0 Work Programme - Work Item Detailed Report
2019-09-17 Version 2.3.3
Simple Search | Advanced Search | Pre-Defined Reports | Help

Details of 'DTS/TSGS-0321133U' Work Item
Work Item Reference ETSI Doc.
STF Technical Body
in Charge
Download Standard

Download standrd ref:
DTS/TSGS-0321133U (PDF Format) Download standrd ref:
DTS/TSGS-0321133U (Word Format)
  DTS/TSGS-0321133U TS 121 133   3GPP SA 3
  Current Status
(Click to View Full Schedule)
Cover Date Standstill Creation Date
  Publication (2000-02-01) 3.1.0 2000-01-28   1998-07-24
  Rapporteur Technical Officer Harmonized Standard
  Per Christoffersson Carmine Rizzo No
Title Universal Mobile Telecommunications System (UMTS); 3G Security; Security Threats and Requirements (3G TS 21.133 version 3.1.0 Release 1999)
Scope and Field
of Application
This specification takes notice of the Security Principles and Objectives as set out in [1]. It contains an evaluation of perceived threats to 3GPP and produces subsequently a list of security requirements to address these threats.
As teleservices and applications will not, in general, be standardised, it is difficult to predict their exact nature. Therefore, this specification considers all security threats and aims at listing generic security requirements that shall be applicable irrespective of the actual services offered. The list of threats and requirements may however need to be updated as the 3GPP system evolves.
The threat analysis performed relies to a large extent on previous experiences with 2G systems, in particular GSM, and takes into account known problems from that area.
The security requirements listed in this specification shall be used as input for the choice of security features and the design of the 3GPP security architecture as specified in [2].
The structure of this technical specification is as follows:
clause 2 lists the references used in this specification;
clause 3 lists the definitions and abbreviations used in this specification;
clause 4 contains a reference to the general objectives for 3G security;
clause 5 contains an overview of the context in which the security architecture of 3G is designed;
clause 6 contains a list of identified security threats to 3G, and gives some results from the threat analyses that have been performed;
clause 7 contains an overview of the risk assessment resulting from the threat analyses performed
clause 8 contains the resulting list of security requirements for 3G and indicates how these requirements relate to the threats and the security objectives .
Finally, Annex A gives some more detailed information on threats and risks connected to so called false base station attacks.
Not Available


Keywords Projects Clusters Frequencies Mandates Directives
Wireless Systems
Official Journal
2002-01-02 vantricht WI Revision. 1 WI created with Ref: RTS/TSGS-0321133UR1. Comments copied = No, Schedule copied = Default
2001-04-19 hughesk WI Revision. 1 WI created with Ref: RTS/TSGS-0321133Uv4. Comments copied = No, Schedule copied = Default

ETSI Home Page Any comments or problems with this application? Please let us know...