TS 121 133 : 4.1.0
Current
The latest, up-to-date edition.
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); 3G SECURITY; SECURITY THREATS AND REQUIREMENTS
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Foreword
1 Scope
2 References
3 Definitions and Abbreviations
3.1 Definitions
3.2 Abbreviations
4 General objectives for 3G security features
5 Security context
5.1 System assumptions
5.2 3G roles
5.3 3G architecture
5.4 3G identities
5.5 3G data types and data groups
6 Security threats
6.1 Threats associated with attacks on the radio interface
6.2 Threats associated with attacks on other parts of the
system
6.3 Threats associated with attacks on the terminal and
UICC/USIM
7 Risk Assessment
7.1 Evaluation of threats
8 Security Requirements
8.1 Requirements derived from threat analysis
8.2 External requirements
Annex A (Informative): Threats linked to active attacks on
the radio access link
A.1 User identity catching
A.2 Suppression of encryption between target and intruder
A.3 Compromise of authentication data
A.4 Hijacking of services
Annex B: Change history
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.