931 Removing Editor’s Note in 6.1.2.3 of TR 33.863 TNO pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
approved No    
S3‑160932 Removing Editor’s Note in 6.1.2.6 TNO pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
approved No    
S3‑160933 Removing Editor’s Note in 6.2.2.2 TNO pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
approved No    
S3‑160934 Correction of some implementation errors MCC CR Agreement
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
agreed No    
S3‑160935 pCR to TS 33.117 on TC_CONFIDENTIAL_SYSTEM_INTERNAL_DATA Deutsche Telekom AG pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
revised No S3‑160943  
S3‑160936 pCR to TS 33.117 adding test case for "Protecting data and information in transfer" Deutsche Telekom AG pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
revised No S3‑160942  
S3‑160937 NESAS Pilot Release Documents GSMA SECAG LS in  
6.4GSMA
Yes
Yes
postponed No    
S3‑160938 Recording and discreet listening of private communications Airbus Group SAS discussion Endorsement
7.6.10Security of MCPTT (MCPTT)
Yes
YesCESG commented that they preferred solution1. BT commented that recordings can be kept for a long time. We need a requirement for end users.Both features are needed. Motorola didn’t have a preference on the options. CESG commented that more discussion was needed. Maybe to be discussed in SA3-LI? BT: the LI community are not the end users of this. CESG proposed to send an LS to SA3-LI and SA6.
noted No    
S3‑160939 Key issue #2.4: Device identifier authentication INTERDIGITAL COMMUNICATIONS pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesQualcomm suggested for Non tampered: secure and protected instead. Interdigital disagreed. BT: associated device identity credentials and not just credentials storage. Claus:we haven’t agreed on device credentials, agree with BT. Device auth more than device identifier auth. Nokia: device auth is a key issue, auth without credentials would be too difficult. Gemalto didn’t agree with addressing the issue of having device authentication as the only auth needed and performed. The editor's note was removed.
revised No S3‑161202  
S3‑160940 Key issue #5.1: Secure storage and processing of credentials and identities INTERDIGITAL COMMUNICATIONS pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑160941 Key Issue #11.3: User control of security INTERDIGITAL COMMUNICATIONS pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑160942 pCR to TS 33.117 adding test case for "Protecting data and information in transfer" Deutsche Telekom AG pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
YesEricsson didn’t support the test case addition. Huawei and Nokia supported Ericsson.
revised No S3‑161237 S3‑160936
S3‑160943 pCR to TS 33.117 on TC_CONFIDENTIAL_SYSTEM_INTERNAL_DATA Deutsche Telekom AG pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
revised No S3‑161236 S3‑160935
S3‑160944 Key Issue #11.4: On demand security framework INTERDIGITAL COMMUNICATIONS pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑160945 pCR to TR 33.899: Radio interface user plane integrity protection, Solution details VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑160946 pCR to TR 33.899: Authentication section introduction VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161198  
S3‑160947 pCR to TR 33.899: Radio interface key exchange protocol VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161268  
S3‑160948 pCR to TR 33.899: interception of radio interface keys sent between operator entities VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson: this is not really a requirement. It was agreed to re-word the requirements and the key-issue details.
revised No S3‑161270  
S3‑160949 pCR to TR 33.899: UE action if network does not update session keys VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161271  
S3‑160950 Key Issue #8.1: Security isolation of network slices INTERDIGITAL COMMUNICATIONS pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesVodafone: the breach can happen in the network, not only in the UE. Huawei didn’t see clear the data leakage issue. Vodafone: accessing two separate slices forces the UE to avoid the data going through to the different slices. Ericsson: how do you avoid that? BT agreed with this. LG: UE is not aware of network slices. It was agreed to add an editor's note, on the isolation of the UE from several network slices,if it's in scope. Vodafone: two interconnected UEs in different slices (e.g. wearable devices) would need to be addressed too.
merged No S3‑161213  
S3‑160951 Key issue #6.y: Authorization decoupled from Authentication INTERDIGITAL COMMUNICATIONS pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson: scenarios in SA2 that support this decoupling? An editor's note was added for this. Nokia: First sentence in key issue details is not true: we have user subscriber profiles.
postponed No    
S3‑160952 pCR to TR 33.899: Proposal of key hierarchy for 5G security NEC pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesVodafone: no requirements without security threats. Interdigital: one set of control plane keys in the figure. A slice is not a complete network from end to end. This contribution was discussed with the similar 1101 from Qualcomm. Qualcomm: is the control plane the same for all slices? NEC: only one common control plane. Vodafone: it is likely that there will slices in both user and control planes. Nokia: control function common or split is still being discussed in SA2. Orange: slicing is also being defined in RAN so we also depend on their outcome. NEC: Key hierarchy should be defined separately from the architecture.
revised No S3‑161192  
S3‑160953 pCR to TR 33.899: Proposal of solution for key issue of network slicing security NEC pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesOrange: Roaming case and privacy aspects to be considered. Nokia: slice security server? How do you define this? How different is from the HSS? Interdigital: SSS has policies per slice. Orange: what are the interfaces to the HSS? We need to figure out these details. Huawei agreed.
revised No S3‑161265  
S3‑160954 pCR adding the skeleton of TS 33.250 China Mobile Com. Corporation, ZTE, Telecom Italia draft TS Approval
7.2.3TS 33.zzz (SCAS_PGW)
Yes
Yes
revised No S3‑161242  
S3‑160955 Correction of CR implementation omissions MCC CR Agreement
7.3Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
Yes
YesMCC commented that these were implementation errors brought to this meeting for formal agreement. These issues were agreed already in CR#0040. This CR was merged with 1092 which clashed with the figure change proposed in 1092.
merged No S3‑161179  
S3‑160956 Split of key issue #7.1 on subscriber identifier privacy Ericsson, Nokia, Telecom Italia discussion Discussion
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
noted No    
S3‑160957 Update of key issue #7.2 on refreshing of temporary subscriber identifier Ericsson, Nokia, Telecom Italia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑160958 New privacy key issue on concealing permanent or long-term subscriber identifier Ericsson, Nokia, Telecom Italia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161285  
S3‑160959 New privacy key issue on concealing permanent or long-term device identifier Ericsson, Nokia, Telecom Italia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑160960 New privacy key issue on using effective temporary or short-term subscriber identifiers Ericsson, Nokia, Telecom Italia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑160961 New privacy key issue on transmitting permanent identifiers in secure interface Ericsson, Nokia, Telecom Italia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑160962 New privacy key issue on transmitting permanent subscriber identifiers only when needed Ericsson, Nokia, Telecom Italia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑160963 Deletion of key issue #7.1 on subscriber identifier privacy Ericsson, Nokia, Telecom Italia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑160964 An overview of NextGen security architecture ZTE Corporation pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson: virtualised or not they are network functions (VsF in figure). Orange: network access security and secure access to services. What's the intention here? ZTE: it's coming from 33.401. Orange: what is the trusted storage computing? Where is this figure coming from? Huawei: no connection from the 3GPP AN to the core network. ZTE: this is coming from 33.401 and 23.799, combined with some modifications. Orange: we need to be clear on where this figure is coming from. Nokia didn’t agree with the figure capturing SA2 agreements. 3GPP AN access, network slice connections don’t capture the agreements. We need to wait for SA2 before having such a figure. BT: it would be good to agree on a figure like this for 33.401.Orange supported this, although they didn’t agree on this one.
noted No    
S3‑160965 Key hierarchy schems for network slicing ZTE Corporation pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161140  
S3‑160966 Security for serving functions not in physical protected place ZTE Corporation pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesInterdigital: access networks are not insecure in principle. Vodafone: access networks are harder to protect, it does not necessarily means that are insecure. We need a mechanism to know where to locate the function. Close or far is not enough. What do they mean? Vodafone: this document needs heavy re-wording.
revised No S3‑161193  
S3‑160967 Signing of Access Tokens Motorola Solutions Danmark A/S CR Agreement
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
revised No S3‑161195  
S3‑160968 Fix Identity Management interface Motorola Solutions Danmark A/S CR Agreement
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
revised No S3‑161227  
S3‑160969 Key Issue for inter-domain identity management operation Motorola Solutions Danmark A/S pCR Approval
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
Yes
revised No S3‑161218  
S3‑160970 Identity management for inter-domain operation Motorola Solutions Danmark A/S pCR Approval
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
Yes
revised No S3‑161219  
S3‑160971 New work item for Security Architecture for Mission Critical Services Motorola Solutions Danmark A/S WID new Agreement
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
revised No S3‑161196  
S3‑160972 R-14 mission critical TS strategy Motorola Solutions Danmark A/S discussion Endorsement
7.6.10Security of MCPTT (MCPTT)
Yes
YesNokia supported approach #2. This was agreed by SA3 as well.
endorsed No    
S3‑160973 SA3 response to LS S3-160907 (C1-162780) Motorola Solutions Danmark A/S LS out Approval
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
revised No S3‑161151  
S3‑160974 3.1 Definitions - Device INTERDIGITAL COMMUNICATIONS pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑160975 pCR to TR 33.899: Authentication of the user VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesNokia: Associating the user with the device is associating two identities. Vodafone: the device is the UE. The content will be reviewed according to the discussion on the definition of device.
revised No S3‑161260  
S3‑160976 New privacy key issue on temporary device identifier Nokia, Ericsson, Telecom Italia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑160977 NSA Adding new security area on broadcast multicast Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161186  
S3‑160978 NSA new security area on interworking and migration Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesMCC commented that all references to 3GPP working groups, working methods, tdoc numbers and so on should be removed from the Introduction. The specification should refer to other 3GPP specifications in this case. It was agreed to move such references to the Editor's note in the Introduction.
revised No S3‑161188  
S3‑160979 NSA - 5.3.3.3 - addressing ENs on bidding down attack and requirements reformulation Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑160980 V2X requirement on updating of crypto Nokia pCR  
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesCESG pointed out the issue of management of updating the algorithms. This was put in an editor's note. Klaus: clarify security maintaninability in the requirement. This was agreed.
revised No S3‑161172  
S3‑160981 V2X Discussion on privacy requirements by regulation Nokia discussion  
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesOrange: the operators are aligned with this, no problems with LTE related procedures in EU. It’s already compliant. In the US part, we identify network identities linked to billing identity, not V2X identities. The security network is not impacted, it's about the identity part. This is outside the scope of 3GPP. Vodafone: we can use these V2X identities in our specs. Orange: in SA3 we don’t work at application level. It’s a separate issue from the IMSI. Qualcomm: it's up to SA1 to decide on the regulator requirements.An LS was sent for clarification already. They are meeting in August. Ericsson: ITS document on privacy issues should also be considered here.
noted No    
S3‑160982 V2X Annex on privacy by regulation EU Nokia pCR  
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesWaiting for SA1 to take action.
postponed No    
S3‑160983 V2X Annex on privacy by regulation US Nokia pCR  
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesWaiting for SA1 to take action.
postponed No    
S3‑160984 NBIoT UP Solution CR Nokia, Ericsson CR Approval
7.4Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
agreed No    
S3‑160985 Discussion paper on disabling PDCP ciphering Nokia, Intel discussion Discussion
7.1SAE/LTE Security
Yes
YesQualcomm: If we disable PDCP cyphering the solutions described here will not work. The concept of trusted/untrusted is not available in the serving network. We don’t agree with disabling PDCP cyphering. Nokia: RAN should work to get that information in the eNodeB (trusted/untrusted concept). Docomo: we had this discussion before, we should have PDCP active. BT: performance issue with double encryption. The UE is getting more complex. Qualcomm: the performance will not be affected. Turning on and off would be more effective.
noted No    
S3‑160986 draft_LS response on disabling PDCP ciphering Nokia, Intel LS out Approval
7.1SAE/LTE Security
Yes
Yes
noted No    
S3‑160987 Network Slice: EN in 5.8 intro and assumptions Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesDiscussed with 1126 since they overlap.
merged No S3‑161212  
S3‑160988 Network Slice: 5.8.3.1 key issue isolation of slices Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesVodafone: we need a definition of tenant. Orange: multi tenants concept is a SA2 definition. It was agreed to have an editor's note on this and ask SA2 on the tenant,multi-tenant concepts. Ericsson: network slice type is not defined in SA2. The text in the key issue is one understanding, but it is not how it is going to work. It needs to be clarified how it is going to work in the end, there is no agreement in SA2 for this. Interdigital: also the issue of being an UE, NG UE or device what we are referring to here. Interdigital: add roaming scenarios in the potential requirements.
merged No S3‑161213  
S3‑160989 Network Slice: EN in 5.8.3.2 Slice differentiation Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson: the network selection procedure is still being discussed in SA2, still one interpretation. Vodafone: default network slice, controller node,..there are a lot of new definitions that need to be specified in the document. Adding this controller node means new threats and new requirements associated to this new definition. An editor's note was agreed for this, Ericsson: "it should be possible to define access security mechanisms" is not a real requirement, it's not how we define requirements in here. Orange and BT found the requirement vague. This had to be discussed offline.
revised No S3‑161215  
S3‑160990 Network slice: EN in 5.8.3.7 interslice communication Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson: there is no refrence point defined between slices. Orange agreed. It was agreed to create a document for all those definitions that need to be discussed (1263). Huawei and Orange: what is sensitivity level? It should be defined somewhere else. An editor's note was added.
revised No S3‑161264  
S3‑160991 Security aspects of Connectionless RAN-CN interface Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson: no need to describe all solutions, just enumerate them.
revised No S3‑161189  
S3‑160992 pCR to TR 33.899: Network public keys VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson suggested to add an editor's note. Orange: managing a global CA is a problem among the operators. Vodafone: this is an evaluation of the solution. Orange: it's for FFS if it's achievable.
revised No S3‑161282  
S3‑160993 V2X privacy - a way forward LG Electronics France discussion Discussion
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesThere is no decision on having IMSI anonymised. Orange doesn’t agree with this. The Chairman asked whether there was anyone agreeing with proposal one. No one replied, so this was gone. Orange: we sent an LS to SA1 already since we didn’t understand those requirements. We don’t need to send this LS. Ericsson preferred to have clarification on this privacy regulation by sending this LS. Vodafone commented that V2X is a 5G feature and expressed their surprise of this not being in NSA. Huawei: it is defined for LTE now. Vodafone: so this is not working in 5G? The Chairman commented that V2X is potentially in 5G. Vodafone: the privacy in 5G may have an effect on the solution we find for V2X.
noted No    
S3‑160994 Draft LS on V2X privacy clarification LG Electronics France LS out Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesVodafone: does this mean that we have to create a special case for V2X? Not clear. The Chairman commented that since proposal one in the previous contribution was discarded the content here could not be sent.
noted No    
S3‑160995 Enhancing the concealment of permanent or long-term subscriber identifier Ericsson,Telecom Italia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161288  
S3‑160996 Update of V2X attach id obfuscation LG Electronics France pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesOrange: Anonimty with respect to the third party who knows the IMSI. So there is no anonimity. It doesn’t solve the problem. We are also waiting for SA1's response. Huawei: this is a study that can be continued without having to submit it for the next SA plenary as originally planned. Orange wanted an editor's note with their comments: anonymity with respect to the third party.This was agreed.
revised No S3‑161158  
S3‑160997 Solution for Network Slicing Security LG Electronics France pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161266  
S3‑160998 Solution for NSA security context sharing LG Electronics France pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesNokia: this only applies to trusted access, not untrusted access. Some other comments from Nokia were treated offline.
noted No    
S3‑160999 Update of NSA security area #11 Security visibility and configurability LG Electronics France pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑161000 Secure Mechanism to Achieve Remote Credential Provisioning for IoT devices Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑161001 Resolving Editor’s notes in Key Issue #2.1 Authentication framwork Huawei, HiSilicon pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
noted No    
S3‑161002 PCR of User Plane Security Protection Huawei, HiSilicon, Deutsche Telekom AG, Vodafone pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesNokia: Key issue description looks more like a solution. Orange: why do we need KMS as a separate function for key derivation? We can reuse what we have. Huawei: it’s a logical entity, it can be located anywhere. Ericsson clarified that this describes a session based security solution. LG: there is no negotiation procedure here. Qualcomm: There are different policies and we need to clarify where they are coming from (e.g. policy control). Nokia: there is a risk of confusion when using "policy control" since it could be confused with the PCRF.
revised No S3‑161197  
S3‑161003 Key Issue of Security for Service Provider Connection Huawei, HiSilicon, Deutsche Telekom AG, KPN pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesOrange: where are the requirements for SA3 in 22.861? It was decided to check this offline. Orange: No defintion of service provider in 3GPP -> it becomes third party in the contribution.
revised No S3‑161203  
S3‑161004 Remote Provisioning for IoT devices through a Companion UE Huawei, Hisilicon, China Mobile, Deutsche Telekom AG, KPN pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑161005 Security Context and Key Management Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesNokia found the auth and security derivation flow not clear. The term seccurity context is used in different ways. Orange: What is supplicant? Huawei: this is defined in SA2. The Chairman suggested to refer to the solution in SA2 and change the text accordingly. Nokia: some access special module in the UE is requesting authentication. This is for further study,
revised No S3‑161278  
S3‑161006 Detailed Requirements for Security Mechanism Differentiation for Network Slices Huawei, HiSilicon,Deutsche Telekom AG pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesOrange disgagreed with the requirement. Only agreed with the sentence with "security policy…". Interdigital agreed with the requirement. This issue was related to the LS to SA1. Gemalto suggested an editor's note detailing that this requirement is dependent on the LS. This was agreed.
revised No S3‑161258  
S3‑161007 Threats for Security Context Sharing Huawei, HiSilicon,Deutsche Telekom AG, China Mobile pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161274  
S3‑161008 The Authentication & Authorization Scenarios of UE Accessing into Network Slicing Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson: it should have been in key issue authentication. It was noted that this overlapped with several other contributions.
merged No S3‑161262  
S3‑161009 The storage of security context Huawei; HiSilicon pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161144  
S3‑161010 Security context for connectionless mode Huawei; HiSilicon pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson: the key details are not clear. This can be any threat.An editor's note was added. MCC: remove the SMARTER term and add reference to 22.891 Connectionless becomes small data.
revised No S3‑161277  
S3‑161011 pCR adding security assumptions in security area 5.4 THALES pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesNokia suggested to remove the second paragraph. The first paragraph is a description of the architecture that should go to another part of the specification. This was finally noted.
noted No    
S3‑161012 Discussion paper for SCAS-PGW TNO discussion Discussion
7.2.3TS 33.zzz (SCAS_PGW)
Yes
No
withdrawn Yes    
S3‑161013 Removing Editor’s Note in 6.4.2.3 TNO pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
No
withdrawn Yes    
S3‑161014 Discussion on the necessity to reinforce the radio air interface for the next generation system THALES discussion Discussion
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161019  
S3‑161015 Moved EnSE functionality to Enterprise Server TNO pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
YesOrange: there is no definition for enterprise server.
noted No    
S3‑161016 pCR to TS 33.250 - Adding an EN in section 5.3.3.1.2 on P-GW and traffic forwarding TNO pCR Approval
7.2.3TS 33.zzz (SCAS_PGW)
Yes
YesIt was agreed to remove security objectives in 1121 and 1120. All references will be checked when renumbering the clauses, in both 33.117 and 33.926. 5.2.3 was proposed to keep it as an empty clasuse.
merged No S3‑161242  
S3‑161017 pCR adding key issue in security area 5.4 THALES pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesNokia: Disclosure of auth parameters belongs to the privacy issues addressed somewhere else. Nokia: Also,some part of this text is already adressed in one of the Vodafone's contributions, security areas 2 and 3. Thales: refer to the signalling data before the auth is established to make it more generic. Nokia: this is not a threat, physical layer signalling, not to be addressed in SA3. Thales: all the attacks are coming this way now, we need to address this in 5G.
noted No    
S3‑161018 pCR to TR 33.899 New key issue - Secondary authentication by 3rd party service Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161204  
S3‑161019 Discussion on the necessity to reinforce the radio air interface for the next generation system THALES discussion Discussion
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesNokia: this is a notion that everything we have done from GSM is insecure. Thales: it’s not a standalone solution but a brick in the wall of a whole set of new solutions. We need to consider new kinds of solutions as well.
noted No   S3‑161014
S3‑161020 FS_NSA - Update to Key Issue #8.3 – Security on UE’s access to slices Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson: not generic enough, this is still under work in SA2. Huawei proposed to agree on the key issue details and add an editor's note to go on. This was agreed. Huawei considered that figures in 1008 were a better representation than the text in 1020. LS supported this.
merged No S3‑161262  
S3‑161021 Key issue about data communication security between network entities Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
revised No S3‑161166  
S3‑161022 Key issue about V2I broadcast communication security Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesOrange: who authorizes the UE in the second requirement? Huawei: The network. It was also commented that requirements should be written in active voice to avoid ambiguities on who is doing the action.
revised No S3‑161167  
S3‑161023 Security of UE to V2X Control Funtion interface Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
revised No S3‑161176  
S3‑161024 Adding References and Definitions and Abbreviations Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
revised No S3‑161156  
S3‑161025 Corrections to TR 33.885 Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
revised No S3‑161157  
S3‑161026 Adding Architecture section Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesNokia: we should refer to the TS, not the TR in SA2.
merged No S3‑161155  
S3‑161027 Data communication security between network entities Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No    
S3‑161028 Key issue about security of UE to V2X Control Funtion interface Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesNokia: it may be applicable to the whole V3 interface. It was agreed to remove "configuration" in the requirements so it is applicable to all data. Interdigital proposed to reword "eavesdropping", it was not the correct term. Qualcomm proposed " stored in a confidentiality protected way". This was agreed.
revised No S3‑161175  
S3‑161029 Security for V2X Broadcast Communication: Life Time of Credentials Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
revised No S3‑161168  
S3‑161030 Security for V2X Broadcast Communication: Replay Protection Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No    
S3‑161031 Security for V2X Broadcast Communication: Introducing Temporary ID management Function for V2X Data Source Accountability Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesNokia: is it in scope to add new identities? Huawei: it's part of the security architecture. Orange: no impact on network level identities, this influences application layer IDs. Added a note and an editor's note concerning Orange and BT's comments.
revised No S3‑161169  
S3‑161032 A Method for IoT Service Layer Security Bootstrapping Huawei, Hisilicon pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
revised No S3‑161141  
S3‑161033 Service Layer Security Bootstrapping Mechanism for IoT Devices Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
revised No S3‑161142  
S3‑161034 LS on "Next Generation" Security Requirements S2-164263 LS in  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161131  
S3‑161035 Corrections to 33.179 HUAWEI TECHNOLOGIES Co. Ltd. CR Approval
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
revised No S3‑161229  
S3‑161036 Clarification on floor control signalling protection Huawei, HiSilicon CR Approval
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
revised No S3‑161143  
S3‑161037 LWA editorial corrections Huawei, HiSilicon CR Agreement
7.1SAE/LTE Security
Yes
YesNokia and Qualcomm commented that the first change was out of scope.
revised No S3‑161220  
S3‑161038 LS on Improvement to authentication procedure for supporting Emergency Service on WLAN S2-164273 LS in  
6.13GPP Working Groups
Yes
YesNokia: 33.402 may be impacted.
noted No    
S3‑161039 Clarification in logging access to personal data Huawei; HiSilicon pCR  
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
revised No S3‑161221  
S3‑161040 Clarification in Authentication policy Huawei; HiSilicon pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
revised No S3‑161239  
S3‑161041 Clarification in Authentication policy Huawei; HiSilicon pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No    
S3‑161042 Remove “shall” from the TR Huawei, HiSilicon CR Approval
7.2.4Other
Yes
Yes
revised No S3‑161244  
S3‑161043 pCR to TR 33.899: Enhancing DH session key derivation VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161044 pCR to TR 33.899: UEs with Asymmetric Keys VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesGemalto: one key is a weakness. If you attack this key everything is down. They didn’t agree with the contribution. Huawei and BT supported the contribution. This was taken offline. Claus (G&D): quantum key cryptography is too far away. Vodafone: this is a TR. Gemalto supported this sentence.
revised No S3‑161259  
S3‑161045 I-WLAN feature withdrawal Ericsson discussion  
7.6.12Other work items
Yes
YesVodafone: did SA agree on a WID for this work? Anand (Chairman) replied that this will go under TEI13.
endorsed No    
S3‑161046 LS to SA1 on factory automation requirements ORANGE LS out Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161159  
S3‑161047 Additional Security Requirements on credential storage ORANGE pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161160  
S3‑161048 Introduction to Diet-ESP Ericsson discussion Endorsement
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
YesUS Home Office: strongly recommended not to use this protocol. This is not an official IETF document, and it was rejected due to being insecure. The Chairman clarified that SA3 is endorsing the request part, the rest is for information. Nothing will be added to the TR.
endorsed No    
S3‑161049 2G Security improvements ORANGE CR Agreement
7.6.4GERAN Network Access Security
Yes
Yes
revised No S3‑161161  
S3‑161050 pCR to TS 33.117 Editorial correction to testcase "TC_ IP_MULTICAST_HANDLING" Nokia Networks pCR  
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No    
S3‑161051 Enforce mutual authentication ORANGE CR Agreement
7.6.3UTRAN Network Access Security
Yes
Yes
revised No S3‑161162  
S3‑161052 pCR to TS 33.117 - Revision of the testcase "TC_GRATUITOUS_ARP_DISABLING Nokia Networks pCR  
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No    
S3‑161053 pCR to TS 33.117 - Enhancing the testcase "TC_BVT_ROBUSTNESS AND FUZZ TESTING" Nokia Networks pCR  
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No    
S3‑161054 Potential requirements for credential storage Ericsson pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑161055 Clarifying which RFC is relevant for ECDSA Nokia, Gemalto CR  
7.6.2Network Domain Security (NDS)
Yes
YesNokia commented that there is a new RFC, so a decision was to be made whether to refer to the new RFC or to the old one. Ericsson: this RFC contains three variants of the same algorithm. If we go for the old RFC we have to specify further, whether to mandate three hashes. Ericsson: is there anything implemented? US Office commented that they were querying about the current status of the implementation. The Chairman commented that it made sense to delay this CR until we had more information.
postponed No    
S3‑161056 Adding Rel-13 Key Issues to 33.880 CESG pCR Agreement
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
Yes
revised No S3‑161170  
S3‑161057 Discussion on adding Rel-13 key issues to 33.880 CESG discussion Discussion
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
Yes
noted No    
S3‑161058 Scope for Mission Critical security study CESG pCR Approval
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
Yes
approved No    
S3‑161059 Update to study item for Study on Mission Critical Security Enhancements CESG SID revised Agreement
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
Yes
agreed No   S3‑160727
S3‑161060 Mission Critical security study document template CESG draft TR Approval
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
No
withdrawn Yes    
S3‑161061 Clarifications to 33.179 CESG CR Agreement
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
agreed No    
S3‑161062 Correcting GMK revokation in TS 33.179 CESG CR Agreement
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
agreed No    
S3‑161063 pCR to TR 33.863, v1.1.1: Solution #10 (extends sol. 2): "AKA-based session key generation for application protocols" Nokia pCR  
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
YesVodafone: update the solution evaluation to say which issues are solved. Edit the conclusions clause. BT: don't duplicate work in the groups, this is ongoing work in OneM2M. Colaboration with them could be useful. Vodafone: this is battery efficiency, very specific. BT: We need to coordinate with those who define the applications (OneM2M). Juniper: this is an end-to-end complete solution.
revised No S3‑161252  
S3‑161064 LWIP - Correction of the UEs IP address Ericsson CR Agreement
7.1SAE/LTE Security
Yes
Yes
agreed No    
S3‑161065 Key Issue #2.1: Authentication framework INTERDIGITAL COMMUNICATIONS pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes1123 proposed a similar issue, so both tdocs were merged.
merged No S3‑161199  
S3‑161066 MC_SEC 33.880 Study Template CESG draft TR Approval
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
Yes
approved No    
S3‑161067 pCR to TR 33.899 v0.3.0 "Architecture - modifying key issue titles" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161068 Key Issue #8.2 - Security mechanism differentiation for different network slices INTERDIGITAL COMMUNICATIONS pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesNoted without presentation.
noted No    
S3‑161069 pCR to TR 33.899 v0.3.0 "Architecture - security features on AN-CN interfaces" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161070 pCR to TR 33.899 v0.3.0 "Architecture - security features on CN-CN interfaces" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161071 New privacy key issue on protection of network slice identifier Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesBT: we have removed the term MDD from other contributions. It was agreed to remove it. Ericsson: This is ongoing work in SA2. We should postpone it. Interdigital: privacy applies to humans. In NextGen we will have non human objects. A CCV camera doesn’t have any privacy. Huawei: the UE doesn’t have the notion of slice. Nokia: the threat is written from the attacker's point of view, not the UE.
revised No S3‑161287  
S3‑161072 pCR to 33.885 - New Key Issue on Detectability of Malicious behaviour TNO pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesEricsson: safety related aspects are out of scope. There are other SDOs dealing with this. We cannot address faulty mechanisms here. They proposed to add and editor's note questioning the vailidy of this. Interdigital: the networks should detect strange behaviour in the car (e.g. sensing ice in a summer day). BT: selecting disabling determined devices is a possibility but out of scope. Huawei: the requirement is to disabling the sending of the erroneous data but not disabling the whole device. Orange: there are no requirements here, let's put editor's notes addressing these issues. This was agreed.
revised No S3‑161177  
S3‑161073 pCR to add a solution 'back-off timer' for key issue 5.2.3.7 TNO pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161200  
S3‑161074 pCR to TR 33.899 v0.3.0 "Authentication framework - key issue" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161075 pCR to TR 33.899 v0.3.0 "Authentication framework - requirements" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesOrange: the second requirement does not correspond to the current SA2 specification. Nokia commented that this was taken probably from a previous version of the SA2 spec.
revised No S3‑161201  
S3‑161076 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - candidate methods" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161077 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - transport considerations" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesSamsung: RAN should be included for the transport of authentication. Huawei: AAA in home network or visited network? Nokia: this is still open. It was agreed to add an editor's note on this.
revised No S3‑161205  
S3‑161078 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - efficiency considerations" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161206  
S3‑161079 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - general information flow" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesOrange: third party auth server is not clear to exist in 5G according to the requirements. An editor's note was added to address this issue.
revised No S3‑161207  
S3‑161080 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - alternatives" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161208  
S3‑161081 EAP Encapsulation Protocol Samsung pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesHuawei: CP-AU is not the right term. Samsung: it's the key. Discussed together with 1084.
revised No S3‑161210  
S3‑161082 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - initial evaluation" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161083 Key issue Security requirements on gNB Ericsson pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesNokia: what virtual deployments of gNodeB? Ericsson: this was discussed in RAN. Nokia wanted an editor's note for more explanation on this core deployment,
revised No S3‑161279  
S3‑161084 New solution to security area #2: EAP authentication framework Ericsson pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesQualcomm: CP-AU in home network, similar to AAA server. Nokia: CP-AU, AAA terminology is ambiguous and their definitions are unclear according to SA2's work. A decision needs to be made in SA3 to clarify the terminology. Samsung;s 1081 and Ericsson's 1084 are using different terminology.It was concluded to add editor's notes on 1207,1210,1209 for this.
revised No S3‑161209  
S3‑161085 Key issue Security aspects of dual connectivity Ericsson pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesBT: in 33.401 we talk about dual connectivity already, Nokia: is this dual connectivity scenarios or interworking scenarios? Ericsson: this is dual connecitvity. Nokia: where to put this? It's a new security area. MCC: not possible to reference a tdoc (SA plenary doc in this case). BT: Restrict to the scenarios that the plenary/operators endorsed in that document. It was agreed to reword the text that referred to the tdoc and remove the referencce.
revised No S3‑161280  
S3‑161086 pCR to TR 33.899 v0.3.0 "Replacing solution 2.2 with reference to solution 3.1" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161267  
S3‑161087 pCR to TR 33.899 v0.3.0 "Evaluation of Solution #3.1: Including a key exchange..." Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161269  
S3‑161088 Remaining open issues in EASE: problem descriptions and solution proposals Ericsson discussion Decision
7.3Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
Yes
Yes
noted No    
S3‑161089 Verification of authenticity of the cell Samsung R&D Institute UK pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161257  
S3‑161090 pCR to TR 33.899 v0.3.0 "Network Authorization" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161091 Interconnection Security Key Issue Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑161092 Corrections to EASE Ericsson CR Approval
7.3Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
Yes
Yes
revised No S3‑161180  
S3‑161093 Interconnection Security - Circles of Trust Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑161094 Correcting a requirement for Vehicle UE Privacy (V2X) Qualcomm Incorporated pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesOrange: this depends on the response from SA1.
approved No    
S3‑161095 Hiding the subscriber IMSI from the serving network for V2X Qualcomm Incorporated pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesOrange: how does the MME discover the home network and how is the request of authorization is routed? Qualcomm: CT1 will probably decide eventually. Orange: we don’t know the deployment options, so not true that there is one HSS in there. Todor didn’t understand how the privacy issue is handled here. The MCC needs to be provided. Orange: Home PLMN instead of Home V2X network. Orange: Auth vector request is routed for the second option is more an stage 2 option than stage 3. BT: agree with Todor, and also this is not aligned with 5G proposals. Interdigital: encryption of the IMSI is random. Qualcomm agreed. It was agreed to have an editor's note. CESG: denial of service attack to the HSS needs to be considered. Nokia: step 2 in 6.x.2.1 means additional complexity and there are other ways to get around that. CESG: LI aspects to be considered as well. A group of editor's notes will include these and more concerns from the companies.
revised No S3‑161163  
S3‑161096 Reattach procedure for Vehicle UE Identity Privacy Qualcomm Incorporated pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesNokia: large load on the eNodeB. It was agreed on having an editor's note on this.
revised No S3‑161164  
S3‑161097 Vehicle UE privacy based on data traversing the network Qualcomm Incorporated pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesEricsson: There is a NAT so you can’t see the IP of the UE. Qualcomm: if the NAT address doesn’t change it's ok. Ericsson: the IP address needs to be changed everytime the UE attaches, then. Qualcomm: this is one of the proposals. Huawei: the application layer doesn't know what the lower layer is doing. Nokia: we need to study the performance impact on the HSS.
revised No S3‑161165  
S3‑161098 Baseline architecture for V2X Qualcomm Incorporated pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
merged No S3‑161155  
S3‑161099 Legitimacy of V2X messages on key issue for data source accountability Qualcomm Incorporated pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
revised No S3‑161173  
S3‑161100 pCR on allowing non-radio interface keys to be refreshed in the existing key issue on Refreshing radio interface keys Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161273  
S3‑161101 pCR solution to Key # 1.2 on the need a security anchor Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesVodafone: The solution is as vulnerable as the equivalent solution in LTE (with Kasme). Qualcomm: we cannot assume all credentials will be in HSS.. Ericsson supported Orange: this should be read in the context of SA2, how they specify the AAA entity. Qualcomm: maybe an editor's note about a decision that needs to be taken on the split storage of credentials. Nokia: in 33.402 we split AAA and HSS already. Orange: AAA is only used in non 3GPP access, do we need it now for all use cases? It’s an open issue. Huawei: CP-AU can be in both home or visited network. Nokia: it is for further study whether CP-AU can change when the UE moves. Huawei: we need to decided whether in NextGen we will have an HSS or not.
revised No S3‑161191  
S3‑161102 Adding requirements to the Key Issue # 5.1 and a new key issue on storage of device credentials Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑161103 pCR on a proposed solution for IMSI privacy Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesInterdigital: you can track the mobile by routing the labels. Same editor's note as the previous contribution. Orange: what happens when message 3 is lost? Qualcomm: an editor's note will be added to explain this.
revised No S3‑161289  
S3‑161104 pCR on New key issue on on-demand AS integrity protection in NextGen systems Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesOrange: User or control plane? Qualcomm: user plane traffic. Nokia: a similar problem happens in LTE, not only in 5G. I would like to add a note about this. Orange: the requirement is for the user plane, please specify that.
revised No S3‑161281  
S3‑161105 Solution for Key issue #2.4: Device identifier authentication Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesVodafone: every operator's AAA needs to have all certificate devices. It might be an issue for new parties coming to the market. Roaming is also an issue. An editor's note was added. BT: nuimber of subscriptions and number of devices are different. Scaling is an issue. Interdigital: what is the secure storage/secure part of the device? Qualcomm: it is defined in another contribution. Orange: the operator depends on the manufacturer CA or third party CA here, this is against the requirements.
revised No S3‑161211  
S3‑161106 Finalising Key issue #3.5: Unnecessary dependence of keys between security layers Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesNokia: requirement not clear. NTT-Docomo: the requirement is good but it needs re-wording. Orange: what does "unnecessary" mean?
revised No S3‑161275  
S3‑161107 pCR to TR 33.899 v0.3.0 "Security visibility and configurability" Nokia pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No    
S3‑161108 Secure delivery of IOV-values to the MS in enhanced GPRS Ericsson CR Approval
7.3Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
Yes
Yes
merged No S3‑161179  
S3‑161109 Availability of the control plane in Next Gen TNO pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesOrange supported this contribution. Interdigital: why only UE? It would be for anything connected to the network. It was agreed to add an editor's note on the lack of definition or terminology about UE. BT: the attacks can come from false networks too.
merged No S3‑161185  
S3‑161110 Installing PMK at the WLAN AP using EAP Blackberry, Qualcomm Incorporated CR Approval
7.1SAE/LTE Security
Yes
YesMCC commented that the NOTE contained the words "is required", which is incorrect since notes should not contain requirements. This was reworded.
revised No S3‑161222  
S3‑161111 WID on Security Assurance Specification for eNB Huawei, HiSilicon WID new Agreement
7.2.4Other
Yes
YesBT noted that it was agreed not to do this process with several entities in parallel. Do we want to change our minds? NTT-Docomo was fine with this as long as the eNodeB was removed from the scope. Nokia agreed to cut out eNodeB. This will be a bigger step than the core network nodes, a quite different job. We should finish with the core network nodes first. Huawei: this will take a longer time so better to start soon. China Mobile agreed with having the eNodeB before the rest of core network nodes. It was agreed to go straight to the TS for the eNodeB instead of using a TR.
revised No S3‑161245  
S3‑161112 Protecting against the modification of Attach/TAU Request attacks Qualcomm Incorporated CR Approval
7.1SAE/LTE Security
Yes
Yes
revised No S3‑161217 S3‑160562
S3‑161113 pCR to 33.899 - Resolution of EN in 5.3.3.2.3 TNO pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesQualcomm suggested removing e2e as editorial change. This was agreed.
revised No S3‑161272  
S3‑161114 pCR revise the details of key issue# 8.1 China Mobile Com. Corporation, China Unicom pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161213  
S3‑161115 pCR : merge the requirements of key issue #8.1 China Mobile Com. Corporation, China Unicom, Huawei, Hisilicon pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesVodafone: the 3GPP system includes more than a platform.
noted No    
S3‑161116 Removing Editor’s Note in 5.2.6.2.3 TNO pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
YesNokia: 33.116 has a requirement on GTP-C, and here we generalize to GTP both user and control plane. Changes in 33.117 should be compatible with what we intended with the MME in 33.116. Do we have to go through every specific entity TS every time we make a change in the general catalog? Docomo: would apply this to eNOdeB which is the other end of GTP-U? The answer was yes. Every time we make a change in the generic requirement we have to see what happens in every enitity. Nokia: we can’t have a new requirement every time we make a change. It was decided to include new requirements in the entities when a change was made in the general catalog. The document was revised for this objective.
revised No S3‑161240  
S3‑161117 pCR adding the definition of security anchor in the section 3.1 China Mobile Com. Corporation, Huawei, Hisilicon pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161150  
S3‑161118 proposed/draft reply LS on eDRX security NTT DOCOMO LS out Approval
5Items for early consideration
Yes
Yes
revised No S3‑161153  
S3‑161119 handling editor's notes in 33.916 NTT DOCOMO pCR Approval
8.2TR on Security Assurance scheme for 3GPP network products (33.916) (SCAS-SA3TR)
Yes
Yes
approved No    
S3‑161120 handling editor's notes in 33.116 NTT DOCOMO pCR Approval
7.2.1TS 33.116 (SCAS-SA3)
Yes
YesMCC commented that there cannot be VOIDs in clauses since this is a draft. Renumbering of clauses would be required.Docomo commented that they would find a way to avoid this to keep the numerous references between clauses.
revised No S3‑161231  
S3‑161121 handling editor's notes in 33.117 NTT DOCOMO pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No    
S3‑161122 pCR to 33.117 to 5.2.3.4.3.3 introducing password blacklists NTT DOCOMO INC. pCR  
7.2.2TS 33.117 (SCAS-SA3)
Yes
YesNokia commented that this was hard for the manufacturers to comply with.
revised No S3‑161238  
S3‑161123 pCR adding the potential security requirements into the section 5.2.3.7 China Mobile Com. Corporation, Huawei, Hisilicon pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesBT wanted to keep the back off mechanism.TNO supported this since they also propose it in 1073. Ericsson commented that the second requirement on back off should go away.
merged No S3‑161199  
S3‑161124 PDN GW Security Issues TNO discussion Discussion
7.2.3TS 33.zzz (SCAS_PGW)
Yes
Yes
noted No    
S3‑161125 pCR choice of authentication methods China Mobile Com. Corporation, Huawei, Hisilicon pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesVodafone: the threat is a bit OK. China Mobile: one IMSI can have several credentials. It's one possibility. Huawei supported this. Ericsson: the IMSI is one key identifier, I don’t get it. There should be two identifiers. Vodafone: who chooses the auth methods? Nokia: this is not a valid requirement. China Mobile: we avoid any negotiation, the choice of auth methods needs to be performed. We need to decide which auth methods are to be chosen. Qualcomm supported the idea of having several auth methods. The second requirement is not a requirement but a solution. Ericsson: it becomes a network selection problem then.
postponed No    
S3‑161126 Resolution of the editor’s notes under the introductory text for security area #8 on network slicing Ericsson pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesMerged with 987.
merged No S3‑161212  
S3‑161127 pCR complete the section 5.2.3.6 China Mobile Com. Corporation pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesVodafone: this is not adding anything. Nokia agreed.
noted No    
S3‑161128 Clarification and resolution of the editor’s notes in key issue of UE service authorization under the security area for network slicing Ericsson LM pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161261  
S3‑161129 Discussion on the trust model in Next Generation systems in relation to the network slicing security area Ericsson pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesEricsson: we are not mandating any particular solutions, this is just informative.
revised No S3‑161214  
S3‑161130 pCR scope of TS 33.250 China Mobile Com. Corporation, ZTE, Telecom Italia, Huawei, Hisilicon pCR Approval
7.2.3TS 33.zzz (SCAS_PGW)
Yes
Yes
approved No    
S3‑161131 LS on "Next Generation" Security Requirements S2-164280 LS in  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
replied to No   S3‑161034
S3‑161132 Solution for authorization and accountability in V2X systems Ericsson pCR  
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
revised No S3‑161174  
S3‑161133 Protecting against the modification of Attach/TAU Request attacks TELECOM ITALIA S.p.A., ORANGE CR Agreement
7.1SAE/LTE Security
Yes
Yes
not pursued No    
S3‑161134 pCR adding the test case of protecting data and information in transfer into the section 5.2.3.2.4 of TS 33.116 China Mobile Com. Corporation, ZTE, Telecom Italia pCR Approval
7.2.1TS 33.116 (SCAS-SA3)
Yes
YesDocomo: there is something similar in 942 for 33.117. Remove requirement description. This was agreed. Also adding a reference to the same text in 33.117. Nokia commented that 5.2.3.2.4 seemed quite strange to be in 33.116. This had to be checked. It was agreed to send TR 33.116 for approval.
revised No S3‑161233  
S3‑161135 pCR to TR 33.899: Security Implications of Low Latency VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161194  
S3‑161136 Solution for communication security with V2X network entities Ericsson LM pCR  
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No    
S3‑161137 High level description of V2XLTE architecture Ericsson LM pCR  
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
merged No S3‑161155  
S3‑161138 New GPRS algorithms – status update ETSI SAGE LS in  
7.5New GPRS algorithms for EASE (EASE_ALGOs_SA3)
Yes
YesVodafone commented that the algorithm specifications hadn’t in fact been sent to the French government, still stuck in ETSI's legal department. Two options are given to procceed further. Tdoc 928 discusses the options.
noted No    
S3‑161139 Solution for Key Issue #7.3.3 on spatial replay Ericsson discussion Endorsement
8.1Study on Security for Proximity-based Services (FS_ProSe_Sec)
Yes
YesNokia: the attack is still possible even with this solution, it is contained. Ericsson: it will be only possible within a cell. It was proposed to have a living document to work on during several meetings. This was agreed. Qualcomm commented that this could end up in a CR if succcessful. Ntt-Docomo: this happens only in ProSe? Ericsson: the scope is not limited to Prose. It exists since 2006 and it's called "wormhole attack". The proposal in 1139 was endorsed by the group.
revised No S3‑161248  
S3‑161140 Key hierarchy schems for network slicing ZTE Corporation pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesIt was commented that this is related to SA2's issues that are still under discussion and not developed enough.
noted No   S3‑160965
S3‑161141 A Method for IoT Service Layer Security Bootstrapping Huawei, Hisilicon pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
YesVodafone: update the conclusions clause. Orange: this solution will not work with 2G. A note was added. Nokia: GUTI doesn’t have one to one correspondence with Kasme. Gemalto: Why is this better than GBA? Orange: it is being considered by GSMA IoT group. Ericsson: more efficient because of the use of HTTP. Ericsson agreed.
revised No S3‑161253 S3‑161032
S3‑161142 Service Layer Security Bootstrapping Mechanism for IoT Devices Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
YesVodafone: it needs to be clear why it is battery efficient.
revised No S3‑161254 S3‑161033
S3‑161143 Clarification on floor control signalling protection Huawei, HiSilicon CR Approval
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
revised No S3‑161228 S3‑161036
S3‑161144 The storage of security context Huawei; HiSilicon; China Mobile pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesMCC: the NOTE should be an editor's note. Ericsson: remove the "must" and add "shall".
revised No S3‑161276 S3‑161009
S3‑161145 Handling editor's notes in 33.916 related to figures NTT DOCOMO INC. pCR Approval
8.2TR on Security Assurance scheme for 3GPP network products (33.916) (SCAS-SA3TR)
Yes
Yes
approved No    
S3‑161146 New WID on Support of EAP Re-Authentication Protocol for WLAN Interworking ORANGE WID new Agreement
5Items for early consideration
Yes
YesOrange noted that CT4 is discussing this week a related WID. A stage 2 feature WID in SA3 would allow them to track the changes and open a Building Block work item. Gemalto: Put Don't Know on the UICC Apps table. Nokia: Not good to have the habit of having to agree on late docs that are WIDs. This shouldn't be taken as a precedent. Nokia didn’t agree with the Objective. We shouldn’t make a work item on the SWA interface. BT clarified that 23.402 is on non-3GPP access.
revised No S3‑161152  
S3‑161147 Nokia comments on S3-161118 Reply on eDRX security Nokia discussion  
5Items for early consideration
Yes
YesNTT-Docomo: sync between MME and eNodeB when there is a reset. Even with IMSI paging I don’t see how it is recovered. IMSI itself shouldn’t be the base for this. We shouldn’t have another round with RAN2, better to reply now. This was discussed offline.
noted No    
S3‑161148 Comment contribution to S3-161055 "Clarifying which RFC is relevant for ECDSA" Ericsson CR  
7.6.2Network Domain Security (NDS)
No
No
withdrawn Yes    
S3‑161149 Comments on S3-161055 "Clarifying which RFC is relevant for ECDSA" Ericsson CR  
7.6.2Network Domain Security (NDS)
Yes
Yes
not pursued No    
S3‑161150 pCR adding the definition of security anchor in the section 3.1 China Mobile Com. Corporation, Huawei, Hisilicon pCR  
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
revised No S3‑161190 S3‑161117
S3‑161151 LS Reply to S3-160907 (C1-163039) Motorola Solutions Danmark A/S LS out Approval
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
revised No S3‑161226 S3‑160973
S3‑161152 New WID on Support of EAP Re-Authentication Protocol for WLAN Interworking ORANGE WID new Agreement
5Items for early consideration
Yes
Yes
agreed No   S3‑161146
S3‑161153 Reply LS on eDRX security NTT DOCOMO LS out Approval
5Items for early consideration
Yes
Yes
approved No   S3‑161118
S3‑161154 Reply to: Liaison Statement on 5G Capabilities and Requirements Ericsson LS out approval
6.4GSMA
Yes
Yes
approved No    
S3‑161155 Adding Architecture section Huawei, HiSilicon, Ericsson, Qualcomm pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
YesMerge of 1026,1098,1137.
approved No   S3‑161026
S3‑161156 Adding References and Definitions and Abbreviations Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161024
S3‑161157 Corrections to TR 33.885 Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161025
S3‑161158 Update of V2X attach id obfuscation LG Electronics France pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑160996
S3‑161159 LS to SA1 on factory automation requirements ORANGE LS out Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesInterdigital didn’t agree with the use of the UE here. UE is AKA and IMSI. If we expand from UE to add the definition of device. You program the answer, which is IMSI + AKA. Orange: you authenticate the customer, not the device. Orange: we should talk about UE in 5G, not UE in 4G. Interdigital: if we don’t say device the answer will be programmed. Nokia: generalize UE for 5G. Nokia: better not to discuss issues related to SA1's TR since they will start a TS soon and it will not be relevant anymore. Oberthur: no requirement outside the factory. Ericsson: we should take a look at clause 6 in TR 22.862. Ericsson: the LS is asking for changes in SA1 TRs that are closed already. Qualcomm: there are more than one authentication methods, they didn’t understand what the problema was with not having clear "alternative authentication methods". Claus (G&D): there is still confusion on these identifiers. It doesn’t hurt to send this to SA1. China Mobile supported sending this LS. Orange: seven companies supporting this LS, two don’t support it. Ericsson commented that there is a difference in the wording, not on sending the LS. Qualcomm had the same opinion. This had to be taken offline.
approved No   S3‑161046
S3‑161160 Additional Security Requirements on credential storage ORANGE, Telecom Italia, Gemalto, Deutsche Telekom, Oberthur, Giesecke&Devrient pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
postponed No   S3‑161047
S3‑161161 2G Security improvements ORANGE, Telecom Italia, Gemalto, Oberthur, Giesecke&Devrient, Vodafone, Deutsche Telekom CR Agreement
7.6.4GERAN Network Access Security
Yes
YesCESG: why do you expect the base station giving you the right PLMN id? This doesn’t solve the problem. MMC,MNC is translated into a user friendly code but this is not always displayed on the screen. CESG: the fake base station could give me whatever information they want on the network id. It was agreed to have an editor's note to come back to this issue. It was also agreed to send an LS to RAN6 to ask them about these procedures.
agreed No   S3‑161049
S3‑161162 Enforce mutual authentication ORANGE, Telecom Italia, Deutsche Telekom, Vodafone, Gemalto, Oberthur, Giesecke&Devrient, TeliaSonera, Vodafone CR Agreement
7.6.3UTRAN Network Access Security
Yes
YesNokia gave an example of quintuplet attack that should be addressed here. Prevent PLMN id being spoofed. Vodafone: MMC,MNC is translated into what we see on the screen of the UE. CESG: this is not the case on the screen of my phone. He doesn’t see the country where he is. Docomo: should we do something even if Nokia's example of attack is possible? Vodafone: put in the SIM ,MNC and MMC codes that prevent such thing. Docomo: is it worth it in terms of additional overhead? Orange: it would implementation specific to solve this issue. It was agreed to add a NOTE with a recommendation. Qualcomm: send it to CT1 for comments. Vodafone: also to CT6.
agreed No   S3‑161051
S3‑161163 Hiding the subscriber IMSI from the serving network for V2X Qualcomm Incorporated pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161095
S3‑161164 Reattach procedure for Vehicle UE Identity Privacy Qualcomm Incorporated pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161096
S3‑161165 Vehicle UE privacy based on data traversing the network Qualcomm Incorporated pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161097
S3‑161166 Key issue about data communication security between network entities Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161021
S3‑161167 Key issue about V2I broadcast communication security Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161022
S3‑161168 Security for V2X Broadcast Communication: Life Time of Credentials Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161029
S3‑161169 Security for V2X Broadcast Communication: Introducing Temporary ID management Function for V2X Data Source Accountability Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161031
S3‑161170 Adding Rel-13 Key Issues to 33.880 CESG pCR Approval
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
Yes
approved No   S3‑161056
S3‑161171 Discussion of GMK revocation issue CESG discussion discussion
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
noted No    
S3‑161172 V2X requirement on updating of crypto Nokia pCR -
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑160980
S3‑161173 Legitimacy of V2X messages on key issue for data source accountability Qualcomm Incorporated pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161099
S3‑161174 Solution for authorization and accountability in V2X systems Ericsson pCR -
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161132
S3‑161175 Key issue about security of UE to V2X Control Funtion interface Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161028
S3‑161176 Security of UE to V2X Control Funtion interface Huawei, HiSilicon pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161023
S3‑161177 pCR to 33.885 - New Key Issue on Detectability of Malicious behaviour TNO pCR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
Yes
Yes
approved No   S3‑161072
S3‑161178 New draft TR 33.885 Huawei draft TR Approval
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
No
Yes
left for email approval No    
S3‑161179 Secure delivery of IOV-values to the MS in enhanced GPRS Ericsson CR Approval
7.3Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
Yes
Yes
agreed No   S3‑161108
S3‑161180 Corrections to EASE Ericsson CR Approval
7.3Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
Yes
Yes
agreed No   S3‑161092
S3‑161181 Exception sheet EASE-ALGO_SA3 Vodafone WI exception request Agreement
7.5New GPRS algorithms for EASE (EASE_ALGOs_SA3)
No
Yes
agreed No    
S3‑161182 Reply to: LS on "Next Generation" Security Requirements Vodafone LS out approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161183 Definitions for FS_NSA Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161184 pCR to 33.899 - update of the Introduction section VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160924
S3‑161185 pCR to TR 33.899 - update of section 4.2 High level security requirements VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160925
S3‑161186 NSA Adding new security area on broadcast multicast Nokia pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160977
S3‑161187 Clause 4.1 details Ericsson pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161188 NSA new security area on interworking and migration Nokia pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160978
S3‑161189 Security aspects of Connectionless RAN-CN interface Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160991
S3‑161190 pCR adding the definition of security anchor in the section 3.1 China Mobile Com. Corporation, Huawei, Hisilicon pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161150
S3‑161191 pCR solution to Key # 1.2 on the need a security anchor Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161101
S3‑161192 pCR to TR 33.899: Proposal of key hierarchy for 5G security NEC pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160952
S3‑161193 Security for serving functions not in physical protected place ZTE Corporation pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
No
Yes
approved No   S3‑160966
S3‑161194 pCR to TR 33.899: Security Implications of Low Latency VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161135
S3‑161195 Signing of Access Tokens Motorola Solutions Danmark A/S CR Agreement
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
agreed No   S3‑160967
S3‑161196 New work item for Security Architecture for Mission Critical Services Motorola Solutions Danmark A/S WID new Agreement
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
agreed No   S3‑160971
S3‑161197 PCR of User Plane Security Protection Huawei, HiSilicon, Deutsche Telekom AG, Vodafone pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161002
S3‑161198 pCR to TR 33.899: Authentication section introduction VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160946
S3‑161199 pCR adding the potential security requirements into the section 5.2.3.7 China Mobile Com. Corporation, Huawei, Hisilicon pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161123
S3‑161200 pCR to add a solution 'back-off timer' for key issue 5.2.3.7 TNO pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161073
S3‑161201 pCR to TR 33.899 v0.3.0 "Authentication framework - requirements" Nokia pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161075
S3‑161202 Key issue #2.4: Device identifier authentication INTERDIGITAL COMMUNICATIONS pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160939
S3‑161203 Key Issue of Security for Service Provider Connection Huawei, HiSilicon, Deutsche Telekom AG, KPN pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161003
S3‑161204 pCR to TR 33.899 New key issue - Secondary authentication by 3rd party service Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161018
S3‑161205 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - transport considerations" Nokia pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161077
S3‑161206 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - efficiency considerations" Nokia pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161078
S3‑161207 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - general information flow" Nokia pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161079
S3‑161208 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - alternatives" Nokia pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161080
S3‑161209 New solution to security area #2: EAP authentication framework Ericsson pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161084
S3‑161210 EAP Encapsulation Protocol Samsung pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161081
S3‑161211 Solution for Key issue #2.4: Device identifier authentication Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161105
S3‑161212 Network Slice: EN in 5.8 intro and assumptions Nokia,Ericsson pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160987
S3‑161213 pCR revise the details of key issue# 8.1 China Mobile Com. Corporation, China Unicom pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesIt incorporates an editor's note of 1126.
approved No   S3‑161114
S3‑161214 Discussion on the trust model in Next Generation systems in relation to the network slicing security area Ericsson pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161129
S3‑161215 Network Slice: EN in 5.8.3.2 Slice differentiation Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160989
S3‑161216 Reply to: LS on Protecting UE network capabilities from ‘bidding down attack Qualcomm LS out approval
7.1SAE/LTE Security
No
Yes
approved No    
S3‑161217 Protecting against the modification of Attach/TAU Request attacks Qualcomm Incorporated,Huawei CR Approval
7.1SAE/LTE Security
Yes
YesDiscussed together with 1133. Ericsson and Nokia supported this option.
agreed No   S3‑161112
S3‑161218 Key Issue for inter-domain identity management operation Motorola Solutions Danmark A/S pCR Approval
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
YesAirbus: add a requirement on revocation access token from old network to the visited network. Motorola: I agree with we can solve it with the existing mechanisms. It was agreed to add an editor's note.
approved No   S3‑160969
S3‑161219 Identity management for inter-domain operation Motorola Solutions Danmark A/S pCR Approval
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
Yes
approved No   S3‑160970
S3‑161220 LWA editorial corrections Huawei, HiSilicon CR Agreement
7.1SAE/LTE Security
Yes
Yes
agreed No   S3‑161037
S3‑161221 Clarification in logging access to personal data Huawei; HiSilicon pCR -
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No   S3‑161039
S3‑161222 Installing PMK at the WLAN AP using EAP Blackberry, Qualcomm Incorporated CR Approval
7.1SAE/LTE Security
Yes
Yes
agreed No   S3‑161110
S3‑161223 Reply to: LS on PDCP ciphering for high data rates in eLWA Qualcomm LS out approval
7.1SAE/LTE Security
Yes
Yes
approved No    
S3‑161224 LS on enhancing legacy GSM security Qualcomm LS out Approval
7.6.3UTRAN Network Access Security
No
Yes
approved No    
S3‑161225 Reply to: LS response on LS on confidentiality protection of an identity in a value of an XML attribute of an XML element of an XML document included in a SIP message. CESG LS out approval
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
approved No    
S3‑161226 LS Reply to S3-160907 (C1-163039) Motorola Solutions Danmark A/S LS out Approval
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
approved No   S3‑161151
S3‑161227 Fix Identity Management interface Motorola Solutions Danmark A/S CR Agreement
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
agreed No   S3‑160968
S3‑161228 Clarification on floor control signalling protection Huawei, HiSilicon CR Approval
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
agreed No   S3‑161143
S3‑161229 Corrections to 33.179 HUAWEI TECHNOLOGIES Co. Ltd. CR Approval
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
agreed No   S3‑161035
S3‑161230 Clarification on the requirement of recording and discrete listening CESG LS out Approval
7.6.10Security of MCPTT (MCPTT)
Yes
Yes
approved No    
S3‑161231 handling editor's notes in 33.116 NTT DOCOMO pCR Approval
7.2.1TS 33.116 (SCAS-SA3)
Yes
Yes
approved No   S3‑161120
S3‑161232 New draft TS 33.116 NTT-Docomo draft TS Approval
7.2.1TS 33.116 (SCAS-SA3)
No
Yes
left for email approval No    
S3‑161233 pCR adding the test case of protecting data and information in transfer into the section 5.2.3.2.4 of TS 33.116 China Mobile Com. Corporation, ZTE, Telecom Italia pCR Approval
7.2.1TS 33.116 (SCAS-SA3)
Yes
Yes
approved No   S3‑161134
S3‑161234 Cover sheet TS 33.116 NTT-Docomo TS or TR cover discussion
7.2.1TS 33.116 (SCAS-SA3)
No
Yes
left for email approval No    
S3‑161235 new draft TS 33.117 NTT-Docomo draft TS Approval
7.2.2TS 33.117 (SCAS-SA3)
No
Yes
left for email approval No    
S3‑161236 pCR to TS 33.117 on TC_CONFIDENTIAL_SYSTEM_INTERNAL_DATA Deutsche Telekom AG,NTT-Docomo pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No   S3‑160943
S3‑161237 pCR to TS 33.117 adding test case for "Protecting data and information in transfer" Deutsche Telekom AG pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No   S3‑160942
S3‑161238 pCR to 33.117 to 5.2.3.4.3.3 introducing password blacklists NTT DOCOMO INC. pCR -
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No   S3‑161122
S3‑161239 Clarification in Authentication policy Huawei; HiSilicon pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No   S3‑161040
S3‑161240 Removing Editor’s Note in 5.2.6.2.3 TNO pCR Approval
7.2.2TS 33.117 (SCAS-SA3)
Yes
Yes
approved No   S3‑161116
S3‑161241 Cover sheet TS 33.117 NTT-Docomo TS or TR cover Approval
7.2.2TS 33.117 (SCAS-SA3)
No
Yes
left for email approval No    
S3‑161242 pCR adding the skeleton of TS 33.250 China Mobile Com. Corporation, ZTE, Telecom Italia draft TS Approval
7.2.3TS 33.zzz (SCAS_PGW)
Yes
Yes
approved No   S3‑160954
S3‑161243 TS 33.250 China Mobile draft TS Approval
7.2.3TS 33.zzz (SCAS_PGW)
Yes
Yes
approved No    
S3‑161244 Remove “shall” from the TR Huawei, HiSilicon CR Approval
7.2.4Other
Yes
Yes
agreed No   S3‑161042
S3‑161245 WID on Security Assurance Specification for eNB Huawei, HiSilicon WID new Agreement
7.2.4Other
Yes
Yes
agreed No   S3‑161111
S3‑161246 new draft TR 33.916 NTT-Docomo draft TR Approval
8.2TR on Security Assurance scheme for 3GPP network products (33.916) (SCAS-SA3TR)
No
Yes
left for email approval No    
S3‑161247 Cover sheet TR 33.916 NTT-Docomo TS or TR cover Approval
8.2TR on Security Assurance scheme for 3GPP network products (33.916) (SCAS-SA3TR)
No
Yes
left for email approval No    
S3‑161248 Solution for Key Issue #7.3.3 on spatial replay Ericsson discussion Endorsement
8.1Study on Security for Proximity-based Services (FS_ProSe_Sec)
Yes
YesThis is the skeleton for a living document.
noted No   S3‑161139
S3‑161249 new draft TR 33.880 CESG draft TR Approval
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
Yes
Yes
approved No    
S3‑161250 Removing Editor’s Note in 6.1.2.2 TNO pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
approved No   S3‑160930
S3‑161251 new draft TR 33.863 Vodafone draft TR discussion
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
No
Yes
approved No    
S3‑161252 pCR to TR 33.863, v1.1.1: Solution #10 (extends sol. 2): "AKA-based session key generation for application protocols" Nokia pCR -
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
approved No   S3‑161063
S3‑161253 A Method for IoT Service Layer Security Bootstrapping Huawei, Hisilicon pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
No
Yes
approved No   S3‑161141
S3‑161254 Service Layer Security Bootstrapping Mechanism for IoT Devices Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
No
Yes
approved No   S3‑161142
S3‑161255 pCR to 33.863 - addition of recomendation section VODAFONE Group Plc pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
approved No   S3‑160920
S3‑161256 WID for normaitive work of BEST VODAFONE Group Plc WID new Agreement
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
agreed No   S3‑160921
S3‑161257 Verification of authenticity of the cell Samsung pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161089
S3‑161258 Detailed Requirements for Security Mechanism Differentiation for Network Slices Huawei, HiSilicon,Deutsche Telekom AG pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161006
S3‑161259 pCR to TR 33.899: UEs with Asymmetric Keys VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161044
S3‑161260 pCR to TR 33.899: Authentication of the user VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160975
S3‑161261 Clarification and resolution of the editor’s notes in key issue of UE service authorization under the security area for network slicing Ericsson LM pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
No
Yes
approved No   S3‑161128
S3‑161262 The Authentication & Authorization Scenarios of UE Accessing into Network Slicing Huawei, HiSilicon, Deutsche Telekom AG,Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161008
S3‑161263 Editor's notes on definitions Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No    
S3‑161264 Network slice: EN in 5.8.3.7 interslice communication Nokia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160990
S3‑161265 pCR to TR 33.899: Proposal of solution for key issue of network slicing security NEC pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160953
S3‑161266 Solution for Network Slicing Security LG Electronics France pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160997
S3‑161267 pCR to TR 33.899 v0.3.0 "Replacing solution 2.2 with reference to solution 3.1" Nokia pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161086
S3‑161268 pCR to TR 33.899: Radio interface key exchange protocol VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160947
S3‑161269 pCR to TR 33.899 v0.3.0 "Evaluation of Solution #3.1: Including a key exchange..." Nokia pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161087
S3‑161270 pCR to TR 33.899: interception of radio interface keys sent between operator entities VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160948
S3‑161271 pCR to TR 33.899: UE action if network does not update session keys VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160949
S3‑161272 pCR to 33.899 - Resolution of EN in 5.3.3.2.3 TNO pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161113
S3‑161273 pCR on allowing non-radio interface keys to be refreshed in the existing key issue on Refreshing radio interface keys Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161100
S3‑161274 Threats for Security Context Sharing Huawei, HiSilicon,Deutsche Telekom AG, China Mobile pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161007
S3‑161275 Finalising Key issue #3.5: Unnecessary dependence of keys between security layers Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161106
S3‑161276 The storage of security context Huawei; HiSilicon; China Mobile pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161144
S3‑161277 Security context for connectionless mode Huawei; HiSilicon pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161010
S3‑161278 Security Context and Key Management Huawei, HiSilicon, Deutsche Telekom AG pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161005
S3‑161279 Key issue Security requirements on gNB Ericsson pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161083
S3‑161280 Key issue Security aspects of dual connectivity Ericsson pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161085
S3‑161281 pCR on New key issue on on-demand AS integrity protection in NextGen systems Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161104
S3‑161282 pCR to TR 33.899: Network public keys VODAFONE Group Plc pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160992
S3‑161283 Work Plan input from Rapporteurs MCC other -
9Review and Update of Work Plan
Yes
Yes
noted No   S3‑160905
S3‑161284 pCR to 33.863 - Addition of annex detailing suggested normaitive changes VODAFONE Group Plc pCR Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
approved No   S3‑160923
S3‑161285 New privacy key issue on concealing permanent or long-term subscriber identifier Ericsson, Nokia, Telecom Italia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑160958
S3‑161286 Cover sheet 33.863 Vodafone TS or TR cover Approval
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
Yes
Yes
left for email approval No    
S3‑161287 New privacy key issue on protection of network slice identifier Nokia pCR -
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
Yes
approved No   S3‑161071
S3‑161288 Enhancing the concealment of permanent or long-term subscriber identifier Ericsson,Telecom Italia pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
Yes
YesAdding an editor's note as suggested by interdigital.
approved No   S3‑160995
S3‑161289 pCR on a proposed solution for IMSI privacy Qualcomm Incorporated pCR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
No
Yes
approved No   S3‑161103
S3‑161290 New draft R 33.899 Ericsson draft TR Approval
8.6Study on Architecture and Security for Next Generation System (FS_NSA)
No
Yes
left for email approval No    
S3‑161291 SA3 meeting calendar MCC other -
10Future Meeting Dates and Venues
Yes
No
available No   S3‑160904