3GPP R15 5G SIM card: A definition

Similar documents
5G SIM: Maximising MNO Investment in 5G Networks

3GPP SA3-5G SECURITY. Major changes in 5G security architecture and procedures Sander de Kievit

ETSI TR V ( )

ETSI TS V ( )

Communication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016

3GPP TS V ( )

GTI Sub-6GHz 5G Core Network

Business model-driven 5G deployment

ETSI TS V ( )

Requirement Plan Plan Name: LTE_Data_Retry Plan Id: LTEDATARETRY Version Number: 31 Release Date: June 2018

UMTS System Architecture and Protocol Architecture

ETSI TR V6.5.0 ( )

8.4 IMS Network Architecture A Closer Look

Nr. Standard reference Title

ETSI TS V ( )

Simulation of LTE Signaling

3GPP security. Valtteri Niemi 3GPP SA3 (Security) chairman Nokia

ETSI documents published or circulated for vote/comment in September 2018

ETSI TS V ( )

Reqs-LTE-SMS. Device Requirements Issued: Mar-16

LTE Security How Good Is It?

UMTS Addresses and Identities Mobility and Session Management

Mixed use of 2 and 3 digit MNCs. Main points from report prepared for the Swedish Post and Telecom Authority (PTS) Copenhagen 4 March 2014

3GPP TS V9.2.0 ( )

Spirent Landslide VoLTE

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003

3GPP TS V8.9.0 ( )

5G Infrastructure Work in 3GPP

Review of 3GPP Progress on 5G. Tao Sun China Mobile Research Institute Department of Network IT Technologies

Path to 5G: A Control Plane Perspective

Cisco Converged Services Platform

SRVCC Ensuring voice service continuity in VoLTE/IMS

IP Multimedia Subsystem Part 5 Marek Średniawa

ETSI TS V ( )

3GPP TS V4.8.0 ( )

The UICC. Recent Work of ETSI TC Smart Card Platform. Dr. Klaus Vedder Chairman ETSI TC SCP

Delivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一

ETSI TS V ( )

3GPP TS V6.4.0 ( )

ETSI TR V ( )

NG40 IMS Emulator. Key features: IMS Registration VoLTE Basic SRVCC (one-way HO of single active speech session from 4G PS to 3G CS)

Service-Based Architecture for 5G Core Networks

3GPP TS V9.4.0 ( )

LTE and the path to LTE MTC

3GPP TS V ( )

Access Restriction based on Regional Zone Code

Solutions to Enhance IoT Authentication Using SIM Cards (UICC)

ETSI TS V (201

5G Network Slicing Summit MWC Shanghai 2018

WiFi Integration in Evolution to 5G networks. Satish Kanugovi WiFi Knowledge Summit, Bangalore March 9, Nokia 2018

3GPP TS V ( )

UMTS PHASE 1 WORK ITEMS

ETSI TS V ( )

3GPP TS V ( )

3GPP TS V ( )

IP multimedia in 3G. Structure. Author: MartinHarris Orange. Understanding IP multimedia in 3G. Developments in 3GPP. IP multimedia services

Requirement Plan Plan Name: LTE_3GPP_Band13_NetworkAccess Plan Id: LTEB13NAC Version Number: 35 Release Date: June 2018

PacketCable 2.0. HSS Technical Report PKT-TR-HSS-V RELEASED. Notice

3GPP TR V ( )

ETSI TS V5.0.0 ( )

ITU-T Y Framework of the IMT-2020 network

ABOUT THE WIRELESS BROADBAND ALLIANCE ABOUT NGMN ALLIANCE

Small Data over NAS, S11-U and SGi Interfaces

Novel design of embms based on Femtocell

5G Security: Standard and Technologies

LTE-M DEPLOYMENT GUIDE

5G in reality technology Workshop

CBRS Network Services Use Cases and Requirements CBRSA-TS-1001 V December 11, 2018

Convergence of IP and Mobile Communications. Albert Coronel RedLink Communications Co., Ltd. MMNOG, November 21, 2015

LEGAL DISCLAIMERS AND NOTICES

Second Global 5G Event 3GPP s flexible 5G system architecture

5G Commercial realization: From standards to deployments

Harness the Power of Policy on Device

SOLUTIONSPORTFOLIO RESHAPING SIM BUSINESS

The MME supports single radio voice call continuity (SRVCC) for CDMA2000 1x (single-carrier) radio transmission technology (1x-RTT) networks.

MSF Architecture for 3GPP Evolved Packet System (EPS) Access MSF-LTE-ARCH-EPS-002.FINAL

3GPP TS V ( )

3GPP TS V ( )

SA WG2 Temporary Document Page 2 - Besides these advantages, it is possible to use the based mechanism to consider aspects such as: Node capabilities

Test Plan for LTE Interoperability

3GPP TSG SA WG3 Security SA3#35 S St. Paul s Bay, Malta, 5 8 October, 2004

NB-IoT DEPLOYMENT GUIDE

5G voice network evolution aspects. Voice over NR in a 5G System and migration from Evolved Packet System Fallback. Paper 3

EUROPEAN ETS TELECOMMUNICATION April 1997 STANDARD

Voice over Long Term Evolution Migration Strategies

NB-IoT RAT and Attach Without PDN Connectivity Support

POWER-ON AND POWER-OFF PROCEDURES

CHANGE REQUEST. Ericsson, Siemens AG, Lucent Technologies

ITU-T Q Signalling architecture and requirements for IP-based short message service over ITU-T defined NGN

DAY 2. HSPA Systems Architecture and Protocols

CSFB and SMS over SGs Interface

3GPP TS V ( )

CBRS Alliance Identifier Guidelines for Shared HNI CBRSA-TR-0100 V1.0.0 November 27, 2018

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Dedicated Core Networks on MME

5G Infinite Acceleration Cisco Knowledge Network. Humberto J. La Roche, PhD, Principal Engineer October 25, 2016

Enabler Release Definition for Smartcard-Web-Server

VoLTE: The Next Generation of Voice

CS8 Mobile Device Test System. CS8-TS-LTE-NAS User Manual

Business Considerations for Migration to IMT-2000

Transcription:

3GPP R15 5G SIM card: A definition Copyright 2018 SIMalliance Ltd. November 2018

Contents: 1 - What is a 5G SIM? 2 Three different types of 5G SIM 3 Conclusion 1 - What is a 5G SIM? A Universal Integrated Circuit Card or UICC (better known as a SIM) is the only platform which can be used to secure 5G network access according to the 5G standardisation body (3GPP). In the same way as the network is evolving, the UICC is evolving to meet new challenges introduced by 5G. The SIMalliance Recommended 5G SIM is a 5G UICC defined as a 3GPP R15 UICC which supports UICC based subscriber privacy at minimum. 2 Three different types of 5G SIM While the 5G UICC enables a device to authenticate to the 5G network, it has some additional capabilities, defined for different 5G deployment schemes. SIMalliance has identified three different associated types of 5G UICC: - Transitional SIM: Provides the minimum capabilities to authenticate to the network but does not leverage the benefit of 5G Core Network investment. This is more applicable to early drop for a transition to full 5G deployment where the Recommended 5G SIM is more appropriate. - Recommended 5G SIM: Leverages the full power of 5G phase 1 for enhanced mobile broadband. SIMalliance recommends adopting the Recommended 5G SIM at 5G launch as there is full backward compatibility and it is the most future-proof SIM. - Low Power SIM: Optimised for Low Power IoT use cases for which NB-IoT and LTE-M can be used.

The 3 types of 5G UICC are characterised as follows: Category Ensuring good quality of experience Technical feature 3GPP R15 Call control on PDU Session by USIM Network Rejection Event Data Connection Status Change Event for 5GS Provide Local information extended to support NG-RAN information Timing Advance Information Network Measurement Report Standard reference 3GPP R15 Service n 128 Call control on PDU Session by USIM Network Rejection event Data Connection Status Change event PROVIDE LOCAL INFORMATION PROVIDE LOCAL INFORMATION PROVIDE LOCAL INFORMATION Additional details The call control on PDU session by USIM forces the ME to first pass the corresponding data to USIM before any PDU session establishment. Network Rejection Event 5GS allows the UICC to retrieve the network rejection codes when network issues prevent connection. Informs the UICC that the ME has detected a change in 5GS data connection. ME provides to UICC information on MNC, MCC, LAC/TAC, Cell ID, NG-RAN cell ID. ME provides UICC with NR Primary Timing Advance as defined in 3GPP 38.211. ME provides UICC with available Network measurement reports (NMR) related to NR as defined in 3GPP 38.331. Transitional SIM Recommended 5G SIM Low Power SIM Subscriber privacy Encrypted SUPI Subscription Permanent Identifier for 5G The method to protect end user privacy by encryption of subscriber identifier previously named IMSI (International Mobile Subscriber Identity) is defined in the standard 3GPP TS 33.501 MANDATORY: Home Network Public Key has to be stored in the USIM and not in the ME. Step 1: Ephemeral SIM encryption key pair generation (private and public). Step 2: Ephemeral SIM encryption key = f(home Network s public key, ephemeral SIM encryption private key) Step 3: Encrypted SUPI = f(ephemeral SIM encryption key, SUPI) Service n 124 Subscription identifier SUCI = HN ID HN public key ID encrypted SUPI SUCI stands for Subscription Concealed Identifier End user privacy activation. If service n 124 is activated then EF

privacy support Service n 125 SUCI calculation by the USIM Get IDENTITY command and ETSI TS 102 221 SUCI registry API 3GPP TS 31.130 Extended battery life Suspend and resume UICC suspension as defined in 11.1.22 in ETSI TS 102 221 Unleashing deployment of new services Poll interval negotiation edr/psm USAT Pairing Remote file and applet management Over The Air Access to IMS networks Negotiation of Poll Interval as defined in EF AD Administrative Data 3GPP 31.102 & 31.101 Service n 121 EARFCN list for MTC/NB-IOT UEs 3GPP 31.102 UE-based procedure with USAT application pairing defined in 3GPP TS 33.187 Security aspects of Machine-Type Communications GP 2.2 Amendment B and ETSI TS 102 226 ISIM ADF and related Efs as defined in 3GPP TS 31.103 SUCI_Calc_Info shall be present. If service n 124 is deactivated then EF SUCI_Calc_Info shall not be present. If service 125 SUCI calculation by the USIM is activated then EF SUCI_Calc_Info shall not be present. SIM card operating system must support the Get Identity command used by the ME to retrieve the encrypted SUCI computed by the SIM and deliver it to the network each time it is requested. Enable to compute encrypted SUCI from a standalone and interoperable Javacard application using standardised APIs. Before switching off, the SIM must store its internal status. When the device resumes the UICC, certain states which were used in a previous card session can be also used in a new card session. Negotiation between the SIM and the device to find the optimum poll interval that will reduce device activity to save battery while letting the SIM applications contact some servers or the device when required. The proper personalisation shall be put in the SIM to allow the usage of edr to be able to reduce the power consumption of the device. Contains the geographical areas associated with the EARFCNs for enabling cell search of MTC carrier or NB-IOT carrier. The SIM card can be locked to a device or a device type so it would be useless to steal a SIM in a traffic light for example to use it in a smartphone because thanks to this functionality the SIM is locked to a device type: the traffic light. This is especially useful in the IOT context. Reaching the SIM to update some data or launch application in an all IP world. Application protocol ISIM application selection IMPI request IMPU request SIP Domain request ISIM service table request P-CSCF address request

Network resource optimisation Security 5G support for the OPEN CHANNEL command Unified Access Control OPEN CHANNEL Service n 126 UAC Access Identities support: EF UAC_AIC Service n 127 Steering of UE in VPLMN. Service n 122 5GS Mobility Management Information: EF 5GS3GPPLOCI, 5GSN3GPPLOCI, EF 5GS3GPPNSC, EF 5GSN3GPPNSC Service n 123 5G Security Parameters EF 5GAUTHKEYS ISIM session termination Bearer Type NG-RAN must be supported in addition to legacy modes (GPRS, UTRAN, etc ). Prioritisation of multi-media services configured within the SIM If service nº 127 is activated then the device is to receive Steering of Roaming, including the list of preferred networks and access technology combinations, during initial registration in a visited network as specified in 3GPP TS 23.122. Contains NAS full native security context from 5G Mobility Management Information Secure temporary keys for 5G but also non 3GPP security context such as WiFi are stored in EF 5GAUTHKEYS: A key called KAUSF derived from CK/IK, left at the AUSF and that home operator can use on its own policy. An anchor key called the KSEAF provided by the AUSF to the SEAF, which can be used for more than one security context. A derived key per security context called KAMF.

3 Conclusion SIMalliance strongly advises that the Recommended 5G SIM is adopted at 5G launch as there is full backward compatibility and it is the most future-proof SIM. The Recommended 5G SIM helps Mobile Network Operators (MNOs) and their customers to make the best use of their 5G investments as detailed below, and in further detail in the 5G SIM: Maximising MNO Investment in 5G Networks presentation which can be found on the SIMalliance website. Challenges faced by MNOs Ensuring a good Quality of Experience Subscriber privacy Extended battery life Delivery of all IP services Network resource optimisation Security How the Recommended 5G SIM helps Quality of Experience monitoring Subscriber ID encrypted Features to reduce power consumption Authentication to the IMS / SIM can be refreshed through HTTPs Service prioritisation stored in SIM 5G network access security