• There are no items in your cart

TS 121 133 : 4.1.0

Current

Current

The latest, up-to-date edition.

UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); 3G SECURITY; SECURITY THREATS AND REQUIREMENTS

Available format(s)

Hardcopy , PDF

Language(s)

English

Intellectual Property Rights
Foreword
Foreword
1 Scope
2 References
3 Definitions and Abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 General objectives for 3G security features
5 Security context
  5.1 System assumptions
  5.2 3G roles
  5.3 3G architecture
  5.4 3G identities
  5.5 3G data types and data groups
6 Security threats
  6.1 Threats associated with attacks on the radio interface
  6.2 Threats associated with attacks on other parts of the
      system
  6.3 Threats associated with attacks on the terminal and
      UICC/USIM
7 Risk Assessment
  7.1 Evaluation of threats
8 Security Requirements
  8.1 Requirements derived from threat analysis
  8.2 External requirements
Annex A (Informative): Threats linked to active attacks on
        the radio access link
      A.1 User identity catching
      A.2 Suppression of encryption between target and intruder
      A.3 Compromise of authentication data
      A.4 Hijacking of services
Annex B: Change history
History

Provides an evaluation of perceived threats to 3GPP and produces subsequently a list of security requirements to address these threats.

Committee
3GPP SA 3
DocumentType
Standard
Pages
27
PublisherName
European Telecommunications Standards Institute
Status
Current

I.S. EN 16062:2015 INTELLIGENT TRANSPORT SYSTEMS - ESAFETY - ECALL HIGH LEVEL APPLICATION REQUIREMENTS (HLAP) USING GSM/UMTS CIRCUIT SWITCHED NETWORKS
12/30242166 DC : 0 BS ISO 26683-2 - INTELLIGENT TRANSPORT SYSTEMS - FREIGHT AND CONVEYANCE CONTENT IDENTIFICATION AND COMMUNICATION - PART 2: APPLICATION INTERFACE PROFILES
BS ISO 26683-2:2013 Intelligent transport systems. Freight land conveyance content identification and communication Application interface profiles
ISO 26683-2:2013 Intelligent transport systems — Freight land conveyance content identification and communication — Part 2: Application interface profiles
TR 101 957 : 1.1.1 BROADBAND RADIO ACCESS NETWORKS (BRAN); HIPERLAN TYPE 2; REQUIREMENTS AND ARCHITECTURES FOR INTERWORKING BETWEEN HIPERLAN/2 AND 3RD GENERATION CELLULAR SYSTEMS
10/30214021 DC : 0 BS EN 16062 - INTELLIGENT TRANSPORT SYSTEMS - ESAFETY - ECALL HIGH LEVEL APPLICATION REQUIREMENTS (HLAP)
DIN EN 16062:2015-08 Intelligent transport systems - ESafety - eCall high level application requirements (HLAP) using GSM/UMTS circuit switched networks
BS EN 16072:2015 Intelligent transport systems. ESafety. Pan-European eCall operating requirements
DIN EN 16072:2015-08 Intelligent transport systems - ESafety - Pan-European eCall operating requirements
EN 16072:2015 Intelligent transport systems - ESafety - Pan-European eCall operating requirements
EN 16062:2015 Intelligent transport systems - ESafety - eCall high level application requirements (HLAP) using GSM/UMTS circuit switched networks
UNE-EN 16062:2015 Intelligent transport systems - ESafety - eCall high level application requirements (HLAP) using GSM/UMTS circuit switched networks
UNE-EN 16072:2015 Intelligent transport systems - ESafety - Pan-European eCall operating requirements
BS EN 16062:2015 Intelligent transport systems. ESafety. eCall high level application requirements (HLAP) using GSM/UMTS circuit switched networks
I.S. EN 16072:2015 INTELLIGENT TRANSPORT SYSTEMS - ESAFETY - PAN-EUROPEAN ECALL OPERATING REQUIREMENTS
TS 102 556 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE

ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ETR 331 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - DEFINITION OF USER REQUIREMENTS FOR LAWFUL INTERCEPTION OF TELECOMMUNICATIONS
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
ETR 332 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework

View more information
US$17.97
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.