Tdoc List

2018-11-16 14:55

TDoc Title Source Type For Agenda Avail Treated Decision Wdrn Replaced-by Replaces
S3‑183200 Agenda WG Chairman agenda  
2Approval of Agenda and Meeting Objectives
Yes
Yes
revised No S3‑183253  
S3‑183201 Report from SA3#92 MCC report  
4.1Approval of the report from previous SA3 meeting(s)
Yes
Yes
approved No    
S3‑183202 SA3 Work Plan MCC Work Plan  
9.1Review of work plan
Yes
YesEricsson commented that the study "Study on the Security of the enhancement to the 5GC Location Services" was to be finished in Dec 19 and that was inside Rel-17 timeline. CATT thought that this was a mistake but it could be corrected. BT added that the study FS_15LIS was finished and it should not appear in the Work Plan.
noted No    
S3‑183203 Report from last SA meeting WG Chairman report  
4.2Report from SA Plenary
Yes
YesORANGE queried about the GSMA LS on SoR (Steering of Roaming). Ericsson commented that they had some input prepared to be checked later in the meeting.
noted No    
S3‑183204 SA3 meeting calendar MCC other  
10Future Meeting Dates and Venues
Yes
YesEricsson will host a meeting in March (week of 11th). NAF will host the May 2019 meeting.
revised No S3‑183838  
S3‑183205 Work Plan input from Rapporteurs MCC other  
9.2Rapporteur input on status of WID or SID
Yes
Yes
revised No S3‑183837  
S3‑183206 Report from SA3#92Ad-Hoc MCC report  
4.1Approval of the report from previous SA3 meeting(s)
Yes
Yes
approved No    
S3‑183207 Intra-gNB-CU term synchronization Huawei, HiSilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183208 Update RNA Update Procedure Security Huawei, HiSilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183209 N2 HO: Handling source algorithms for RRC Reestablishment procedure Huawei, Hisilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183210 Handling of UP security policy in MR-DC Huawei, Hisilicon, Qualcomm Incorporated, Ericsson CR Approval
5.1CRs from SA3#92bis
Yes
Yes
revised No S3‑183835  
S3‑183211 Delete EN in SBA Requirements Huawei, Hisilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183212 Clarifications on AccessToken_Get Response message Huawei, Hisilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183213 Editorial corrections on Authorization of NF service access Huawei, Hisilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183214 Add discover procedure as a pre-requisite for obtaining access token Huawei, Hisilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183215 correction on the mobility from 5G to 4G Huawei, Hisilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183216 Clarification on handover from EPS to 5GS Huawei, Hisilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
merged No S3‑183836  
S3‑183217 Editorial corrections on the 5GS to EPS handover procedure Huawei, HiSilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183218 Clarification for Target to Source container Huawei, HiSilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183219 Multiple NAS connections: clarification on the action of MAC verification in registration request over non-3gpp access Huawei, HiSilicon CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183220 Interworking – correcting keying material in HO request message (EPS to 5GS) Ericsson CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
revised No S3‑183836  
S3‑183221 Length of IV salt and sequence counter Ericsson CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183222 Correction to the Security Service for Steering of Roaming Ericsson CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183223 Mobility – Clarification of downlink NAS COUNT in N2 handover Ericsson CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183224 NAS key refresh Ericsson CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183225 Caching access tokens Ericsson CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183226 Addition of multiple instance IDs to OAuth2.0 access token claims Ericsson CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183227 Corrections to references for security related service in clause 14 CATT CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183228 Correction to Nudm_UEAuthentication_ResultConfirmation service CATT CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183229 Correction to 5G AKA procedure – no need for "SUPI or SUCI" (in step 10) Orange, Ericsson, Nokia CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183230 Adding references for the TLS Protocol Profiles clause Juniper Networks, Ericsson CR  
7.1.12NDS
No
Yes
withdrawn Yes    
S3‑183231 Update NDS/IP scope with application layer crypto profiles Juniper Networks, Ericsson CR  
7.1.12NDS
No
Yes
withdrawn Yes    
S3‑183232 Move TLS crypto profiles to TS 33.210 Juniper Networks, Ericsson CR  
7.1.12NDS
No
Yes
withdrawn Yes    
S3‑183233 Adjusting the description of the initial NAS protection method Qualcomm Incorporated, ZTE, China Mobile CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
not pursued No    
S3‑183234 Acknowledging possibility of early calculation of EMSK Qualcomm Incorporated, Huawei, Hsilicon CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183235 Precedence of protection policies on the N32 interface Telekom Deutschland GmbH CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183236 Handling of encrypted IEs on the N32 interface Telekom Deutschland GmbH CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183237 Corrections and additions in definitions and related clauses Nokia, Nokia Shanghai Bell CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑183072
S3‑183238 Clarification to AUSF key derivation Nokia, Nokia Shanghai Bell CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑183097
S3‑183239 Clarification to support of authentication methods Nokia, Nokia Shanghai Bell CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑183077
S3‑183240 Adding reference to 33.501 in 33.102 Nokia, Nokia Shanghai Bell CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑182957
S3‑183241 Alignment regarding KEY reference to 33.220 Nokia, Nokia Shanghai Bell CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑183098
S3‑183242 Misleading text with reference regarding serving network name Nokia, Nokia Shanghai Bell CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑183099
S3‑183243 Clarification on first bits of EMSK Nokia, Nokia Shanghai Bell CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑182960
S3‑183244 Removing mandatory text from note Nokia, Nokia Shanghai Bell CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑182967
S3‑183245 Reference correction Nokia, Nokia Shanghai Bell CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑182968
S3‑183246 Remove EN in 13.2 Nokia, Nokia Shanghai Bell CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183247 Clarifications to clause 13.2.1 Nokia, Nokia Shanghai Bell CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183248 Remove EN in 13.2.2.1 Nokia, Nokia Shanghai Bell CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183249 Correction in step 2 of 13.2.2.2 Nokia, Nokia Shanghai Bell CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183250 Corrections in 13.2.2.4 on N32-f context ID Nokia, Nokia Shanghai Bell CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183251 Clarifications and corrections in clause 13.2.4 Nokia, Nokia Shanghai Bell CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183252 pCR to TS 33.841 - restructure of section 4 as agreed in conf call VODAFONE Group Plc pCR Agreement
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesNCSC: too late to introduce all this information, additonal drivers for 256 bits. AT&T: there will be a period of time required for SAGE to do the anylisis for the appropriate algorithms supporting 256bits. We are likely entering into Rel-17 with this. Rel-16 would serve as analysis of the algorithms. We are favouring this document. Vodafone: there are other reasons why we are doing 256 bits.
noted No    
S3‑183253 Agenda WG Chairman agenda Approval
2Approval of Agenda and Meeting Objectives
Yes
Yes
approved No   S3‑183200
S3‑183254 Multiple NAS Connection: Correcting NAS link identifier Nokia CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183255 CR to 33210 r15 adding references for the TLS Protocol Profiles clause Juniper Networks, Ericsson CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183256 CR to 33210 r16 adding Other 3GPP Profiles clause and references Juniper Networks, Ericsson CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183257 CR to 33310 r16 removing annex e Juniper Networks, Ericsson CR  
5.1CRs from SA3#92bis
Yes
Yes
agreed No    
S3‑183258 CR to 33310 r15 corrections of references and annex Juniper Networks, Ericsson CR  
7.4.3Network Domain Security (NDS)
Yes
Yes
agreed No    
S3‑183259 CR to 33310 r16 corrections of references Juniper Networks, Ericsson CR  
7.4.3Network Domain Security (NDS)
Yes
Yes
agreed No    
S3‑183260 Reply LS on Control Plane Solution for Steering of Roaming in 5GS C1-186841 LS in  
7.4.14PLMN RAT selection (Steering of Roaming) (Rel-15)
Yes
YesVodafone wasn’t happy with the security response. Tim also mentioned that the non -security part had also wrong issues (but out of scope for SA3). T-Mobile didn't see the point of concern. They were happy with the CT1 response. Qualcomm didn’t see so many problems with this response. Vodafone: there are two different mechanisms ending in two different points. This is not conveyed in here. T-Mobile commented that CT1 points out that encryption was available for the operator, optional, and it was highlighted why. The Chair didn’t want to restart a discussion on SoR; this had been done in SA3 before; so he proposed to have a quick response. Alex(BT) commented that CT1 had messed up with the LI requirements. The regulatory bits were not correct.
noted No    
S3‑183261 Reply LS on the Impacts of increasing the MAC-I and NAS-MAC size R2-1816012 LS in  
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
noted No    
S3‑183262 Reply LS on LS on the Impacts of increasing the MAC-I and NAS-MAC size C1-186961 LS in  
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
noted No    
S3‑183263 LS on Observations from 2nd MCPTT Plugtests C1-186964 LS in  
7.4.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
Yes
Yes
noted No    
S3‑183264 Reply LS on maximum output size of SUPI concealment schemes C1-186992 LS in  
7.1.15Incoming and outgoing Lses
Yes
Yes
replied to No    
S3‑183265 LS on Scenarios with multiple registrations to the same AMF C1-186993 LS in  
7.1.15Incoming and outgoing Lses
Yes
YesThis information has been taken into account in other documents.
noted No    
S3‑183266 Reply LS on inclusion of selected PLMN into the complete message C1-186994 LS in  
7.1.15Incoming and outgoing Lses
Yes
Yes
noted No    
S3‑183267 Reply LS on initial NAS security agreements R2-1816022 LS in  
7.1.15Incoming and outgoing Lses
Yes
Yes
noted No    
S3‑183268 LS on initial NAS message protection C1-186995 LS in  
7.1.15Incoming and outgoing Lses
Yes
Yes
replied to No    
S3‑183269 LS on EAS-C&U support C3-186313 LS in  
7.4.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec) (Rel-15)
Yes
Yes
postponed No    
S3‑183270 LS on security method negotiation C3-186335 LS in  
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
replied to No    
S3‑183271 LS on API invoker onboarding C3-186414 LS in  
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
noted No    
S3‑183272 LS on N32 error signalling C4-187145 LS in  
7.1.15Incoming and outgoing Lses
Yes
Yes
noted No    
S3‑183273 Reply LS on Maximum output size of SUPI concealment schemes C4-187633 LS in  
7.1.15Incoming and outgoing Lses
Yes
Yes
replied to No    
S3‑183274 LS on Control Plane Solution for Steering of Roaming in 5GS CP-182234 LS in  
7.4.14PLMN RAT selection (Steering of Roaming) (Rel-15)
Yes
Yes
noted No    
S3‑183275 Response to 3GPP SA2 liaison S2-189038 on ‘general status of work’ BBF LS in  
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
postponed No    
S3‑183276 LS to 3GPP TSG-SA WG6 on Use of ITS Dedicated Spectrum within V2X UE ETSI TC ITS LS in  
6.13GPP Working Groups
Yes
YesNo action for SA3.
noted No    
S3‑183277 LS on Joint ETSI - OSA Workshop: Open Implementations & Standardization ETSI LS in  
6.10Other Groups
Yes
YesAlex (BT) commented that this clashed with SA plenary. It was commented that SA3 could make a contribution about SA3 security.
noted No    
S3‑183278 Observations on standards and technical constraints from 2nd MCPTT Plugtests ETSI CTI LS in  
7.4.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
Yes
Yes
noted No    
S3‑183279 Reply LS on " LS on Using same counter in EDCE5" R2-1816010 LS in  
7.4.11EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5)
Yes
Yes
noted No    
S3‑183280 Reply LS on security requirements for RRC connection release R2-1816053 LS in  
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
noted No    
S3‑183281 LS on security requirements for Integrity protection for DRBs in MR-DC R2-1816054 LS in  
7.1.15Incoming and outgoing Lses
Yes
Yes
replied to No    
S3‑183282 Reply LS on devices behind 5G-RG accessing the 5GC S2-1810989 LS in  
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
noted No    
S3‑183283 Reply LS on Secondary Re-Authentication S2-1811431 LS in  
7.1.15Incoming and outgoing Lses
Yes
Yes
noted No    
S3‑183284 Reply LS on Clarifications on SUPI definition and NAI format S2-1811525 LS in  
7.1.15Incoming and outgoing Lses
Yes
Yes
replied to No    
S3‑183285 LS Reply on Control Plane Solution for Steering of Roaming in 5GS GSMA LS in  
7.4.14PLMN RAT selection (Steering of Roaming) (Rel-15)
Yes
YesSA will respond to this one.
noted No    
S3‑183286 LS on SG17 work item X.5Gsec-q: Security guidelines for applying quantum-safe algorithms in 5G systems ITU-T SG17 LS in  
6.10Other Groups
Yes
Yes
replied to No    
S3‑183287 Reply LS on initial NAS security agreements S2-1811568 LS in  
7.1.15Incoming and outgoing Lses
Yes
Yes
approved No    
S3‑183288 Reply LS on 5WWC status of work and interim agreements S2-1811575 LS in  
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
YesPotential response when replying to 275.
noted No    
S3‑183289 LS on separate HSS and UDM and security credentials storage S2-1811603 LS in  
8.16Other study areas
Yes
Yes
replied to No    
S3‑183290 Potential Requirements for TR 33.841 NCSC pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
revised No S3‑183766  
S3‑183291 Conclusions for TR 33.841 NCSC pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesVodafone and NIST preferred this conclusion to the document 473. It was agreed to revise this including some bits of the CATT document.
revised No S3‑183767  
S3‑183292 Update to Impacted NextGen Areas - TR 33.841 NCSC pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesBT: not only 5G voice but also media should be included here. NCSC commented that was topic for another study. Ericsson suggested some editorials. 6.2.5 and 6.1.10 were removed.
revised No S3‑183760  
S3‑183293 Editorials for TR 33.841 NCSC pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
revised No S3‑183768  
S3‑183294 Modifications and Clarifications for TR 33.841 NCSC pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesGemalto: don’t remove the text in clause 9.1. It introduces some useful background. MCC commented that the use of "must" was not allowed in 3GPP specifications. This was reworded.
revised No S3‑183765  
S3‑183295 Draft Reply LS to ITU-T SG17 on X.5Gsec-q study NCSC LS out Approval
7.1.15Incoming and outgoing Lses
Yes
YesVodafone preferred this LS to the option presented by China Mobile. The Chair commented that it was agreed in the previous SA3 meeting that a response LS was needed to tell ITU-T that there was an overlap and this needed to be avoided.
revised No S3‑183654  
S3‑183296 Discussion of Potential threats caused by false base station Apple Computer Trading Co. Ltd discussion Agreement
8.9Study on 5G security enhancement against false base stations
Yes
Yes
noted No    
S3‑183297 Key issue of authenticating gNB on broadcast and unicast message Apple Computer Trading Co. Ltd pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesORANGE: requirement looks too solution specific. Ericsson: when you mention PWS you should refer to what SA3 has done on this topic. This overlaps with 580 and 581.
availablem No S3‑183801  
S3‑183298 Corrections to definition of 5G NAS security context CMCC CR Approval
7.1.16Others
No
Yes
revised No S3‑183303, S3‑183304  
S3‑183299 Key issue of security protection on the unicast message from the UE before security activation Apple Computer Trading Co. Ltd pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesIt was agreed to remove the requirements. China Mobile commented that this was not a key issue for the fake base station.
revised No S3‑183803  
S3‑183300 skeleton of TR 33.809-Study on 5G Security Enhancement against False Base Station Apple Computer Trading Co. Ltd pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
approved No    
S3‑183301 Key issue of security overhead and complexity Apple Computer Trading Co. Ltd pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesORANGE: this key issue is based on TR 33.899, which was withdrawn, and I don’t agree with this. Deutsche Telekom and Huawei supported this.
noted No    
S3‑183302 Discussion on one potential way to improve the efficiency of IP Apple Computer Trading Co. Ltd discussion Discussion
7.1.16Others
Yes
Yes
revised No S3‑183632  
S3‑183303 Unify the name of RAN network in 33.501 CMCC CR Approval
7.1.16Others
No
Yes
revised No S3‑183324 S3‑183298
S3‑183304 Replace 5G-RAN with NG-RAN in 33.501 China Mobile CR Approval
7.1.16Others
No
Yes
withdrawn Yes   S3‑183298
S3‑183305 Add symmetric key distribution mechanisms to TS 33.180 Airbus DS SLC discussion Approval
7.4.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
Yes
YesEricsson: for what Release do you want this? Airbus: this release if possible. Some companies were agains this in release 16 (Vodafone, NCSC).
noted No    
S3‑183306 Key Issue on secure communication between UE and application server Alibaba (China) group., Ltd., China Mobile pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
revised No S3‑183631  
S3‑183307 AKMA candidate solution for non-3GPP credential download Alibaba (China) group., Ltd., China Mobile pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
YesRelated to the previous one. Vodafone: totally out of scope.
noted No    
S3‑183308 Algorithm Agility NIST pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesNCSC: no need to add information that we haven’t looked at. NEC: the bullet points look like the objectives of a study. They should be removed.
noted No    
S3‑183309 pCR Discussing mitigating of risks by using larger keys NIST pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesNCSC: reluctant to write this down, we disagree with this document. Ericsson supported this. Gemalto and Huawei agreed with the content of the text. Vodafone: the conclusion we agreed on last meeting was that we don’t need to do anything for 4 years. The support/non support was balanced and this was taken offline.
noted No    
S3‑183310 pCR to Include content discussing forward security NIST pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
revised No S3‑183759  
S3‑183311 VERTICAL_LAN_SEC skeleton Nokia Germany draft TR  
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
approved No    
S3‑183312 New Key Issue: Authentication and Authorization for Interworking, Roaming between NPN and PLMN InterDigital Europe. Ltd. pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
revised No S3‑183828  
S3‑183313 Modification of initial NAS message protection ZTE Corporation CR Approval
7.1.5NAS security
Yes
Yes
merged No S3‑183673  
S3‑183314 Modification on NAS SMC procedure ZTE Corporation CR Approval
7.1.5NAS security
Yes
Yes
merged No S3‑183673  
S3‑183315 Handling of initial NAS message other than RR when failure occur ZTE Corporation CR Approval
7.1.5NAS security
Yes
YesEricsson: not clear if this is needed.
not pursued No    
S3‑183316 Editorial modification on initial NAS message protection ZTE Corporation CR Approval
7.1.5NAS security
Yes
Yes
merged No S3‑183673  
S3‑183317 Editorial modification on gNB requirement ZTE Corporation CR Approval
7.1.4AS security
Yes
Yes
agreed No    
S3‑183318 AS subscription temperary identifier privacy ZTE Corporation CR Approval
7.1.4AS security
Yes
YesNokia: 5.3.X should be in a RAN spec. Ericsson: this new clause is not needed. It was agreed to remove the new clause from the CR and reword the statement on the gNB in the second change (since it wasn’t clear to which gNB it was referring).
revised No S3‑183663  
S3‑183319 Scope of TS 33.519 ZTE Corporation pCR Approval
7.2.9Network Exposure Function (NEF) (TS 33.519)
Yes
Yes
approved No    
S3‑183320 References of TS 33.519 ZTE Corporation pCR Approval
7.2.9Network Exposure Function (NEF) (TS 33.519)
Yes
Yes
approved No    
S3‑183321 Authentication on application functions ZTE Corporation pCR Approval
7.2.9Network Exposure Function (NEF) (TS 33.519)
Yes
Yes
revised No S3‑183707  
S3‑183322 Proposal about improvement of the UP security policy China Mobile CR Approval
7.1.4AS security
Yes
YesEricsson didn’t agree with the wording. Docomo was OK with having a default behaviour described here, by rewording the changes. This was taken offline.
revised No S3‑183666  
S3‑183323 Corrections to definition of 5G AS security context for 3GPP access China Mobile CR Approval
7.1.16Others
Yes
Yes
revised No S3‑183695  
S3‑183324 Replace 5G-RAN with NG-RAN in TS 33.501 China Mobile CR Approval
7.1.16Others
Yes
YesNokia didn't agree with this. Ericsson: there is no 5G RAN term. We should change this.
agreed No   S3‑183303
S3‑183325 Discussion on i/c LS S2-1811543 NSSAI in RRC message Nokia, AT&T, Verizon Wireless, Inter Digital discussion Endorsement
7.1.5NAS security
Yes
Yes
noted No    
S3‑183326 draft-LS out reply to i/c LS on NSSAI in RRC message Nokia other Approval
7.1.5NAS security
Yes
Yes
noted No    
S3‑183327 Discussion on LS (S3-183289) on separate HSS and UDM credential storage Nokia discussion Endorsement
8.16Other study areas
Yes
Yes
noted No    
S3‑183328 Clarify SUPI format in KAMF computation Nokia CR Approval
7.1.5NAS security
Yes
YesEricsson: this is stage 3 information; is it in our scope? Nokia confirmed this. Qualcomm had some issues with this so it had to be taken offline. They also commented that some alingment might be needed with CT4.
revised No S3‑183675  
S3‑183329 Editorial correction in Clause 6.9.3.2 Nokia CR Approval
7.1.5NAS security
Yes
YesIt was commented that removing the "H" from the parameter name was not possible since this was used by CT4 and mentioned in other parts of the SA3 spec.
revised No S3‑183677  
S3‑183330 Key issue false base station detection and isolation Nokia pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesBT: false base stations are already isolated. The requirement was removed.
revised No S3‑183802  
S3‑183331 Add security requirements to key issue#6 Nokia pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesQualcomm: these are not requirements, they are solutions. KPN supported these requirements. Qualcomm: the application is in another level, it is not possible to evaluate it drom the network point of view. ORANGE agreed.
noted No    
S3‑183332 Adding Key issue for Connectionless service security Nokia pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesEricsson: some requirements already covered in other key issues, others are too solution specific. ORANGE: don’t refer to solution 29 especifically.Threats are too specific too.
revised No S3‑183775  
S3‑183333 Skeleton proposal for TR for Enhanced Network Slicing Nokia pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
Yes
approved No    
S3‑183334 eNet Slice TR content for scope Nokia pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
Yes
approved No    
S3‑183335 pCR to TR 33.813 content for references Nokia pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
Yes
approved No    
S3‑183336 pCR to TR33.813 content for definitions and abbreviations Nokia pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
Yes
noted No    
S3‑183337 pCR to TR 33.813 Adding key issue for Slice specific authentication Nokia pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
YesBT: you can have a slice without secondary authentication. Ericsson: key issue details should refer to what SA2 is doing, we cannot ignore them.
revised No S3‑183808  
S3‑183338 Solution proposal for FS_CIoT_sec_5G NEC Corporation pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesEricsson: there is an overhead in the network side. It is not clear whether this is needed so it should be captured in an editor's note. Huawei: remove the evaluation and bring one back next meeting. BT: losing security in favour of performance here. Add condition on security policy here.
revised No S3‑183777  
S3‑183339 Key issue proposal for security aspects of enhanced support of network slices NEC Corporation pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
YesHuawei: the two requirements address different key issues. Remove the second requirements. Nokia: what's UE protection? What's being protected? Eventually the requirements were removed. Ericsson: how is this done if the UE is always connected to one AMF? Huawei: there is a study where the UE is connected to multipleAMFs. ORANGE: slices with different security requirements are being mentioned, what does it mean? What are the different requirements you refer to?
noted No    
S3‑183340 Key issue proposal for security of URLLC for 5GS NEC Corporation pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
revised No S3‑183817  
S3‑183341 Correction/enhancement in CAPIF TS NEC Corporation CR Agreement
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
YesEricsson: change reference to our own TLS profile in 33.310. Revised also to correct errors on the cover page.
revised No S3‑183713  
S3‑183342 Update RRC reestablishment security procedure based on RAN2 agreement Huawei, Hisilicon CR Approval
7.1.4AS security
Yes
YesEricsson, Qualcomm: it is too late to introduce this feature now.
revised No S3‑183664  
S3‑183343 eNB allowing Unauthenticated UEs in LSM Huawei, Hisilicon CR Approval
7.4.1SAE/LTE Security
Yes
YesNokia: it adds a new requirement for existing eNodeBs. The solution could be a simple configuraton issue. The CR is not necessary. Ericsson: just refer to TS 36.413. NTT-Docomo didn’t understand the need for this. This was taken offline.
not pursued No    
S3‑183344 Adding UP security policy in SN Addition/modification Request message Huawei, Hisilicon CR Approval
7.1.4AS security
Yes
Yes
revised No S3‑183740  
S3‑183345 Clarification on how AMF confirm UE SUPI Huawei, Hisilicon CR Approval
7.1.3Mobility
Yes
YesEricsson: some incorrect statements in the note. Nokia: this is not needed. Huawei: without this, external people to SA3 will not understand the procedure. Docomo supported the fact that this was not needed.
not pursued No    
S3‑183346 Solution for protecting gNB from RRC re-establishment DDoS attack Huawei, Hisilicon pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesORANGE: thresholds are in scope of 3GPP? This is implementation specific and should not go through in normative work.
revised No S3‑183782  
S3‑183347 Key Issue on spoofing system informations Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
merged No S3‑183801  
S3‑183348 Key Issue on HO failure caused by fake base station Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
merged No S3‑183804  
S3‑183349 Key Issue on Spoofing UE paging messages Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
noted No    
S3‑183350 Protecting UE from connnecting to fake basestation during HO Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesORANGE: too early for this evaluation, remove it. Ericsson, Qualcomm: too early for the whole document.
noted No    
S3‑183351 Aoviding unnecessary HO caused by fake base station Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
noted No    
S3‑183352 Solution for protecting gNB from RRC re-establishment DDoS attack Huawei, Hisilicon pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
No
Yes
withdrawn Yes    
S3‑183353 Key Issue on spoofing system informations Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
No
Yes
withdrawn Yes    
S3‑183354 Key Issue on HO failure caused by fake base station Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
No
Yes
withdrawn Yes    
S3‑183355 Key Issue on Spoofing UE paging messages Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
No
Yes
withdrawn Yes    
S3‑183356 IoT Group Authentication Huawei, Hisilicon SID new Approval
8.17New study item proposals
Yes
Yes
revised No S3‑183691  
S3‑183357 Solution for pretecting UE from HO to fake base station Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
withdrawn Yes    
S3‑183358 Protecting UE from connnecting to fake basestation during HO Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
No
Yes
withdrawn Yes    
S3‑183359 Aoviding unnecessary HO caused by fake base station Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
No
Yes
withdrawn Yes    
S3‑183360 Clarification: AMF confirming UE SUPI in case NAS SMC failed Huawei, Hisilicon CR Approval
7.1.5NAS security
Yes
YesNokia wanted to have some clarifications and a reference to the requirement needed to be added.
revised No S3‑183676  
S3‑183361 UP IP handling for split PDU session in MR-DC scenarios Huawei, Hisilicon CR Approval
7.1.4AS security
Yes
YesEricsson: UP security policy should be the same and this CRs allows to have different UP security policies. Intel: No difference between eNodeB and gNoeb termination points. Nokia: expanding this feature in Rel-15 does not make sense. Huawei: we are not proposing having different UP security policies in the same PDU session. It is the same for the PDU session. Ericsson: all bearers terminated in the same node should have the same secirity policy; the problem lies in the split.
not pursued No    
S3‑183362 Adding NR-DC to the scenarios of MR-DC Huawei, Hisilicon CR Approval
7.1.4AS security
Yes
YesEricsson didn’t agree with the changes.
revised No S3‑183668  
S3‑183363 Reply LS on security requirements for Integrity protection for DRBs in MR-DC Huawei, Hisilicon CR Approval
7.1.15Incoming and outgoing Lses
No
Yes
withdrawn Yes    
S3‑183364 IoT Group Authentication Huawei, Hisilicon SID new Approval
8.17New study item proposals
No
Yes
withdrawn Yes    
S3‑183365 Solution for pretecting UE from HO to fake base station Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
No
Yes
withdrawn Yes    
S3‑183366 Key issue on security protection of Location service exposure for TR33.814 CATR, China Unicom, CATT pCR  
8.12Study on Security of the enhancement to the 5GC location services
Yes
Yes
merged No S3‑183771  
S3‑183367 New WID on security aspects of single radio voice continuity from 5G to 3G China Unicom, Huawei, HiSilicon, ZTE, CATT, OPPO, CATR WID new  
7.5New Work Item proposals
Yes
YesORANGE: no need to put the different scenarios in the justification, just to refer to SA2.Make a better link to SA2 in both justification and objectives. Huawei clarified that SA2 had just approved their WID in their last meeting, so the dates were changed to accommodate this. It was noted that China Unicom was not in the meeting, but Huawei clarified that they would attend in future meetings to take care of this work.
revised No S3‑183739  
S3‑183368 Impacts on existing nodes and functionality for the solution "Return from UTRAN to E-UTRAN or NR" China Unicom pCR  
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑183369 Evaluation for the solution "Return from UTRAN to E-UTRAN or NR" China Unicom pCR  
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
YesDocomo commented that the phrase had to be reworded since there was some confusion with the description of the attack.
revised No S3‑183730  
S3‑183370 Conclusion for the solution "Return from UTRAN to E-UTRAN or NR" China Unicom pCR  
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
YesMCC commented that the second sentence on the normative work expected in 33.501 was not relevant to the TR and more related to plans for a future WID, so this was removed.
revised No S3‑183731  
S3‑183371 Scope of FS_eLCS_Sec China Unicom pCR  
8.12Study on Security of the enhancement to the 5GC location services
Yes
Yes
merged No S3‑183744  
S3‑183372 key issue on protect distribution positioning assistance data China Unicom pCR  
8.12Study on Security of the enhancement to the 5GC location services
Yes
Yes
merged No S3‑183770  
S3‑183373 Correction on LTE suspend/resume procedure for EDT capable UE Intel Corporation (UK) Ltd CR  
7.4.1SAE/LTE Security
Yes
YesVodafone was puzzled: we have done integrity protection for LTE without a WID, but for 5G we needed a Work Item. Nokia offered some rewording so the document was revised for this.
revised No S3‑183650  
S3‑183374 Initial NAS Discussion on privacy solutions Intel Corporation (UK) Ltd discussion Endorsement
7.1.5NAS security
Yes
Yes
noted No    
S3‑183375 draft reply LS on security requirements for RRC connection release Intel Corporation (UK) Ltd LS out  
7.1.15Incoming and outgoing Lses
Yes
YesBT: does this apply to emergency calls? They are an exception. Ericsson: we don’t need the LS since we agree with their LS and there is no action.
noted No    
S3‑183376 Key Issue: Requirement of Trust mechanism of Non 3GPP UEs China Telecom Corporation Ltd. pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
YesORANGE: what is a non-5GC capable UE? Nokia didn’t want to agree with this key issue either. Ericsson: there is no scenario in SA2 that covers this.
noted No    
S3‑183377 URLLC pCR - new key issue on security of redundant transmission in user plane LG Electronics pCR Approval
8.13Study on security for 5G URLLC
Yes
YesHuawei: the weaker part is not true.
merged No S3‑183818  
S3‑183378 Discussion about a new SI for 5G V2X security LG Electronics discussion Discussion
8.17New study item proposals
Yes
YesQualcomm commented that it made sense having a study item for V2X in Rel-16 in SA3. Nokia was concerned about opening the doors for new use cases and key issues. LG replied that they would stick to SA2's work.
noted No    
S3‑183379 Corrections to 5.2 Requirements on the UE LG Electronics CR Agreement
7.1.16Others
Yes
Yes
agreed No    
S3‑183380 Corrections to 5.3 Requirements on the gNB LG Electronics CR Agreement
7.1.16Others
Yes
Yes
agreed No    
S3‑183381 Corrections to 9. Security procedures for non-service based interfaces LG Electronics CR Agreement
7.1.12NDS
Yes
Yes
agreed No    
S3‑183382 IP protection for SN terminated bearers Intel Corporation (UK) Ltd CR  
7.1.13.2Other
Yes
YesUsed baseline was wrong.
not pursued No    
S3‑183383 5G inclusion in TS 33.117 Nokia, Nokia Shanghai Bell, Telekom Deutschland GmbH CR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
YesMCC commented that this should be Rel-16 work and the WID code should be SCAS_5G.
agreed No    
S3‑183384 Incorporating general SBA aspects in TS 33.117 Nokia, Nokia Shanghai Bell, Telekom Deutschland GmbH CR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
YesThe Chair commented that this was a specification under change control and that adding empty clauses was not the right way of doing it. It was agreed to have a living document in the form of a draft CR where content could be added every meeting. Once the whole change is agreed, the last version of the draft CR will become a CR and all changes implemented directly into TS 33.117.
not pursued No    
S3‑183385 Test Case of transport layer protection for SBI Nokia, Nokia Shanghai Bell, Telekom Deutschland GmbH CR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
YesContent will go into the draft CR.
not pursued No    
S3‑183386 Editorial corrections in TS 33.117 Nokia, Nokia Shanghai Bell CR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
YesMCC commented that the editorial changes should go into the Rel-16 version of the specification.
agreed No    
S3‑183387 Skeleton of SCAS SEPP TS 33.517 Nokia, Nokia Shanghai Bell pCR Approval
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
Yes
Yes
approved No    
S3‑183388 Scope of SCAS SEPP TS 33.517 Nokia, Nokia Shanghai Bell pCR Approval
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
Yes
Yes
approved No    
S3‑183389 Reference of SCAS SEPP TS 33.517 Nokia, Nokia Shanghai Bell pCR Approval
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
Yes
Yes
noted No    
S3‑183390 Skeleton of SCAS NRF TS 33.518 Nokia, Nokia Shanghai Bell pCR Approval
7.2.8Network Resource Function (NRF) (TS 33.518)
Yes
Yes
approved No    
S3‑183391 Scope of SCAS NRF TS 33.518 Nokia, Nokia Shanghai Bell pCR Approval
7.2.8Network Resource Function (NRF) (TS 33.518)
Yes
Yes
approved No    
S3‑183392 Reference of SCAS NRF TS 33.518 Nokia, Nokia Shanghai Bell pCR Approval
7.2.8Network Resource Function (NRF) (TS 33.518)
Yes
Yes
noted No    
S3‑183393 pCR to TR 33.841 draft conclusion CATT pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
withdrawn Yes    
S3‑183394 Protecting SUPI for user privacy ZTE Corporation pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
YesZTE: it doesn’t say anything between the UE and the network. Huawei: we don’t need this here. ORANGE: separate both requirements. Adding privacy protection and the purpose of this in the revision, as proposed by Qualcomm and ORANGE.
revised No S3‑183734  
S3‑183395 Proposed change to the solution #1.1 of TR 33.856 Huawei, Hisilicon pCR Approval
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
YesQualcomm wanted to add a sentence in step 2 on using a different FC value that cannot be used in another key derivation. The NOTE in 4 needs to be aligned with the previous statement.
revised No S3‑183728  
S3‑183396 clean up the EN of subclause 6.4.3 in TR 33.856 Huawei, Hisilicon pCR Approval
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑183397 clean up the EN of subclause 7 in TR 33.856 Huawei, Hisilicon pCR Approval
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
YesRevised to remove the entirety of the editor's note.
revised No S3‑183732  
S3‑183398 add evaluation to solution #5 Huawei, Hisilicon pCR Approval
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑183399 editorial modification on TR 33.856 Huawei, Hisilicon pCR Approval
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑183400 correction on handover procedure from 5G to 4G Huawei, Hisilicon CR Approval
7.1.10Interworking
Yes
Yes
agreed No    
S3‑183401 Editorial corrections on the UP integrity mechanisms Huawei, Hisilicon CR Approval
7.1.16Others
Yes
Yes
agreed No    
S3‑183402 Editorial corrections on NAS SMC procedure Huawei, Hisilicon CR Approval
7.1.5NAS security
Yes
Yes
agreed No    
S3‑183403 Key issue for encryption protection of location data Huawei, Hisilicon pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
Yes
revised No S3‑183770  
S3‑183404 Key issue for integrity protection of location and assistance data Huawei, Hisilicon pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
Yes
revised No S3‑183771  
S3‑183405 Mapping requirements and test cases from 33.216 to 33.511 Huawei, Hisilicon pCR Approval
7.2.1NR Node B (gNB) (TS 33.511)
Yes
Yes
revised No S3‑183699  
S3‑183406 Add the evidences of the test cases Huawei, Hisilicon pCR Approval
7.2.1NR Node B (gNB) (TS 33.511)
Yes
Yes
noted No    
S3‑183407 CR-to-TS33501-RRC Reestablishment security handling when N2 Handover happens Huawei, Hisilicon CR Approval
7.1.4AS security
Yes
YesQualcomm: it impacts ASN.1 and it's too late for this. Ericsson: too late for this, it's more about optimization than a security issue. Docomo commented that this could go to Rel-16. The Chair commented that this should be brought back in Rel-16. This was agreed.
not pursued No    
S3‑183408 Discussion on Support AS Security Algorithms Negotiation during INACTIVE transition and RRC Reestablishment in R15 Huawei, Hisilicon discussion Discussion
7.1.4AS security
Yes
YesVodafone: the conclusion of the study is to do nothing for four years (potentially the next generation after 5G). NCSC: observations 1 and 2 should actually be included in the study.
noted No    
S3‑183409 Discussion on UP Integrity protection for small data in Early Data Transfer Huawei, Hisilicon discussion Endorsement
7.4.10Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
noted No    
S3‑183410 LS to RAN23 on UP Integrity Protection for Small Data in Early Data Transfer Huawei, Hisilicon LS out Approval
7.4.10Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
revised No S3‑183652  
S3‑183411 User Plane Integrity Protection for EDT Huawei, Hisilicon CR Approval
7.4.10Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
revised No S3‑183651  
S3‑183412 Key Issue on KDF negotiation between UE and AMF Huawei, Hisilicon pCR Approval
8.10Study of KDF negotiation for 5G System Security
Yes
YesDocomo: the security threats are not security related.
revised No S3‑183796  
S3‑183413 Key Issue on Avoiding Bidding down attack on KDF negotiation Huawei, Hisilicon pCR Approval
8.10Study of KDF negotiation for 5G System Security
Yes
Yes
noted No    
S3‑183414 Scope for TR 33.808 KDF negotiation Huawei, Hisilicon pCR Approval
8.10Study of KDF negotiation for 5G System Security
Yes
Yes
approved No    
S3‑183415 Key Issue on Classification of IoT UE based on Attack Method Huawei, Hisilicon pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesNEC wanted to rewiord the requirements. Nokia: remove the last requirement. Colin (BT): don’t duplicate the work that other SDOs are doing. E.g. TC CYBER, GSMA. ORANGE supported this. Qualcomm: this is out of scope of 3GPP.
noted No    
S3‑183416 Capture IoT Security Related Requirement in other 3GPP Document Huawei, Hisilicon pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesORANGE: the specs can change, and this is hard to maintain. Useful for a discussion document, but not for the TR.
noted No    
S3‑183417 Key Issue on Authentication of a UE for Non-public network Huawei, Hisilicon pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
YesORANGE: this confuses the concepts of public and non-public networks.
revised No S3‑183831  
S3‑183418 Key Issue on Protection of interfaces that 5GS interact with TSN Huawei, Hisilicon pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
approved No    
S3‑183419 Security solution for temporary group – broadcast group call procedure Huawei, Hisilicon CR Approval
7.4.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
Yes
YesMotorola: not technically possible to do this. The Chair commented that this was a new solution being brought into Release 15, far from cat F.
not pursued No    
S3‑183420 Solution for bootstrapping authentication of AKMA Huawei, Hisilicon pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
YesNEC: where do the keys go? What are they bound to? We need a key hierarchy as well. It was agreed to add an editor's note to address this. These and other comments were addressed in the revision.
revised No S3‑183747  
S3‑183421 Delete information during API invoker offboarding Huawei, Hisilicon CR Approval
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑183716  
S3‑183422 Editorial corrections on Application layer security on the N32 interface Huawei, Hisilicon CR Approval
7.1.13.2Other
Yes
YesNokia: it overaps with some other contributions.
merged No S3‑183689  
S3‑183423 Secure storage of UICC Huawei, Hisilicon pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
YesNEC: there is nothing new here, there are solutions for this. There was no support for this document.
noted No    
S3‑183424 secure boot of 5G-RG Huawei, Hisilicon pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
noted No    
S3‑183425 Prevent from 5G-RG cheating Huawei, Hisilicon pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
YesWhat's the difference in this context between a 5G-RG and an UE? I could use my phone as a WiFi hotspot. Juniper and Nokia supported Ericsson. Huawei: this RG is more exposed than your phone.
noted No    
S3‑183426 solution on 5G-RG authentication Huawei, Hisilicon pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑183427 Editoral Change of Solution 1 Huawei, Hisilicon pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑183428 Add EDCE5 realted requirements and testcases to 33.216 Huawei, Hisilicon CR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
Yes
revised No S3‑183710  
S3‑183429 Adding Execution Steps to in 4.2.2.1.1, 4.2.2.1.2, and 4.2.2.1.7 Huawei, Hisilicon pCR Approval
7.2.1NR Node B (gNB) (TS 33.511)
Yes
Yes
revised No S3‑183698  
S3‑183430 UPdate test cases in 33.511 Huawei, Hisilicon pCR Approval
7.2.1NR Node B (gNB) (TS 33.511)
Yes
YesDiscussed together with the paper from Ericsson in 608.
revised No S3‑183696  
S3‑183431 New requirements and testcases on UP security policy related Huawei, Hisilicon pCR Approval
7.2.1NR Node B (gNB) (TS 33.511)
Yes
Yes
noted No    
S3‑183432 Update requirements in 4.2.3.2.2 in 33.117 Huawei, Hisilicon CR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
Yes
agreed No    
S3‑183433 Draft skeleton for TR 33.814 CATT pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
YesIt was noted that the template used was wrong, reusing one from another spec.
revised No S3‑183811  
S3‑183434 pCR to TR33.814 - Scope CATT pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
Yes
revised No S3‑183744  
S3‑183435 pCR to TR33.814 - Key issue for ciphering key delivery CATT pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
YesNokia: Broadcasting is a LTE procedure, not defined for 5G yet.
noted No    
S3‑183436 New SID on User Plane Integrity Protection VODAFONE Group Plc SID new Agreement
8.17New study item proposals
Yes
YesDT: pure 5G enhancements are very welcome, we support this. NEC proposed to reword the objectives to explore other solutions, replacing "at" with "up to the" in a couple of sentences. Qualcomm supported this study item. AT&T, Apple, ORANGE, NEC, NCSC and several others were added as well.
revised No S3‑183718  
S3‑183437 Reply LS on security requirements for Integrity protection for DRBs in MR-DC Huawei, Hisilicon LS out  
7.1.4AS security
Yes
Yes
revised No S3‑183660  
S3‑183438 CR to TS33.501-Registration related text correction CATT CR Agreement
7.1.16Others
Yes
YesThis had to be checked offline as petitioned by Ericsson.
revised No S3‑183738  
S3‑183439 Security requirements on the CAPIF-3e/4e/5e reference points China Telecommunications CR Approval
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
YesNEC commented that this was rel-16 work, and this CR was bringing the functionality change in Rel-15 and this was not possible anymore. The CR cover page even mentions the enhancements in Rel-16. It was agreed to wait for SA6 to finish their work and then initiate work in SA3,possibly with a WID.
not pursued No    
S3‑183440 New SID on LTKUP Detailed Solutions VODAFONE Group Plc SID new Agreement
8.2Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-16)
Yes
Yes
revised No S3‑183755  
S3‑183441 Telescopic FQDN creation within the SEPP Telekom Deutschland GmbH, Nokia CR Approval
7.1.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑183442 Corrections to N32 Protection Policies Telekom Deutschland GmbH, Nokia CR Approval
7.1.13.1Interconnect (SEPP related)
Yes
Yes
revised No S3‑183684  
S3‑183443 Verification of the PLMN-ID by the receiving SEPP Telekom Deutschland GmbH, Nokia CR Approval
7.1.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑183444 Adopting more normative language in clause 13 Telekom Deutschland GmbH, Nokia CR Approval
7.1.13.2Other
Yes
Yes
revised No S3‑183688  
S3‑183445 pCR to TR 33.834 - Update to LTKUP Conclusions VODAFONE Group Plc pCR Approval
8.2Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-16)
Yes
YesGemalto wanted to add solution 5 together with solution 4b.MCC asked what was the intention of having a TR 900 series.Vodafone replied that a new SID was being brought to create such TR that would take the chosen solutions and describe them in more detail. The 900 series TR could be referenced externally.
revised No S3‑183752  
S3‑183446 Adding unique names to test cases Telekom Deutschland GmbH pCR Approval
7.2.2Access and Mobility Management Function (TS 33.512)
Yes
Yes
approved No    
S3‑183447 pCR to TR 33 841 Performance aspects for the new 256-bit algorithms CATT pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
withdrawn Yes    
S3‑183448 pCR to TR 33 841 Potential requirements CATT pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
withdrawn Yes    
S3‑183449 pCR to TR 33 841 Study of individual algorithm details CATT pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
withdrawn Yes    
S3‑183450 New WID - Updates and enhancements to BEST for 5G VODAFONE Group Plc WID new Agreement
7.5New Work Item proposals
Yes
YesQualcomm: we have already AKMA for Rel-16 and it’s related to this. We could include this work here. Vodafone commented that there was no such relationship. Ericsson: bring a study instead. It’s a new feature in the 5G system and we would need to do some study work before going normative. ORANGE agreed and also preferred to have it separately from AKMA. KPN supported having this in 5G directly as normative work. Vodafone: the study item will generate unnnecessary time and effort that will be later duplicated in the WID. They also had concerns that this WID wouldn’t be approved despite the study work. NEC: just create a WID with a narrow scope, a couple of contributions and we do a one step approval. It was proposed to create TEI16 CRs but that wasn't considered as a proper working method by ORANGE and supported by MCC. It was also pointed out that it was incorrectly shown TR 33.163 instead of TS 33.163. Qualcomm pointed out that there was overlap with the scope of AKMA. This had to be taken offline and it was later postponed.
postponed No    
S3‑183451 pCR to TR 33 841 Threat details to symmetric cryptography CATT pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesNCSC didn’t agree with the first change, not required. "To the best of our knowldege" was removed. Second change should go away too. This was agreed.
revised No S3‑183757  
S3‑183452 New test case: No code execution or inclusion of external ressources by JSON parsers Telekom Deutschland GmbH CR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
YesContent is agreed and it will go into the draftCR in 709.
not pursued No    
S3‑183453 Scope for TR33.825 on URLLC security Huawei, HiSilicon pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
revised No S3‑183815  
S3‑183454 Key issue authentication adaptions Huawei, HiSilicon pCR Approval
8.13Study on security for 5G URLLC
Yes
YesORANGE; authentication framework that we have is not adapted to URLLC services. The key issue is very weak. NEC supported this.
noted No    
S3‑183455 Key issue security for redundant transmissions Huawei, HiSilicon pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
revised No S3‑183818  
S3‑183456 Key issue security policy for URLLC service Huawei, HiSilicon pCR Approval
8.13Study on security for 5G URLLC
Yes
YesEricsson:Fourth requirement should go away. NEC: first requirement is very weak. NCSC: change the name of the key issue. An editor's note was agreed regarding this.
revised No S3‑183819  
S3‑183457 Key issue security aspect of low latency handover procedures Huawei, HiSilicon pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
revised No S3‑183820  
S3‑183458 Key issue QoS monitoring protection Huawei, HiSilicon pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
approved No    
S3‑183459 Key issue considerations of security algorithms for URLLC Huawei, HiSilicon pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
noted No    
S3‑183460 Improvement for key issue on the signalling overload due to malicious applications on the UE Huawei, HiSilicon pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesVodafone: no difference here between malicious operation and poor programming? T-Mobile: misbehaving should not be in the network to start with. KPN: second requirement should be a temporarily removal, not permanent (too strong). T-Mobile: isolating instead of removing from the network.
revised No S3‑183772  
S3‑183461 New KI on security features for NSaaS Huawei, HiSilicon pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
YesORANGE: the study is on the SA2 solutions not on SA5.
revised No S3‑183810  
S3‑183462 New KI on monitored security features Huawei, HiSilicon pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
YesORANGE didn't agree with the key issue since a lot of this is happening outside the slice.
noted No    
S3‑183463 New KI on slice authentication Huawei, HiSilicon pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
Yes
merged No S3‑183808  
S3‑183464 New KI on slice isolation Huawei, HiSilicon pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
YesORANGE: in TR 33.899 we discussed this extensively, what's new in here?
noted No    
S3‑183465 New KI on NSSAI confidentiality Huawei, HiSilicon pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
YesNokia: not part of the objectives or of the SA2 work. ORANGE: confidential from where to where? Huawei replied that Over The Air.ORANGE said that this is already cover in Rel-15 work. ORANGE: this depends on the Nokia solution that is being discussed in SA2. Intel supported this contribution.
noted No    
S3‑183466 Discussion on LS from SA2 on 2nd Authentication Huawei, HiSilicon discussion Endorsement
7.1.15Incoming and outgoing Lses
Yes
Yes
noted No    
S3‑183467 CR on Secondary Re-authentication Huawei, HiSilicon CR Agreement
7.1.9Secondary authentication
Yes
Yes
revised No S3‑183661  
S3‑183468 Discussion on verification of PLMN ID in N32 message Huawei, Hisilicon discussion Endorsement
7.1.13.1Interconnect (SEPP related)
Yes
YesVodafone didn’t agree with concern one. SA3 provides the tools to GSMA to implement the roaming agreements. The split of work between SA3 and GSMA is correct. They didn’t agree on concern 3 either. Ericsson commented that the most important point was that SEPP should check whether the PLMNid was fake. Vodafone didn’t object to this, but they wanted tools to prevent roaming agreements giving away information, come up wit some specific rules to avoid this. DT commented that the SEPP could enforce some checks and the details could be figured out offline. Ericsson, NEC: let us not put all the rules in our documents as this would be a great amount of work. We provide the tools but not the rules. Juniper supported this as well. NTT-Docomo: PLMNid should be available and the rules are implementation specific. An offline session was needed in order to come out with a joint agreement in a CR.
noted No    
S3‑183469 Verification of PLMN ID in N32 message Huawei, Hisilicon CR Agreement
7.1.13.1Interconnect (SEPP related)
Yes
Yes
revised No S3‑183639  
S3‑183470 Key issue on Authentication relay attack Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
revised No S3‑183805  
S3‑183471 Study on mitigation of the charging fraud attack Huawei, Hisilicon SID new Approval
8.17New study item proposals
Yes
YesDocomo: the problem exists already in LTE. Should we study this for LTE as well? Huawei didn’t have a problem with this. Vodafone: overlapping with GSMA work. They have a group of fraud. Huawei: GSMA will send an LS to SA3 about this issue. They discussed this last week. Vodafone: let's wait for the LS then, or send them an LS about this study item to trigger their response and opinion. Ericsson: does this have to be Rel-16? Is it urgent? It was agreed to attach the Study to the LS to GSMA and note it for this meeting since SA3 needed their response before continuing.
revised No S3‑183719  
S3‑183472 Discussion on UE Parameters Update via UDM Control Plane Procedure Huawei, Hisilicon discussion Endorsement
7.1.5NAS security
Yes
Yes
noted No    
S3‑183473 pCR to TR 33.841 draft conclusion CAICT, CATT, China Mobile, China Telecom, China Unicom, Huawei, HiSilicon, ZTE, OPPO, Qihoo 360 pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesVodafone: not possible to have this in Rel-16, it will be Rel-17 or Rel-18. NIST: this doesn’t reflect the content of the document.
merged No S3‑183767  
S3‑183474 Solution for UE Parameters Update via UDM Control Plane Procedure Huawei, Hisilicon CR Agreement
7.1.5NAS security
Yes
YesVodafone: This is not aligned with a decision taken in SA2 since they haven't agreed in anything based on the LS that we sent during the last meeting. There are also a lot of points here that are out of scope of 3GPP. ORANGE: SA2 hasn’t answered our LS so we shouldn't waste on figuring out a solution. Docomo was more interested in the integrity protection of the ME back channel going to the Home Network. NEC: we cannot ignore that SA2 will go forward in two weeks when they have their meeting. Vodafone insisted that SA3 could not procceed without a response from SA2. Nokia: SA2 has discussed this and agreed on solutions and they are available for us, although we haven’t received a response.
merged No S3‑183742  
S3‑183475 pCR to TR 33 841 Potential requirements CAICT, CATT, China Mobile, China Telecom, China Unicom, Huawei, HiSilicon, ZTE, OPPO pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesLast paragraph of 14.3 is not accurate. Vodafone: this needs to be clearly a requirements clause.
merged No S3‑183766  
S3‑183476 Clarification on interworking Huawei, Hisilicon CR Agreement
7.1.10Interworking
Yes
YesQualcomm didn’t agree with some of the changes. This was revised to that effect.
revised No S3‑183680  
S3‑183477 pCR to TR 33 841 Study of individual algorithm details CATT, CAICT, China Mobile, China Telecom, China Unicom, Huawei, HiSilicon, ZTE, OPPO pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
revised No S3‑183763  
S3‑183478 Update on access token in roaming scenario Huawei, Hisilicon CR Agreement
7.1.13.2Other
Yes
Yes
revised No S3‑183743  
S3‑183479 Remove the shared secret based token protection mechanism from the token related procedure Huawei, Hisilicon CR Agreement
7.1.13.2Other
Yes
YesChina Mobile objected to this contribution. Nokia was in favour of not changing it either, maybe leave it as an implementation issue.
not pursued No    
S3‑183480 CR to TS 33.501 regarding N32-f key hierarchy China Mobile CR  
7.1.13.1Interconnect (SEPP related)
Yes
Yes
agreed No    
S3‑183481 pCR to TR 33 841 regarding key derivation function China Mobile; Vodafone pCR  
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesNCSC: last sentence is not always true. Last two sentences were removed.
revised No S3‑183761  
S3‑183482 LS_to_LS on SG17 work item X 5Gsec-q China Mobile LS out  
6.10Other Groups
Yes
Yes
noted No    
S3‑183483 enhance the security of the authentication procedure China Mobile discussion  
8.17New study item proposals
Yes
Yes
noted No    
S3‑183484 Discussing ToE of security assurance for 3GPP virtualized network products China Mobile,CATR,ZTE discussion  
8.14Study on SECAM and SCAS for 3GPP virtualized network products
Yes
Yes
noted No    
S3‑183485 Discussing gaps from applying current SECAM to 3GPP virtualized network products China Mobile, CATR, ZTE discussion  
8.14Study on SECAM and SCAS for 3GPP virtualized network products
Yes
Yes
noted No    
S3‑183486 Security Impacts of Virtualisation BT plc SID new Approval
8.17New study item proposals
Yes
YesBT: No overlaps with the hardening requirements in SCAS. It was also agreed to make it internal and then if required, convert it to external. Colin (BT) pointed out hat there might be overlap with SA5 work. Alex replied that they would be consulted.
revised No S3‑183722  
S3‑183487 VERTICAL study - Scope Nokia, Nokia Shanghai Bell pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
YesORANGE asked to be minuted: we won't double the work from other Study Items. Ericsson: don’t mention WID codes.
revised No S3‑183827  
S3‑183488 VERTICAL study - Background to and key issues for VERTICAL_LAN_SEC study Nokia, Nokia Shanghai Bell discussion Endorsement
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
noted No    
S3‑183489 VERTICAL study - High-level overview of security aspects Nokia, Nokia Shanghai Bell pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
YesVodafone and ORANGE objected to the content. CRs should not be referenced, it's already in the specification.
noted No    
S3‑183490 VERTICAL study - KI1 on primary authentication using EAP Nokia, Nokia Shanghai Bell pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
YesORANGE: what about 5G-AKA' and so on? Nokia: the sensor may not have an UICC. ORANGE asked how the credentials would be protected in this case. We have done this authentication framework already. Gemalto, Vodafone, Telecom Italia, BT supported ORANGE. Nokia: we are doing what SA1 mandated. ORANGE: we cover the requirement in TS 33.501. Sony,NEC supported having this key issue for analysis. Ericsson as well. There were strong issues for and against having this key issue. ORANGE: in TS 33.501 it's an informative annex on the EAP framework, to be able to use different methods. I don’t want to have this as normative. Qualcomm was in favour of the key issue.
merged No S3‑183831  
S3‑183491 VERTICAL study - KI2 on primary authentication in NPN using Rel-15 authentication methods Nokia, Nokia Shanghai Bell pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
merged No S3‑183831  
S3‑183492 VERTICAL study - KI3 on authentication framework for NPN Nokia, Nokia Shanghai Bell pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
merged No S3‑183831  
S3‑183493 VERTICAL study - KI4 on Security implications for accessing PLMN services via NPN and vice versa Nokia, Nokia Shanghai Bell pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
merged No S3‑183828  
S3‑183494 VERTICAL study - KI5 on verification of the integrity of a message Nokia, Nokia Shanghai Bell pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
YesORANGE: the requirement is unclear. Is it user plane, control plane? Vodafone supported ORANGE.
noted No    
S3‑183495 VERTICAL study - KI6 on non-repudiation of the sender of a message Nokia, Nokia Shanghai Bell pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
noted No    
S3‑183496 VERTICAL study - definitions and abbreviations Nokia, Nokia Shanghai Bell pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
YesORANGE: already used or found somewhere else.Write the definitions once they are used in the document. Nokia: some of them are used already in approved pCRs for this meeting. Those definitions that were not used were removed.
noted No    
S3‑183497 VERTICAL study - reference Nokia, Nokia Shanghai Bell pCR Agreement
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
YesORANGE: don’t refer to a CR. The Chair commented that references should be written as they are used. Any pCR which uses a reference should include the change in the pCR and not in a separate document.
noted No    
S3‑183498 Formatting issue Nokia, Nokia Shanghai Bell CR Agreement
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
Yes
agreed No    
S3‑183499 Shift of text from SEPP intro to subclause Nokia, Nokia Shanghai Bell CR Agreement
7.1.13.2Other
Yes
YesEricsson: the new clause should be an introduction of 13.2 and not the whole clause 13.
revised No S3‑183690  
S3‑183500 Clarification to protection scheme identifier Nokia, Nokia Shanghai Bell CR Agreement
7.1.14Privacy
Yes
Yes
revised No S3‑183693  
S3‑183501 Clarification to the transfer of authentication success result to the UDM Nokia, Nokia Shanghai Bell CR Agreement
7.1.8Primary authentication
Yes
Yes
agreed No    
S3‑183502 Intro of subclauses to clause 6.12.2 Nokia, Nokia Shanghai Bell CR Agreement
7.1.14Privacy
Yes
YesORANGE commented that the last title should not be about guidance since it was normative. IDEMIA and Qualcomm didn’t find this useful so it was not pursued.
not pursued No    
S3‑183503 Correction of formatting error Nokia, Nokia Shanghai Bell CR Agreement
7.1.8Primary authentication
Yes
YesDocomo commented that there was a reason for having the formatting; it was done to point out that the paragraph was independent.
not pursued No    
S3‑183504 Alignment on KEY Nokia, Nokia Shanghai Bell CR Agreement
7.1.2Key derivation
Yes
Yes
agreed No    
S3‑183505 Alignment on Home Network Public Key Nokia, Nokia Shanghai Bell CR Agreement
7.1.14Privacy
Yes
YesMCC commented that the clauses in the changes should follow the order in the specification (6.2.2 at the end was wrong).
revised No S3‑183694  
S3‑183506 Skeleton of TR 33.818 China Mobile, CATR draft TR  
8.14Study on SECAM and SCAS for 3GPP virtualized network products
Yes
Yes
approved No    
S3‑183507 pCR to 33.841 (256bit) - Update section 4 with new drivers VODAFONE Group Plc pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
YesNCSC: this brings a new driver that would need additional analysis and assesment. Qualcomm disagreed with the document as well. Vodafone: if companies are comfortable with the 4 year wait, then we don’t need to discuss theese documents. Huawei didn't agree with waiting for 4 years. Vodafone: if companies agree with not asking SAGE to start the process, then we can withdraw all these documents. CATT: we need 256 bits for classified communications. We support this. NCSC: introducing this now means an additional year of work to assess it. Nokia: our requirements can stand for 4 years. Vodafone: SAGE estimates a year to come back with the algorithms analysis. Vodafone proposed to send an LS to ask SAGE what algorithm would be suitable for 256 integrity and cyphering. NCSC questioned the necessity to do this. Vodafone: there are market drivers for this. Support for sending the LS: AT&T, NEC, Airbus, China Mobile, IDEMIA, Gemplus, CATT,CATR, NIST,Vodafone,Huawei,Qualcomm,T-Mobile, ZTE. Vodafone: happy to withdraw these documents and make the spec more quantum computing directed and not having to justify the time frame with them. This was agreed and a number of documents were noted.
noted No    
S3‑183508 Key issue on Need for UE capability based KDF negotiation in 5GS NEC Corporation pCR Approval
8.10Study of KDF negotiation for 5G System Security
Yes
YesEricsson and ORANGE objected to the key issue. ORANGE was not comfortable with having the UE deciding the KDF. Ericsson: we study a need and this key issue assumes there is a need. Docomo, ORANGE and Qualcomm supported that the need should be studied first. Huawei: there are companies who are convinced that this is not needed, so we could just finish with a "this is not needed". It was agreed to have the following process: - Justify the need. - Study the solution.
noted No    
S3‑183509 Scope of TR 33.818 China Mobile, CATR pCR  
8.14Study on SECAM and SCAS for 3GPP virtualized network products
Yes
Yes
revised No S3‑183824  
S3‑183510 Key Issue on Need for Flexible KDF negotiation NEC Corporation pCR Approval
8.10Study of KDF negotiation for 5G System Security
Yes
Yes
noted No    
S3‑183511 Discussion and pCR of Candidate Solution: Transport independent procedure using existing protocols China Mobile; Alibaba (China) Group., Ltd. pCR  
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
YesFigure changed to grey scale since the colors didn’t mean anything. It was also agreed to add an Editor's note on architecture as proposed by Nokia. Split into solutions as well.
revised No S3‑183748  
S3‑183512 Key Issue on Need for Bidding down protection NEC Corporation pCR Approval
8.10Study of KDF negotiation for 5G System Security
Yes
Yes
noted No    
S3‑183513 Discussion and pCR of candidate solution: UE implementation schemes in achieving AKMA procedures China Mobile; Alibaba (China) Group., Ltd. pCR  
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
YesVodafone: colors mean nothing, make the figures editable, also split into different solutions. KPN: what is CP and AT? Please add their definitions.
revised No S3‑183749  
S3‑183514 Key issue for authentication and authorization of 5GLAN UE in 5GLAN group communication NEC Corporation pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
YesEricsson: remove requirements and let's wait for SA2's conclusions.
revised No S3‑183829  
S3‑183515 Adding missing references in TS 33.117 Nokia, Nokia Shanghai Bell CR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
Yes
agreed No    
S3‑183516 Clause 13.1.1: AES modes Ericsson pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
revised No S3‑183764  
S3‑183517 Update of Key Issue #2: FN-RG authentication and authorization Ericsson pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
YesNEC: why do we study the authentication and authorization of FN-RG if this is outside the scope of 3GPP? It's BBF stuff. Ericsson: BBF will ask us questions about this. We can have something in our TR or we can communicate with them via LS. Huawei: this is in scope of SA2. It was agreed to send an LS to SA2 to consult them on this topic. The document was finally noted.
noted No    
S3‑183518 New solution for Key Issue #2: FN-RG authentication and authorization Ericsson pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
noted No    
S3‑183519 New KI: Authentication of 5G capable UE behind a RG Ericsson pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
YesORANGE didn’t find this necessary.This is not different from an WiFi access point.NEC supported this. Nokia and Deutsche Telekom preferred to have this key issue added. ORANGE: what's the added value for having another mechanism for non 3GPP access? It was agreed to add a note where it was stressed that any other authentication rather than 5GC authentication would need a strong reason.
revised No S3‑183786  
S3‑183520 New KI: User plane data handling for 5G capable UE behind a RG Ericsson pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
revised No S3‑183787  
S3‑183521 New Solution: 5GC-capable UEs behind 5G-RG/FN-RG using N3GPP-access solutions Ericsson pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
YesHuawei: postponed the evaluation part until SA2 has finished with this. Ericsson: we cannot wait for SA2, it would be too late.
revised No S3‑183791  
S3‑183522 N32: remove redundant references to encrypted IEs Ericsson CR Agreement
7.1.13.1Interconnect (SEPP related)
Yes
Yes
revised No S3‑183685  
S3‑183523 pSEPP-pNF authentication Ericsson CR Agreement
7.1.13.2Other
Yes
Yes
agreed No    
S3‑183524 Maximum output size of SUPI concealment scheme Ericsson draftCR Approval
7.1.14Privacy
Yes
YesThere were some concerns on mandating the 3000 octets so this had to be taken offline. Vodafone: I don’t want issues when a legacy USIM is in a new UE. Agreed content goes to 692.
noted No    
S3‑183525 Maximum output size of SUPI concealment schemes Ericsson discussion Endorsement
7.1.14Privacy
Yes
Yes
noted No    
S3‑183526 WLAN positioning - new KI for the upcoming TR on FS_eLCS_Sec Ericsson pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
YesNextNav: Combine WLAN, TBS, positioning into one. NEC preferred to have Bluetooth, WLAN separate because of their security aspects. NextNav commented that there were many positioning methods and was wondering why these three were considered. The Chair commented that input was welcome to change this. NextNav insisted that they didn’t agree with being as specific as this, focusing on WLAN instead of going generic.
noted No    
S3‑183527 Bluetooth positioning - new KI for the upcoming TR on FS_eLCS_Sec Ericsson pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
YesMCC commented that Bluetooth was a trademark, but NextNav commented that in RAN2 a trademark sentence could be added to the cover page of the specification.
approved No    
S3‑183528 TBS positioning - new KI for the upcoming TR on FS_eLCS_Sec Ericsson pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
YesNextNav: make all this generic.ESA agreed. The Chair commented that WLAN/Bluetooth had a specific network type. For this document, it could be made more generic. NextNav: what are the specific privaty concerns for these cases? GPS/satellite, Bluetooth,..can be generalised. Ericsson: privacy issues with the connecting beacons. NEC: collected data on these cases are about people. GPS collected data is different. Ericsson: we cannot commit to generalise all this now. It can be done with a future contribution. NextNav: there are a lot of flavours of TBS. Which one is it referred here? Ericsson: add an editor's note on the need of studying this to generalise it.
revised No S3‑183814  
S3‑183529 New key issue for key refreshment in 5GLAN group communication NEC Corporation pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
YesEricsson: key issues need to be rewritten. Not clear at all what the security aspects are.
noted No    
S3‑183530 A key issue on Slice-specific security features in NSaaS China Mobile pCR  
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
YesORANGE: not in the scope of the study, not SA2 work.
merged No S3‑183810  
S3‑183531 A key issue: Security and privacy aspects related to Network Slice specific access authentication and authorization China Mobile pCR  
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
Yes
approved No    
S3‑183532 New key issue for securing the communication between 5GLAN UE and GMF NEC Corporation pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
noted No    
S3‑183533 Key Issue on Compliance with Local Rules and Regulations NEC Corporation pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
YesMCC commented that the sentence of "AKMA should be made regulations aware.." looked like a requirement. It was pointed out that this wasn't the intention and it was agreed to reword it as "needs to be done.." directly into the spec by the rapporteur.
approved No    
S3‑183534 Key Issue on Access Independent Security for 5WWC NEC Corporation pCR Agreement
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
revised No S3‑183788  
S3‑183535 Security solution for small data sent with EDT in RRC Resume Request for E-UTRA connected to 5GC Ericsson pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
revised No S3‑183779  
S3‑183536 Security solution for small data included in initial NAS to handle AMF reallocation Ericsson LM pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
revised No S3‑183780  
S3‑183537 Security solution for MO SMS in initial NAS message - handling AMF re-allocation Ericsson LM pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
revised No S3‑183778  
S3‑183538 New Key Issue: Remote (de)provisioning of credentials KPN pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesORANGE: we decided not to deal with this topic anymore, since SA2 has not concluded on this issue.
noted No    
S3‑183539 Key Issue #4 – Signalling overload due to Malicious Applications on the UE KPN pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesEricsson: the need for human intervention is something we usually don’t mention in our specs. This was removed.
merged No S3‑183772  
S3‑183540 Editorial corrections in 13.2 Nokia, Nokia Shanghai Bell CR Agreement
7.1.13.2Other
Yes
Yes
revised No S3‑183689  
S3‑183541 New KI: Protection of interface used by NIDD procedures Ericsson LM pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
revised No S3‑183773  
S3‑183542 New Solution for Key Issue #4: Use of UE Configuration Update KPN pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesNokia: vague solution. Huawei: this detection mechanism is out of scope of 3GPP. ORANGE: it is written in the evaluation that it is out of scope of 3GPP. Several editor's notes were agreed to be added in the revision.
revised No S3‑183781  
S3‑183543 New solution for protection of interface used by NIDD procedures Ericsson LM pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
revised No S3‑183783  
S3‑183544 New Key Issue: Generic battery efficient end-to-end security KPN pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
YesVodafone: battery efficient bit is too narrow.Happy to say "battery effcient" without the i.e. Ericsson: the operator would provide the keys here? It's strange. ORANGE: puzzled by some of the terms, like "simple UE". We are not saying anywhere that AKMA shall support GBA as it is implied here. Huawei: worried about the operator eavesdropping the communications.It was agreed to remove the threat. Ericsson: the point of AKMA is not to protect the UE from the operator. Vodafone: consider lawful interception issues here, LI needs to check this.
revised No S3‑183736  
S3‑183545 New KI: Privacy protection of the NIDD API between UPF/NEF and AF Ericsson LM pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
YesNEC: reword the security threat. It had to be taken offline to address some concerns from ORANGE. Huawei: remove UPF from the title.
noted No    
S3‑183546 Issue with using wildcard certificates in SEPP Nokia, Nokia Shanghai Bell discussion Agreement
7.1.13.1Interconnect (SEPP related)
Yes
Yes
noted No    
S3‑183547 Security between SEPP and IPX Nokia, Nokia Shanghai Bell, Telekom Deutschland GmbH CR Approval
7.1.13.1Interconnect (SEPP related)
Yes
YesNEC: Say "should use" instead of "SA3 strongly recommends".
revised No S3‑183686  
S3‑183548 Telescopic FQDN for callback URIs Nokia, Nokia Shanghai Bell discussion Agreement
7.1.13.1Interconnect (SEPP related)
Yes
Yes
noted No    
S3‑183549 Two parallel N32-c connections between SEPPs Nokia, Nokia Shanghai Bell CR Approval
7.1.13.1Interconnect (SEPP related)
Yes
Yes
revised No S3‑183687  
S3‑183550 Discussion on the Reply LSs on initial NAS security agreements Samsung discussion Endorsement
7.1.5NAS security
Yes
Yes
noted No    
S3‑183551 Key issue on AS security during RRC Idle mode Samsung pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
merged No S3‑183801  
S3‑183552 Solution for AS security during RRC Idle mode Samsung pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesORANGE: when we bring these solutions from TR 33.899, shouldn’t we use their evaluations as well? We don’t need to re-evaluate. There was no requirement for this solution, so it was noted.
noted No    
S3‑183553 Draft-Reply LS on Control Plane Solution for Steering of Roaming in 5GS Samsung LS out Approval
7.4.14PLMN RAT selection (Steering of Roaming) (Rel-15)
Yes
YesVodafone didn’t agree with this response.
noted No    
S3‑183554 Correction to Key hierarchy diagram Samsung CR  
7.1.1Key hierarchy
Yes
Yes
revised No S3‑183678  
S3‑183555 RES* verification failure test case Nokia, Nokia Shanghai Bell pCR Approval
7.2.2Access and Mobility Management Function (TS 33.512)
Yes
Yes
approved No    
S3‑183556 Corrections to KSEAF derivation in Key distribution and derivation Samsung CR Approval
7.1.2Key derivation
Yes
Yes
agreed No    
S3‑183557 Association of security context Samsung CR  
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
YesNEC didn't see this as a fix.Ericsson agreed. This had to be taken offline, .
not pursued No    
S3‑183558 Missing subclause headings Samsung CR  
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
YesNEC doubted that adding sub-clauses would cause less confusion. This is a SA6 issue, no action for SA3. They didn't have a strong opposition for not having these sub-clauses though.
agreed No    
S3‑183559 [DRAFT] LS on API invoker onboarding Samsung LS out  
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
YesNEC and Ericsson: the original LS was to SA6, not SA3.
noted No    
S3‑183560 [DRAFT] LS on Security method negotiation Samsung LS out  
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑183795  
S3‑183561 New KI: Key Lifetimes Ericsson India Private Limited pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
YesVodafone: what happens when the max lifetime is reached? We need requirements for that too. Nokia: why are we negotiating the keys again in the security threat? Ericsson replied that it is similar to what happens in GBA. Gemalto confirmed that this case was widely studied in the GBA work. This had to be taken offline. The max lifetime was the only non controversial issue.
revised No S3‑183737  
S3‑183562 New solution: Access independent architecture solution for AKMA Ericsson India Private Limited pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
revised No S3‑183750  
S3‑183563 New KI: API for AKMA keys in UE Ericsson India Private Limited pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
YesVodafone, Qualcomm: we don’t standardize this. It was decided to add an editor's note in order to clarify Qualcomm's concerns.
revised No S3‑183746  
S3‑183564 New solution: Stand-alone architecture solution for AKMA Ericsson India Private Limited pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
revised No S3‑183751  
S3‑183565 New option for 33.855 solution #8 Ericsson India Private Limited pCR Approval
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
Yes
Yes
revised No S3‑183723  
S3‑183566 NF-SEPP TLS handling Ericsson India Private Limited CR Agreement
7.1.13.2Other
Yes
Yes
revised No S3‑183647  
S3‑183567 Update of PARLOS solution #1 Motorola Mobility, Lenovo pCR Approval
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
Yes
YesEricsson didn’t agree with removing the editor's note and they proposed to reformulate it. Sprint: these could be unauthenticated devices without an USIM. Things can be handled by an ME without an USIM. The term UE was to be replaced by ME. Sprint added that false base stations atttacks are possible due to the current FCC regulations. The document was revised to address these comments.
revised No S3‑183725  
S3‑183568 Clause #4 for the upcoming TR on FS_5GFBS Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesNTT-Docomo: Some parts should go to the Introduction of the draft report.
revised No S3‑183800  
S3‑183569 SON security - new KI for the upcoming TR on FS_5GFBS Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
revised No S3‑183804  
S3‑183570 Enhancing detection - new KI for the upcoming TR on FS_5GFBS Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
merged No S3‑183802  
S3‑183571 Enhancing untraceability - new KI for the upcoming TR on FS_5GFB Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
noted No    
S3‑183572 Privacy visibility - new KI for the upcoming TR on FS_5GFB Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesBT,Nokia and Apple objected to this. ORANGE supported this, since the user could react with some action if he receives the data that there is a false base station,
noted No    
S3‑183573 KI for security keys for redundant data Ericsson pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
merged No S3‑183818  
S3‑183574 KI for UP security policy handling for redundant data Ericsson pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
approved No    
S3‑183575 Security solution for handling UP security policy for redundant data Ericsson pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
revised No S3‑183822  
S3‑183576 Service visibility - new KI for the upcoming TR on FS_5GFB Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesApple objected to this.
noted No    
S3‑183577 KI for retaining AS security key Ericsson pCR Approval
8.13Study on security for 5G URLLC
Yes
YesQualcomm: you are assuming that there are no threats. Remove the "not applicable". Same as security requirements.
revised No S3‑183821  
S3‑183578 Solution for flexibility to retain or to change AS security keys Ericsson pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
revised No S3‑183823  
S3‑183579 SI replay - new KI for the upcoming TR on FS_5GFB Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesThe requirement was removed. MCC commented that it was not possible to refer to TR 33.899 since the draft had been withdrawn.
merged No S3‑183801  
S3‑183580 SI integrity - new KI for the upcoming TR on FS_5GFB Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesThe Chair commented that a catalog of common possible attacks on the base stations should be avoided in this document. It was enough just to refer to other documents that describe them.
revised No S3‑183801  
S3‑183581 Rogue REJECTS - new KI for the upcoming TR on FS_5GFB Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
merged No S3‑183803  
S3‑183582 Radio jamming - placeholder-only KI for the upcoming TR on FS_5GFB Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
YesDeutsche Telekom didn’t see the need to include this key issue.
revised No S3‑183806  
S3‑183583 New key issue on key separation between Network Slices Ericsson pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
YesThe requirement was decided to be split.
revised No S3‑183809  
S3‑183584 Multiple NAS connections and algorithm change Ericsson draftCR Approval
7.1.5NAS security
Yes
YesQualcomm: Very restrictive behaviour in the UE and it is also introducing a new requirement on the UE that will make it unnecessarily complex.
noted No    
S3‑183585 Multiple NAS connecions: mobility with horizontal KAMF derivation Ericsson draftCR Approval
7.1.5NAS security
Yes
Yes
noted No    
S3‑183586 Support of UP security policy in ng-eNB Ericsson draftCR Approval
7.1.4AS security
Yes
YesContent goes into the CR in 586 unchanged.
approved No    
S3‑183587 E-UTRA connected to 5GC Ericsson draftCR Approval
7.1.4AS security
No
Yes
withdrawn Yes    
S3‑183588 Handling of initial NAS protection failures Ericsson draftCR Approval
7.1.5NAS security
Yes
Yes
noted No    
S3‑183589 Way forward on how to address mobility cases for the initial NAS protection mechanism Ericsson discussion Endorsement
7.1.5NAS security
Yes
YesEricsson pointed out that relying on the CT1 solution is not very optimised.
noted No    
S3‑183590 Handling of mobility scenarios involving an AMF key change for the initial NAS protection mechanism Ericsson draftCR Approval
7.1.5NAS security
Yes
Yes
noted No    
S3‑183591 Handling of mobility scenarios involving an AMF key change for the initial NAS protection mechanism Ericsson draftCR Approval
7.1.5NAS security
Yes
Yes
noted No    
S3‑183592 EDCE5 – Fixing contradicting and insecure scg/sk counter handling in 33.401 from 36.331 Ericsson CR Agreement
7.4.11EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5)
Yes
YesNokia: all these changes complicate the implementation. It was agreed to add a note. Huawei: this is not needed. RAN2 already understands what the counter is about.
revised No S3‑183712  
S3‑183593 LTE EDT – integrity protection of uplink EDT data Ericsson CR Agreement
7.4.1SAE/LTE Security
Yes
YesEricsson commented that RAN groups had to be queried whether this change was possible.They wanted to provide integrity protection for the uplink data and keep it 32 bits. An LS would have to be sent during the meeting week. It was pointed out that this CR was for Rel-15. Note from MCC: it is too late to bring cat-B CRs for Rel-15 so this has to be checked.
merged No S3‑183651  
S3‑183594 Update of EAP-AKA’ reference to make it compatible with 5G Ericsson draftCR Agreement
7.1.8Primary authentication
Yes
YesMCC had issues with referencing documents that don’t exist ("future updates" or versions that will superced the current one). Ericsson commented that the current version does not work with 5G. NCSC also had issues with this. Huawei proposed to add an editor's note stating that the draft could not referenced until it was formally approved in IETF. Agreed content goes to 679.
noted No    
S3‑183595 Update of EAP-AKA’ RFC 5448 in progress Ericsson discussion Discussion
7.1.8Primary authentication
Yes
Yes
noted No    
S3‑183596 Update of EAP-AKA PFS work in progress Ericsson discussion Discussion
8.17New study item proposals
Yes
Yes
noted No    
S3‑183597 New SID on authentication enhancements in 5GS Ericsson SID new Discussion
8.17New study item proposals
Yes
Yes
revised No S3‑183721  
S3‑183598 Work on improving perfect forward secrecy in 5G network access Ericsson discussion Discussion
8.17New study item proposals
No
Yes
withdrawn Yes    
S3‑183599 discussion on security credential storage Ericsson discussion Discussion
8.16Other study areas
Yes
Yes
noted No    
S3‑183600 DRAFT Reply LS on Separate HSS and UDM and security credentials storage Ericsson LS out Approval
8.16Other study areas
Yes
Yes
noted No    
S3‑183601 Handling of NAS COUNTs Ericsson CR Agreement
7.1.5NAS security
Yes
Yes
revised No S3‑183674  
S3‑183602 Discussion on the applicability of gNB requirements to ng-eNB Ericsson discussion Discussion
7.1.4AS security
Yes
Yes
noted No    
S3‑183603 NG-RAN – clause 6.9.2.2 Ericsson CR Agreement
7.1.4AS security
Yes
Yes
revised No S3‑183644  
S3‑183604 NG-RAN – clause 6.9.2.3.3 Ericsson CR Agreement
7.1.4AS security
Yes
Yes
revised No S3‑183645  
S3‑183605 NG-RAN – clause 6.9.2.3.4 Ericsson CR Agreement
7.1.4AS security
Yes
Yes
revised No S3‑183646  
S3‑183606 Draft CR to S3-183210 (Handling of UP security policy in MR-DC) Ericsson draftCR Agreement
7.1.4AS security
Yes
YesQualcom disagreed. Not in line with what SA3 has agreed before. Huawei supported this CR. Nokia commented that this would introduce unnecessary complexity.Qualcomm agreed, this could be potentially a problem. Ericsson replied that RAN could be consulted on the supposed complexity of this.
merged No S3‑183668  
S3‑183607 draft TS 33.516 (AUSF SCAS) Ericsson India Private Limited draft TS Approval
7.2.6Authentication Server Function (AUSF) (TS 33.516)
Yes
Yes
approved No    
S3‑183608 SCAS discussion Ericsson India Private Limited pCR Discussion
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
Yes
noted No    
S3‑183609 Discussion on the CT1 LS on initial NAS security Qualcomm Incorporated discussion Endorsement
7.1.5NAS security
Yes
Yes
noted No    
S3‑183610 Adjusting the description of the initial NAS protection method Qualcomm Incorporated draftCR Agreement
7.1.5NAS security
Yes
YesContents will be merged into 673 since this is a draftCR.
noted No    
S3‑183611 LS on initial NAS message protection Qualcomm Incorporated LS out Approval
7.1.5NAS security
Yes
YesVodafone: who makes the decision on what goes on clear and what doesn’t? Qualcomm replied that it will be up to SA3.
revised No S3‑183741  
S3‑183612 Discussion on the SA2 LS on initial NAS security Qualcomm Incorporated discussion Endorsement
7.1.5NAS security
Yes
Yes
noted No    
S3‑183613 LS on initial NAS message protection Qualcomm Incorporated LS out Approval
7.1.5NAS security
Yes
Yes
noted No    
S3‑183614 Network control of sending S-NSSAIs in the RRC signalling Qualcomm Incorporated CR Agreement
7.1.5NAS security
Yes
Yes
not pursued No    
S3‑183615 Discussion on CT1 on Scenarios with multiple registrations to the same AMF Qualcomm Incorporated discussion Endorsement
7.1.5NAS security
Yes
Yes
noted No    
S3‑183616 Addressing possible security context mismatch on non-3GPP acces when multiply registered on one PLMN Qualcomm Incorporated CR Agreement
7.1.5NAS security
Yes
Yes
not pursued No    
S3‑183617 Addressing the editor’s notes in the conclusions clause of TR 33.856 Qualcomm Incorporated pCR Approval
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
noted No    
S3‑183618 Corrections on the number of bits of downlink NAS COUNT value to be delivered in the 5GS to EPS handover procedure Qualcomm Incorporated CR Agreement
7.1.10Interworking
Yes
Yes
agreed No    
S3‑183619 Clarification on storing the selected EPS NAS algorithms Qualcomm Incorporated CR Agreement
7.1.10Interworking
Yes
Yes
agreed No    
S3‑183620 KgNB derivation in EPS to 5GS handover Qualcomm Incorporated draftCR Approval
7.1.10Interworking
Yes
YesEricsson: not sure that we need these changes. There was no issue with the KgNb. This had to be taken offline.
noted No    
S3‑183621 Clarification on RRC Inactive procedure support by ng-eNB Qualcomm Incorporated CR Agreement
7.1.4AS security
Yes
Yes
revised No S3‑183665  
S3‑183622 NR-NR Dual Connectivity Qualcomm Incorporated CR Agreement
7.1.4AS security
Yes
YesEricsson commented that the used baseline was incorrect since the content in 6.10.4 was different from what appeared here. Huawei agreed.
merged No S3‑183668  
S3‑183623 KgNB derivation in N2 handover Qualcomm Incorporated CR Agreement
7.1.10Interworking
Yes
Yes
agreed No    
S3‑183624 Security mechanism for UE Parameters Update via UDM Control Plane Procedure Qualcomm Incorporated CR Agreement
7.1.5NAS security
Yes
YesVodafone: strong objection to having this in Rel-15. Vodafone asked to have minuted: Updating routing id over the air is a very poor procedure. Their objection was sustained. Qualcomm: this is a SA2 related CR and it's a Plenary discussion. IDEMIA: is this essential for Rel-15? Ericsson: it's the security solution for a SA2 CR. ORANGE: this is cat-B, not F. The Chair asked the companies to start focusing on Rel-16 instead of keep bringing input for Rel-15.
revised No S3‑183742  
S3‑183625 Clarifications to SUPI and SUCI Qualcomm Incorporated CR Agreement
7.1.14Privacy
No
Yes
withdrawn Yes    
S3‑183626 General SCAS API requirements Ericsson India Private Limited CR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
YesNokia wondered if this was a security input. Huawei considered that these kind of test cases were not usually discussed in SA3. This will go into the draft CR in 709.
not pursued No    
S3‑183627 New SID on data rate enhancements for user plane integrity protection Motorola Mobility, Lenovo SID new Approval
8.17New study item proposals
Yes
Yes
merged No S3‑183718  
S3‑183628 Clarifications to SUPI and SUCI Qualcomm Incorporated draftCR Approval
7.1.14Privacy
Yes
YesIDEMIA commented that SUPI type was needed since there were two types. Qualcomm: SUPI type is not needed since in here it is always the IMSI. Some offline discussion on whether the SUPI type was needed or not. This was noted and the agreed content made into a CR.
noted No    
S3‑183629 TR 33.841: complete clause on OTA mechanism Gemalto N.V. pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
revised No S3‑183762  
S3‑183630 P-CR describing current manual roaming in US Sprint Corporation pCR Agreement
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
Yes
YesVodafone: some other countries different from US have this issue as well. What happens if they try to attach as an VF UK customer and there is no roaming agreement with VF UK? Are you switching to the manual roaming? Sprint replied affirmatively, and Vodafone didn't find it acceptable. This enabling customers to break their agreements. An editor's note on this issue was added. MCC commented that mentioning companies like American Roaming Networks could lead to copyright issues that should be avoided. A reference to a study or paper where the data was found would be more useful. Mirko (MCC) also suggested to add a reference to the SA1 study document. There were several editorial issues that were taken into account as well in the revision.
revised No S3‑183727  
S3‑183631 Key Issue on secure communication between ME and UICC Alibaba (China) group., Ltd., China Mobile pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
YesORANGE: interface between ME and UICC is in the scope of ETSI SCP, not ours. There was not much support for this contribution, so it was finally noted.
noted No   S3‑183306
S3‑183632 Discussion on one potential way to improve the efficiency of IP Apple Computer Trading Co. Ltd discussion Discussion
7.1.16Others
Yes
YesLenovo: this should be studied in one of the current SIDs, better not to agree on these conclusions right now. Qualcomm: there are issues with the randomised IV. Vodafone agreed that this was a good input for some of the Studies brought into this meeting.
noted No   S3‑183302
S3‑183633 Resolution of Editor’s note on wildcard certificates in S3-183441 Nokia, Nokia Shanghai Bell, Telekom Deutschland GmbH CR Agreement
7.1.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑183634 TS 33 127 v110 BT plc draft TS Agreement
4.3Report from SA3-LI
Yes
YesBT commented that this revision was a correction on a wrongly implemented CR. It was brought to this meeting for approval. BT commented that this draft was sent for information and approval to the next SA plenary.
approved No   s3i180608
S3‑183635 Cover sheet for presentation of TS 33.127 to SA Plenary SA3 (SA3-LI) TS or TR cover Agreement
4.3Report from SA3-LI
Yes
Yes
approved No   s3i180603
S3‑183636 Comments on S3-183624 NEC Corporation other Agreement
7.1.5NAS security
Yes
YesVodafone: we deal with this in the previous meeting, no point in going through this again. Provisioning is ut of scope of 3GPP.
noted No    
S3‑183637 PCR to TR33.514 SUCI test case correction CATT pCR Approval
7.2.4Unified Data Management (UDM) (TS 33.514)
Yes
Yes
revised No S3‑183701  
S3‑183638 Scenarios that require generation of telescopic FQDN in SEPP Nokia, Nokia Shanghai Bell CR Agreement
7.1.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑183639 Verification of PLMN ID in N32 message Huawei, Hisilicon CR Agreement
7.1.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No   S3‑183469
S3‑183640 LS-Reply proposal - Commenting on S3-183599, S3-183600, S3-183327 Nokia, Nokia Shanghai Bell other Approval
8.16Other study areas
Yes
Yes
noted No    
S3‑183641 Comments on S3-183550 NSSAI inclusion in NAS Nokia, Nokia Shangahi bell other Approval
7.1.5NAS security
Yes
YesSamsung: the attack is difficult but still feasible. NCSC didn’t see this attack as feasible.
noted No    
S3‑183642 Comments on S3-183374 Nokia, Nokia Shanghai Bell discussion Approval
7.1.5NAS security
Yes
YesEricsson: we should point out the implications for our preferences. Trust on the VPLMN was widely discussed in the group. Docomo didn’t see this as a big issue. Verizon preferred the solution in 565. Vodafone didn’t want visited networks breaking the level of security that the Home Network had decided. Ericsson wanted to highlight the security aspects in order to reveal the slices that are privacy sensitive. We cannot say that both solutions have the same level of security since one exposes more information than the other. Alex (BT): we need to accept that the VPLMN will have some control on this. It was agreed to write down the results of the discussions on the LS in 659.
noted No    
S3‑183643 Discussion on the changes proposed in S3-183620 and S3-183623 Qualcomm Incorporated discussion  
7.1.10Interworking
Yes
Yes
noted No    
S3‑183644 NG-RAN – clause 6.9.2.2 Ericsson CR Agreement
7.1.4AS security
Yes
YesIt was commented that it should be "NG-RAN node" instead of "NG-RAN". Nokia didn't agree with the new term KNG-RAN. This was confusing. Ericsson replied that this was defined in the SA3 spec already.
revised No S3‑183670 S3‑183603
S3‑183645 NG-RAN – clause 6.9.2.3.3 Ericsson CR Agreement
7.1.4AS security
Yes
Yes
revised No S3‑183671 S3‑183604
S3‑183646 NG-RAN – clause 6.9.2.3.4 Ericsson CR Agreement
7.1.4AS security
Yes
Yes
revised No S3‑183672 S3‑183605
S3‑183647 NF-SEPP TLS handling Ericsson Hungary Ltd draftCR Approval
7.1.13.1Interconnect (SEPP related)
Yes
Yes
noted No   S3‑183566
S3‑183648 Draft CR Corrections to N32 Protection Policies Telekom Deutschland draftCR Approval
7.1.13.1Interconnect (SEPP related)
Yes
Yes
noted No    
S3‑183649 Draft CR Adopting more normative language in clause 13 Telekom Deutschland draftCR discussion
7.1.13.1Interconnect (SEPP related)
Yes
YesEricsson: you are going too far beyond the descriptive language in some points. Some other companies had also comments on other instances of the text so this was taken offline. Agreements are taken in S3-183688.
noted No    
S3‑183650 Correction on LTE suspend/resume procedure for EDT capable UE Intel Corporation (UK) Ltd CR -
7.4.1SAE/LTE Security
Yes
Yes
agreed No   S3‑183373
S3‑183651 User Plane Integrity Protection for EDT Huawei, Hisilicon,Ericsson CR Approval
7.4.10Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
agreed No   S3‑183411
S3‑183652 LS to RAN23 on UP Integrity Protection for Small Data in Early Data Transfer Huawei, Hisilicon LS out Approval
7.4.10Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
approved No   S3‑183410
S3‑183653 3GPP SA3 statement SA3 WG vice chair (NTT-Docomo) other Information
6.13GPP Working Groups
Yes
Yes
endorsed No    
S3‑183654 Reply LS to ITU-T SG17 on X.5Gsec-q study NCSC LS out Approval
7.1.15Incoming and outgoing Lses
No
Yes
approved No   S3‑183295
S3‑183655 Two parallel N32-c connections between SEPPs Nokia draftCR discussion
7.1.13.1Interconnect (SEPP related)
Yes
YesAgreed content goes into S3-183687.
noted No    
S3‑183656 Security between SEPP and IPX Nokia draftCR discussion
7.1.13.1Interconnect (SEPP related)
Yes
YesAgreed content goes into 686.
noted No    
S3‑183657 Editorial corrections in 13.2 Nokia draftCR discussion
7.1.13.1Interconnect (SEPP related)
Yes
YesAgreed content is included in S3-183689.
noted No    
S3‑183658 Response LS on maximum output size of SUPI concealment schemes Ericsson LS out Approval
7.1.15Incoming and outgoing Lses
Yes
Yes
approved No    
S3‑183659 Reply to:LS on initial NAS security agreements Intel LS out approval
7.1.15Incoming and outgoing Lses
Yes
Yes
approved No    
S3‑183660 Reply LS on security requirements for Integrity protection for DRBs in MR-DC Huawei, Hisilicon LS out -
7.1.4AS security
Yes
Yes
approved No   S3‑183437
S3‑183661 CR on Secondary Re-authentication Huawei, HiSilicon CR Agreement
7.1.9Secondary authentication
Yes
YesRewording proposed by Nokia.
agreed No   S3‑183467
S3‑183662 Reply to: Reply LS on Clarifications on SUPI definition and NAI format Qualcomm LS out approval
7.1.15Incoming and outgoing Lses
Yes
Yes
approved No    
S3‑183663 AS subscription temperary identifier privacy ZTE Corporation CR Approval
7.1.4AS security
Yes
Yes
agreed No   S3‑183318
S3‑183664 Update RRC reestablishment security procedure based on RAN2 agreement Huawei, Hisilicon CR Approval
7.1.4AS security
Yes
Yes
agreed No   S3‑183342
S3‑183665 Clarification on RRC Inactive procedure support by ng-eNB Qualcomm Incorporated CR Agreement
7.1.4AS security
Yes
Yes
agreed No   S3‑183621
S3‑183666 Proposal about improvement of the UP security policy China Mobile CR Approval
7.1.4AS security
Yes
Yes
agreed No   S3‑183322
S3‑183667 Support of UP security policy in ng-eNB Ericsson CR Approval
7.1.4AS security
Yes
Yes
agreed No    
S3‑183668 Adding NR-DC to the scenarios of MR-DC Huawei, Hisilicon,Qualcomm,Ericsson CR Approval
7.1.4AS security
Yes
Yes
merged No S3‑183835 S3‑183362
S3‑183669 Draft CR to S3-183210 (Handling of UP security policy in MR-DC) Ericsson draftCR Agreement
7.1.4AS security
No
Yes
withdrawn Yes    
S3‑183670 NG-RAN – clause 6.9.2.2 Ericsson CR Agreement
7.1.4AS security
No
Yes
agreed No   S3‑183644
S3‑183671 NG-RAN – clause 6.9.2.3.3 Ericsson CR Agreement
7.1.4AS security
Yes
Yes
agreed No   S3‑183645
S3‑183672 NG-RAN – clause 6.9.2.3.4 Ericsson CR Agreement
7.1.4AS security
Yes
Yes
agreed No   S3‑183646
S3‑183673 Aligning the description of the initial NAS security procedures based on the CT1 agreements Qualcomm Incorporated,ZTE CR Agreement
7.1.5NAS security
Yes
Yes
agreed No    
S3‑183674 Handling of NAS COUNTs Ericsson CR Agreement
7.1.5NAS security
Yes
Yes
agreed No   S3‑183601
S3‑183675 Clarify SUPI format in KAMF computation Nokia CR Approval
7.1.5NAS security
No
Yes
agreed No   S3‑183328
S3‑183676 Clarification: AMF confirming UE SUPI in case NAS SMC failed Huawei, Hisilicon,Nokia CR Approval
7.1.5NAS security
Yes
Yes
agreed No   S3‑183360
S3‑183677 Editorial correction in Clause 6.9.3.2 Nokia CR Approval
7.1.5NAS security
Yes
Yes
agreed No   S3‑183329
S3‑183678 Correction to Key hierarchy diagram Samsung CR -
7.1.1Key hierarchy
Yes
YesRevised to make the figure bigger.
agreed No   S3‑183554
S3‑183679 Update of EAP-AKA’ reference to make it compatible with 5G Ericsson CR Agreement
7.1.8Primary authentication
Yes
Yes
agreed No    
S3‑183680 Clarification on interworking Huawei, Hisilicon CR Agreement
7.1.10Interworking
Yes
Yes
agreed No   S3‑183476
S3‑183681 Inter PLMN routing Nokia discussion Discussion
7.1.13.1Interconnect (SEPP related)
No
Yes
withdrawn Yes    
S3‑183682 Inter PLMN routing Nokia CR Agreement
7.1.13.1Interconnect (SEPP related)
Yes
Yes
agreed No    
S3‑183683 Verification of PLMNid by the receiving SEPP Deutsche Telekom CR Agreement
7.1.13.1Interconnect (SEPP related)
Yes
Yes
agreed No    
S3‑183684 Corrections to N32 Protection Policies Telekom Deutschland GmbH, Nokia CR Approval
7.1.13.1Interconnect (SEPP related)
Yes
Yes
agreed No   S3‑183442
S3‑183685 N32: remove redundant references to encrypted IEs Ericsson CR Agreement
7.1.13.1Interconnect (SEPP related)
Yes
Yes
agreed No   S3‑183522
S3‑183686 Security between SEPP and IPX Nokia, Nokia Shanghai Bell, Telekom Deutschland GmbH CR Approval
7.1.13.1Interconnect (SEPP related)
Yes
Yes
agreed No   S3‑183547
S3‑183687 Two parallel N32-c connections between SEPPs Nokia, Nokia Shanghai Bell CR Approval
7.1.13.1Interconnect (SEPP related)
Yes
Yes
agreed No   S3‑183549
S3‑183688 Adopting more normative language in clause 13 Telekom Deutschland GmbH, Nokia CR Approval
7.1.13.2Other
Yes
Yes
agreed No   S3‑183444
S3‑183689 Editorial corrections in 13.2 Nokia, Nokia Shanghai Bell,Huawei CR Agreement
7.1.13.2Other
Yes
Yes
agreed No   S3‑183540
S3‑183690 Shift of text from SEPP intro to subclause Nokia, Nokia Shanghai Bell CR Agreement
7.1.13.2Other
Yes
Yes
agreed No   S3‑183499
S3‑183691 IoT Group Authentication Huawei, Hisilicon SID new Approval
8.17New study item proposals
Yes
YesDocomo: what is a group and what is group authentication? Do we want to go for discussions like group membership? This would mean a huge amount of work. ORANGE: why refer to the SA1 TR that has been terminated and whose work has gone into a TS? Reword the justification and objectives. Vodafone: authentication at what level? This is not clear.Huawei replied that they meant telecom primary authentication. ORANGE had a problem with this. Alex (BT): I'd like the study how the serving network is using the authentication for a group. Huawei: the key issue of the network knowing which device is authenticated as been mentioned already. Huawei: a massive amount of devices trying to authenticate into the network is part of what the study intends to go for. ORANGE: let's ask SA1 what they expect us to do with an LS. The LS was agreed. In the end there was no response from SA1 and this was noted.
noted No   S3‑183356
S3‑183692 Maximum output size of SUPI concealment scheme Ericsson CR Approval
7.1.14Privacy
Yes
Yes
agreed No    
S3‑183693 Clarification to protection scheme identifier Nokia, Nokia Shanghai Bell CR Agreement
7.1.14Privacy
Yes
Yes
agreed No   S3‑183500
S3‑183694 Alignment on Home Network Public Key Nokia, Nokia Shanghai Bell CR Agreement
7.1.14Privacy
Yes
Yes
agreed No   S3‑183505
S3‑183695 Corrections to definition of 5G AS security context for 3GPP access China Mobile CR Approval
7.1.16Others
Yes
Yes
agreed No   S3‑183323
S3‑183696 UPdate test cases in 33.511 Huawei, Hisilicon pCR Approval
7.2.1NR Node B (gNB) (TS 33.511)
Yes
Yes
approved No   S3‑183430
S3‑183697 Draft TS 33.511 Huawei draft TS Approval
7.2.1NR Node B (gNB) (TS 33.511)
Yes
Yes
approved No    
S3‑183698 Adding Execution Steps to in 4.2.2.1.1, 4.2.2.1.2, and 4.2.2.1.7 Huawei, Hisilicon pCR Approval
7.2.1NR Node B (gNB) (TS 33.511)
Yes
Yes
approved No   S3‑183429
S3‑183699 Mapping requirements and test cases from 33.216 to 33.511 Huawei, Hisilicon pCR Approval
7.2.1NR Node B (gNB) (TS 33.511)
Yes
Yes
approved No   S3‑183405
S3‑183700 draft TS 33.512 Deutsche Telekom draft TS Approval
7.2.2Access and Mobility Management Function (TS 33.512)
Yes
Yes
approved No    
S3‑183701 PCR to TR33.514 SUCI test case correction CATT pCR Approval
7.2.4Unified Data Management (UDM) (TS 33.514)
Yes
Yes
approved No   S3‑183637
S3‑183702 Draft TS 33.514 NEC draft TS Approval
7.2.4Unified Data Management (UDM) (TS 33.514)
Yes
Yes
approved No    
S3‑183703 Draft TS 33.517 Nokia draft TS Approval
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
Yes
Yes
approved No    
S3‑183704 Draft TS 33.518 Nokia draft TS Approval
7.2.8Network Resource Function (NRF) (TS 33.518)
Yes
Yes
approved No    
S3‑183705 Draft TS 33.519 ZTE draft TS Approval
7.2.9Network Exposure Function (NEF) (TS 33.519)
Yes
Yes
approved No    
S3‑183706 LS on IAB security R2-1818748 LS in Discussion
6.13GPP Working Groups
Yes
YesIt was pointed out that this could have security implications that would need further study in SA3, hence the answers would be very short. Huawei commented that the answer was not trivial and more time was needed. Nokia was in line with this.Huawei pointed out that this was Rel-16 and there was no hurry. AT&T preferred to reply to RAN2 in the short deadline given by them. The Chair proposed to answer with a disclaimer given that SA3 was not aware of the full picture, just a preliminary reply. This was what Ericsson had in mind. Qualcomm agreed with this reply. Huawei: we don’t have a deadline in the LS. This can be seen for the next meeting. Nokia supported this. It was agreed to propose a draft that could be discussed. BT: the intention of RAN2 was to have a response for this week. The Chair confirmed that he was personaly contacted to have a reply for the meeting week. Qualcomm commented that RAN2 needed SA3's response to conclude their study and even a preliminary response would be useful for them. Juniper: they should design a protocol that doesn’t depend on our schoosing.
replied to No    
S3‑183707 Authentication on application functions ZTE Corporation pCR Approval
7.2.9Network Exposure Function (NEF) (TS 33.519)
Yes
Yes
approved No   S3‑183321
S3‑183708 Minutes of SBA Offline Discussion Deutsche Telekom report discussion
7.1.13.2Other
No
Yes
withdrawn Yes    
S3‑183709 Draft CR Incorporating general SBA aspects in TS 33.117 Nokia draftCR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
Yes
approved No    
S3‑183710 Add EDCE5 realted requirements and testcases to 33.216 Huawei, Hisilicon CR Approval
7.4.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
Yes
Yes
agreed No   S3‑183428
S3‑183711 Reply to: LS on IAB security Ericsson LS out approval
6.13GPP Working Groups
Yes
Yes
approved No    
S3‑183712 EDCE5 – Fixing contradicting and insecure scg/sk counter handling in 33.401 from 36.331 Ericsson CR Agreement
7.4.11EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5)
Yes
Yes
not pursued No   S3‑183592
S3‑183713 Correction/enhancement in CAPIF TS NEC Corporation CR Agreement
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
agreed No   S3‑183341
S3‑183714 Reply to: LS on EAS-C&U support Vodafone LS out approval
7.4.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec) (Rel-15)
No
Yes
withdrawn Yes    
S3‑183715 LS on Control Plane Solution for Steering of Roaming in 5GS Vodafone LS out Approval
7.4.14PLMN RAT selection (Steering of Roaming) (Rel-15)
Yes
Yes
approved No    
S3‑183716 Delete information during API invoker offboarding Huawei, Hisilicon CR Approval
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
agreed No   S3‑183421
S3‑183717 LS on authentication of group of IoT devices NTT-Docomo LS out Approval
8.17New study item proposals
Yes
Yes
approved No    
S3‑183718 New SID on User Plane Integrity Protection VODAFONE Group Plc SID new Agreement
8.17New study item proposals
Yes
Yes
agreed No   S3‑183436
S3‑183719 Study on mitigation of the charging fraud attack Huawei, Hisilicon SID new Approval
8.17New study item proposals
Yes
YesRevised to include LTE in the scope.
noted No   S3‑183471
S3‑183720 LS to GSMA on mitigation of the charging fraud attack Huawei LS out Approval
8.17New study item proposals
Yes
Yes
approved No    
S3‑183721 New SID on authentication enhancements in 5GS Ericsson SID new Discussion
8.17New study item proposals
Yes
Yes
revised No S3‑183745 S3‑183597
S3‑183722 Security Impacts of Virtualisation BT plc SID new Approval
8.17New study item proposals
Yes
Yes
agreed No   S3‑183486
S3‑183723 New option for 33.855 solution #8 Ericsson India Private Limited pCR Approval
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
Yes
Yes
approved No   S3‑183565
S3‑183724 Draft TR 33.855 Deutsche Telekom draft TR Approval
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
Yes
Yes
approved No    
S3‑183725 Update of PARLOS solution #1 Motorola Mobility, Lenovo pCR Approval
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
Yes
Yes
approved No   S3‑183567
S3‑183726 Draft TR 33.815 Sprint draft TR Approval
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
Yes
Yes
approved No    
S3‑183727 P-CR describing current manual roaming in US Sprint Corporation pCR Agreement
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
Yes
Yes
approved No   S3‑183630
S3‑183728 Proposed change to the solution #1.1 of TR 33.856 Huawei, Hisilicon pCR Approval
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No   S3‑183395
S3‑183729 Draft TR 33.856 China Unicom draft TR Approval
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑183730 Evaluation for the solution "Return from UTRAN to E-UTRAN or NR" China Unicom pCR -
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No   S3‑183369
S3‑183731 Conclusion for the solution "Return from UTRAN to E-UTRAN or NR" China Unicom pCR -
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No   S3‑183370
S3‑183732 clean up the EN of subclause 7 in TR 33.856 Huawei, Hisilicon pCR Approval
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No   S3‑183397
S3‑183733 Cover sheet TR 33.856 Huawei TS or TR cover Approval
8.4Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑183734 Protecting SUPI for user privacy ZTE Corporation pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
approved No   S3‑183394
S3‑183735 Draft TR 33.835 China Mobile draft TR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
approved No    
S3‑183736 New Key Issue: Generic battery efficient end-to-end security KPN pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
approved No   S3‑183544
S3‑183737 New KI: Key Lifetimes Ericsson India Private Limited pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
approved No   S3‑183561
S3‑183738 CR to TS33.501-Registration related text correction CATT CR Agreement
7.1.16Others
Yes
Yes
agreed No   S3‑183438
S3‑183739 New WID on security aspects of single radio voice continuity from 5G to 3G China Unicom, Huawei, HiSilicon, ZTE, CATT, OPPO, CATR WID new -
7.5New Work Item proposals
Yes
Yes
agreed No   S3‑183367
S3‑183740 Adding UP security policy in SN Addition/modification Request message Huawei, Hisilicon CR Approval
7.1.4AS security
Yes
Yes
agreed No   S3‑183344
S3‑183741 LS on initial NAS message protection Qualcomm Incorporated LS out Approval
7.1.5NAS security
Yes
Yes
approved No   S3‑183611
S3‑183742 Security mechanism for UE Parameters Update via UDM Control Plane Procedure Qualcomm Incorporated,Huawei CR Agreement
7.1.5NAS security
Yes
YesVodafone withdrew their sustained objection after a note was added in 6.Y.1. They asked to be minuted that they were not satisfied with having this CR for Rel-15 and that they may raise this concern in the next SA Plenary.
agreed No   S3‑183624
S3‑183743 Update on access token in roaming scenario Huawei, Hisilicon CR Agreement
7.1.13.2Other
Yes
Yes
agreed No   S3‑183478
S3‑183744 pCR to TR33.814 - Scope CATT pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
Yes
approved No   S3‑183434
S3‑183745 New SID on authentication enhancements in 5GS Ericsson SID new Agreement
8.17New study item proposals
Yes
Yes
agreed No   S3‑183721
S3‑183746 New KI: API for AKMA keys in UE Ericsson India Private Limited pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
approved No   S3‑183563
S3‑183747 Solution for bootstrapping authentication of AKMA Huawei, Hisilicon pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
approved No   S3‑183420
S3‑183748 Discussion and pCR of Candidate Solution: Transport independent procedure using existing protocols China Mobile; Alibaba (China) Group., Ltd. pCR -
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
approved No   S3‑183511
S3‑183749 Discussion and pCR of candidate solution: UE implementation schemes in achieving AKMA procedures China Mobile; Alibaba (China) Group., Ltd. pCR -
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
approved No   S3‑183513
S3‑183750 New solution: Access independent architecture solution for AKMA Ericsson India Private Limited pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
approved No   S3‑183562
S3‑183751 New solution: Stand-alone architecture solution for AKMA Ericsson India Private Limited pCR Approval
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
Yes
Yes
approved No   S3‑183564
S3‑183752 pCR to TR 33.834 - Update to LTKUP Conclusions VODAFONE Group Plc pCR Approval
8.2Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-16)
Yes
Yes
approved No   S3‑183445
S3‑183753 Draft TR 33.834 Vodafone draft TR Approval
8.2Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-16)
Yes
Yes
approved No    
S3‑183754 cover sheet TR 33.834 Vodafone TS or TR cover discussion
8.2Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-16)
Yes
Yes
approved No    
S3‑183755 New SID on LTKUP Detailed Solutions VODAFONE Group Plc SID new Agreement
8.2Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-16)
Yes
Yes
agreed No   S3‑183440
S3‑183756 LS to SAGE on 256bit algorithms Vodafone LS out Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No    
S3‑183757 pCR to TR 33 841 Threat details to symmetric cryptography CATT pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183451
S3‑183758 Draft TR 33.841 Vodafone draft TR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
No
Yes
approved No    
S3‑183759 pCR to Include content discussing forward security NIST pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183310
S3‑183760 Update to Impacted NextGen Areas - TR 33.841 NCSC pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183292
S3‑183761 pCR to TR 33 841 regarding key derivation function China Mobile; Vodafone pCR -
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183481
S3‑183762 TR 33.841: complete clause on OTA mechanism Gemalto N.V. pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183629
S3‑183763 pCR to TR 33 841 Study of individual algorithm details CATT, CAICT, China Mobile, China Telecom, China Unicom, Huawei, HiSilicon, ZTE, OPPO pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183477
S3‑183764 Clause 13.1.1: AES modes Ericsson pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183516
S3‑183765 Modifications and Clarifications for TR 33.841 NCSC pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183294
S3‑183766 Potential Requirements for TR 33.841 NCSC, CAICT, CATT, China Mobile, China Telecom, China Unicom, Huawei, HiSilicon, ZTE, OPPO pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183290
S3‑183767 Conclusions for TR 33.841 NCSC, CAICT, CATT, China Mobile, China Telecom, China Unicom, Huawei, HiSilicon, ZTE, OPPO, Qihoo 360 pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183291
S3‑183768 Editorials for TR 33.841 NCSC pCR Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑183293
S3‑183769 Cover sheet TR 33.841 Vodafone TS or TR cover Approval
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
No
Yes
approved No    
S3‑183770 Key issue for encryption protection of location data Huawei, Hisilicon pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
No
Yes
noted No   S3‑183403
S3‑183771 Key issue for integrity protection of location and assistance data Huawei, Hisilicon pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
No
Yes
noted No   S3‑183404
S3‑183772 Improvement for key issue on the signalling overload due to malicious applications on the UE Huawei, HiSilicon,KPN pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No   S3‑183460
S3‑183773 New KI: Protection of interface used by NIDD procedures Ericsson LM pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No   S3‑183541
S3‑183774 Draft TR 33.861 Ericsson draft TR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No    
S3‑183775 Adding Key issue for Connectionless service security Nokia pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No   S3‑183332
S3‑183776 New KI: Privacy protection of the NIDD API between UPF/NEF and AF Ericsson LM pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
No
Yes
withdrawn Yes    
S3‑183777 Solution proposal for FS_CIoT_sec_5G NEC Corporation pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No   S3‑183338
S3‑183778 Security solution for MO SMS in initial NAS message - handling AMF re-allocation Ericsson LM pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No   S3‑183537
S3‑183779 Security solution for small data sent with EDT in RRC Resume Request for E-UTRA connected to 5GC Ericsson pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No   S3‑183535
S3‑183780 Security solution for small data included in initial NAS to handle AMF reallocation Ericsson LM pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No   S3‑183536
S3‑183781 New Solution for Key Issue #4: Use of UE Configuration Update KPN pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No   S3‑183542
S3‑183782 Solution for protecting gNB from RRC re-establishment DDoS attack Huawei, Hisilicon pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No   S3‑183346
S3‑183783 New solution for protection of interface used by NIDD procedures Ericsson LM pCR Approval
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
Yes
Yes
approved No   S3‑183543
S3‑183784 Draft TR 33.807 Huawei draft TR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑183785 LS on FN-RG authentication and related questions Ericsson LS out Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑183786 New KI: Authentication of 5G capable UE behind a RG Ericsson pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
approved No   S3‑183519
S3‑183787 New KI: User plane data handling for 5G capable UE behind a RG Ericsson,NEC pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
approved No   S3‑183520
S3‑183788 Key Issue on Access Independent Security for 5WWC NEC Corporation pCR Agreement
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
approved No   S3‑183534
S3‑183789 LS on verification of PLMN-ID in the SEPP Deutsche Telekom LS out Approval
7.1.13.1Interconnect (SEPP related)
Yes
Yes
approved No    
S3‑183790 Clarifications to SUPI and SUCI Qualcomm,Nokia CR Agreement
7.1.14Privacy
Yes
YesNokia commented some points of confusion coming from their CT4 colleagues.
agreed No    
S3‑183791 New Solution: 5GC-capable UEs behind 5G-RG/FN-RG using N3GPP-access solutions Ericsson pCR Approval
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
Yes
Yes
approved No   S3‑183521
S3‑183792 Draft TR 33.808 Huawei draft TR Approval
8.10Study of KDF negotiation for 5G System Security
Yes
Yes
approved No    
S3‑183793 Reply-LS on work item "X.5Gsec-q" ETSI TC Cyber WG QSC LS in discussion
6.10Other Groups
Yes
Yes
noted No    
S3‑183794 Liaison Statement to ITU-T SG17: Response to proposal for ITU-T SG17 question on quantum-safe communication ETSI TC Cyber WG QSC LS in discussion
6.10Other Groups
Yes
Yes
noted No    
S3‑183795 LS on Security method negotiation Samsung LS out -
7.4.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑183560
S3‑183796 Key Issue on KDF negotiation between UE and AMF Huawei, Hisilicon pCR Approval
8.10Study of KDF negotiation for 5G System Security
Yes
Yes
approved No   S3‑183412
S3‑183797 KgNB derivation in EPS to 5GS handover Qualcomm Incorporated CR Approval
7.1.10Interworking
Yes
Yes
agreed No    
S3‑183798 Proposal for key issue structure Nokia pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
YesNokia: this is a skeleton structure proposal. Vodafone: there may be more key issue areas. Nokia replied that these are the ones used by SA2. Gemalto wasn't sure about this proposal, since there may be key issues outside these areas and it may be hard to figure out where to put certain key issues.
approved No    
S3‑183799 Draft TR 33.809 Apple draft TR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
approved No    
S3‑183800 Clause #4 for the upcoming TR on FS_5GFBS Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
approved No   S3‑183568
S3‑183801 SI integrity - new KI for the upcoming TR on FS_5GFB Ericsson,Samsung,Apple,Huawei pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
approved No   S3‑183580
S3‑183802 Key issue false base station detection and isolation Nokia,Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
approved No   S3‑183330
S3‑183803 Key issue of security protection on the unicast message from the UE before security activation Apple Computer Trading Co. Ltd,Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
approved No   S3‑183299
S3‑183804 SON security - new KI for the upcoming TR on FS_5GFBS Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
approved No   S3‑183569
S3‑183805 Key issue on Authentication relay attack Huawei, Hisilicon pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
approved No   S3‑183470
S3‑183806 Radio jamming - placeholder-only KI for the upcoming TR on FS_5GFB Ericsson pCR Approval
8.9Study on 5G security enhancement against false base stations
Yes
Yes
approved No   S3‑183582
S3‑183807 Draft TR 33.813 Nokia draft TR discussion
8.11Study on Security aspects of Enhancement of Network Slicing
No
Yes
approved No    
S3‑183808 pCR to TR 33.813 Adding key issue for Slice specific authentication Nokia,Huawei pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
Yes
approved No   S3‑183337
S3‑183809 New key issue on key separation between Network Slices Ericsson pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
Yes
approved No   S3‑183583
S3‑183810 New KI on security features for NSaaS Huawei, HiSilicon,China Mobile pCR Approval
8.11Study on Security aspects of Enhancement of Network Slicing
Yes
Yes
approved No   S3‑183461
S3‑183811 Draft skeleton for TR 33.814 CATT pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
Yes
approved No   S3‑183433
S3‑183812 Draft TR 33.814 CATT draft TR discussion
8.12Study on Security of the enhancement to the 5GC location services
Yes
Yes
approved No    
S3‑183813 WLAN positioning - new KI for the upcoming TR on FS_eLCS_Sec Ericsson pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
No
Yes
withdrawn Yes    
S3‑183814 TBS positioning - new KI for the upcoming TR on FS_eLCS_Sec Ericsson pCR Approval
8.12Study on Security of the enhancement to the 5GC location services
Yes
Yes
approved No   S3‑183528
S3‑183815 Scope for TR33.825 on URLLC security Huawei, HiSilicon pCR Approval
8.13Study on security for 5G URLLC
Yes
YesThe scope was reworded to make it more about the document and not about the study.
approved No   S3‑183453
S3‑183816 TR 33.825 Huawei draft TR Approval
8.13Study on security for 5G URLLC
Yes
Yes
approved No    
S3‑183817 Key issue proposal for security of URLLC for 5GS NEC Corporation pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
approved No   S3‑183340
S3‑183818 Key issue security for redundant transmissions Huawei, HiSilicon,Ericsson,LG pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
approved No   S3‑183455
S3‑183819 Key issue security policy for URLLC service Huawei, HiSilicon pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
approved No   S3‑183456
S3‑183820 Key issue security aspect of low latency handover procedures Huawei, HiSilicon pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
approved No   S3‑183457
S3‑183821 KI for retaining AS security key Ericsson pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
approved No   S3‑183577
S3‑183822 Security solution for handling UP security policy for redundant data Ericsson pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
approved No   S3‑183575
S3‑183823 Solution for flexibility to retain or to change AS security keys Ericsson pCR Approval
8.13Study on security for 5G URLLC
Yes
Yes
approved No   S3‑183578
S3‑183824 Scope of TR 33.818 China Mobile, CATR pCR -
8.14Study on SECAM and SCAS for 3GPP virtualized network products
Yes
Yes
approved No   S3‑183509
S3‑183825 Draft TR 33.818 China Mobile draft TR Approval
8.14Study on SECAM and SCAS for 3GPP virtualized network products
Yes
Yes
approved No    
S3‑183826 Draft TR 33.819 Nokia draft TR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
No
Yes
approved No    
S3‑183827 VERTICAL study - Scope Nokia, Nokia Shanghai Bell pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
approved No   S3‑183487
S3‑183828 New Key Issue: Authentication and Authorization for Interworking, Roaming between NPN and PLMN InterDigital Europe. Ltd.,Nokia pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
approved No   S3‑183312
S3‑183829 Key issue for authentication and authorization of 5GLAN UE in 5GLAN group communication NEC Corporation pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
Yes
Yes
approved No   S3‑183514
S3‑183830 Assigning additional FC values to TS 33.501 Qualcomm CR Agreement
7.1.15Incoming and outgoing Lses
Yes
Yes
agreed No    
S3‑183831 Key Issue on Authentication of a UE for Non-public network Huawei, Hisilicon,Nokia pCR Approval
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
No
Yes
noted No   S3‑183417
S3‑183832 Reply LS on UP Integrity Protection for Small Data in Early Data Transfer R3-187230 LS in discussion
7.4.10Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
noted No    
S3‑183833 Reply LS on UP Integrity Protection for Small Data in Early Data Transfer R2-1818666 LS in discussion
7.4.10Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
noted No    
S3‑183834 Reply LS on Separate HSS and UDM and security credentials storage Nokia LS out Approval
8.16Other study areas
Yes
Yes
approved No    
S3‑183835 Handling of UP security policy in MR-DC Huawei, Hisilicon, Qualcomm Incorporated, Ericsson CR Approval
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑183210
S3‑183836 Interworking – correcting keying material in HO request message (EPS to 5GS) Ericsson,Huawei CR Agreement
5.1CRs from SA3#92bis
Yes
Yes
agreed No   S3‑183220
S3‑183837 Work Plan input from Rapporteurs MCC other -
9.2Rapporteur input on status of WID or SID
No
YesHans (DT) will bring a revised SID for SBA since the scope has changed to include Rel-16.
noted No   S3‑183205
S3‑183838 SA3 meeting calendar MCC other -
10Future Meeting Dates and Venues
No
YesSA3#94Ad-Hoc (11th March 2019) will be hosted by Ericsson in Stockholm. The meeting will deal only with studies. NAF will host the May 2019 meeting. Vodafone will host July 2020 meeting.
noted No   S3‑183204