hash
stringlengths
32
32
doc_id
stringlengths
5
12
section
stringlengths
5
1.47k
content
stringlengths
0
6.67M
cf76cbf41e68a296435512370813ffeb
33.129-1
1 Scope
The present document contains objectives, requirements and test cases that are specific to the Lawful Interception elements of a 3GPP network: Administration Function (ADMF), Point of Interception (POI), Triggering Function (TF), Location Acquisition Requesting Function (LARF), Mediation and Delivery Function (MDF). It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test cases unique to the Lawful Interception system. The present document covers common ... Editor's note (April 7th): Also, consider breaking down along this line: elements that have provisioning ability and elements that don't. The idea is that compromising an element that does have provisioning ability into other elements can be more damaging, while taking control of an element that does not have provisioning ability keeps the damage localized.
cf76cbf41e68a296435512370813ffeb
33.129-1
2 References
Editor's Note: 1) English vs American spelling (e.g., "artefacts" vs "artifacts"), 2) full stops in lists. The following documents contain provisions which, through reference in this text, constitute provisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. - For a specific reference, subsequent revisions do not apply. - For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications". [2] 3GPP TS 33.117: "Catalogue of general security assurance requirements". [3] 3GPP TS 33.916: "Security Assurance Methodology (SECAM) for 3GPP network products". [4] 3GPP TS 33.926: "Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes". [5] 3GPP TS 33.126: "Lawful Interception Requirements". [6] 3GPP TS 33.127: "Lawful Interception (LI) architecture and functions". [7] 3GPP TS 33.128: "Protocol and procedures for Lawful Interception (LI); Stage 3". [8] GSMA FS.50: "Network Equipment Security Assurance Scheme - Requirements for Security Assurance Specification Development". [9] GSMA FS.62: "Network Security Assurance Scheme - Adoption Procedure for Security Assurance Specifications". [10] … [x] <doctype> <#>[ ([up to and including]{yyyy[-mm]|V<a[.b[.c]]>}[onwards])]: "<Title>". It is preferred that the reference to TR 21.905 be the first in the list.
cf76cbf41e68a296435512370813ffeb
33.129-1
3 Definitions of terms, symbols and abbreviations
This clause and its three (sub) clauses are mandatory. The contents shall be shown as "void" if the TS/TR does not define any terms, symbols, or abbreviations.
cf76cbf41e68a296435512370813ffeb
33.129-1
3.1 Terms
For the purposes of the present document, the terms given in TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905 [1]. Definition format (Normal) <defined term>: <definition>. example: text used to clarify abstract rules by applying them literally.
cf76cbf41e68a296435512370813ffeb
33.129-1
3.2 Symbols
For the purposes of the present document, the following symbols apply: Symbol format (EW) <symbol> <Explanation>
cf76cbf41e68a296435512370813ffeb
33.129-1
3.3 Abbreviations
For the purposes of the present document, the abbreviations given in TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905 [1]. Abbreviation format (EW) <ABBREVIATION> <Expansion>
cf76cbf41e68a296435512370813ffeb
33.129-1
4 Overview
4.1 Approach This TS was developed based on the guidance and methodology described in 3GPP TR 33.916 "Security Assurance Methodology (SECAM) for 3GPP network products" [3]. 3GPP has organized SCAS documents by publishing one TS per architectural network element. In contrast, we take a different approach in the LI space and collect all LI SCAS in the present TS. Within each clause, TS 33.126 "Lawful Interception Requirements" [5] is used to derive LI element specific requirements and tests. Requirement numbering from TS 33.126 is referenced herein to enable compliance tracking.
cf76cbf41e68a296435512370813ffeb
33.129-1
4.2 Document Part Organization
Editor's Note: The part structure of 33.129 should be re-visited when the maturity of the project warrants it, and likely not settle to its final form until the project is ~80%+ along. • Part 1 - Common Part 1 of TS 33.129 contains the general framework of LI SCAS. This part contains descriptions of threats and attacks, but not any tests. • Part 2 - NF-Embedded LI functions Part 2 of TS 33.129 contains SCAS tests for LI functions that are embedded in network functions - i.e., their lifecycle is inexorably tied to a network function. Inevitably, a tension exists because access control to the network function and access control to the embedded LI function have to be separated. Most tests in this part exercise the implementation of this separation. • Part 3 - Non-NF-Embedded LI functions Part 3 of TS 33.129 contains SCAS tests for LI functions that are stand-alone - i.e., not associated with any network functions. This separation tends to reduce security considerations when compared to embedded functions. The figure below reflects examples of stand-alone LI functions. • Part 4 - Mediation and Delivery Function (MDF) Part 4 of TS 33.129 contains SCAS tests that apply to the Mediation and Delivery Function (MDF). • Part 5 - Administration Function (ADMF) Part 5 of TS 33.129 contains SCAS tests that apply to the LI Administration Function (ADMF). Figure 4.2-1: TS 33.129 parts coverage The LEMF is outside the scope of the present document series, but attributes of the LEMF (such as delivery paths in the MDF) are.
cf76cbf41e68a296435512370813ffeb
33.129-1
5 Security Elements
cf76cbf41e68a296435512370813ffeb
33.129-1
5.1 Assets
5.1.1 Assets Overview Assets are categorized more granularly than functional blocks. These are the specific elements that, if exposed or influenced, could compromise LI. Table 5.1.1-1: Asset definitions Code Name Description 1 AS-TARGET-01 Target Identifier(s) E.g., IMSI, MSISDN, IP address, used to define or tag a target in the system. 2 AS-LI-CREDS-02 LI Access Credentials Tokens, passwords, certificates used to authenticate LI operations. 3 AS-NF-03 Network Function Over and above SA3 general assumptions, e.g., log states, memory artifacts, ephemeral labels. 4 AS-NETWORK-SERVICE-04 Network Service Normal functioning of a network service. 5 AS-LI-FUNCTION-05 LI Function LI function internal state and artifacts - e.g., job queues, service status, inter-process calls. 6 AS-LI-PRODUCT-06 LI Product Delivery Link Continuity (interruptions), quality (jitter, timing anomalies) of the delivery of LI product, between POIs and MDF, or MDF and LEMF. 7 AS-LEMF-07 LEMF Attributes LEMF attributes, such as IP address, domain names, paths, etc. 8 AS-USER-PATTERN-08 Network User Behavior Attributes Application or flow-level characteristics that may affect network user attributes (e.g., privacy). 9 AS-CRYPTO-STORE-09 Crypto Store System-trusted certificate lists, keystores, or chains. 10 AS-API-CONF-10 API or Configuration State Network API configuration artifacts. 11 AS-LI-PRODUCT-11 LI Product LI content or metadata. 5.1.2 Detailed Asset Descriptions 5.1.2.1 Target Identifiers Asset Code: AS-TARGET-01 Asset Name: Target Identifiers Asset Description: These are the identifiers used to tag or define interception subjects within the network, such as IMSI, MSISDN, IP addresses, MAC addresses, or session tokens. They represent the direct linkage between a legal warrant and its technical enforcement. Exposure of these identifiers may allow unauthorized parties to determine the existence or identity of surveillance targets. Even indirect inference, such as recognizing frequent lookups of a particular subscriber's IMSI, could compromise the confidentiality of an LI operation. As such, these identifiers must be protected across all stages of LI provisioning and delivery. 5.1.2.2 LI Access Credentials Asset Code: AS-LI-CREDS-02 Asset Name: LI Access Credentials Asset Description: These are the authentication elements used to authorize and secure LI operations. They may include passwords, API tokens, client certificates, SSH keys, or internal authorization grants. If compromised, they could allow an attacker to impersonate an authorized LI system or operator, potentially activating or modifying interceptions, disabling audit trails, or extracting sensitive data. The scope of access these credentials enable makes them high-risk, warranting isolation, short rotation intervals, and hardware-based protection where possible (e.g., HSM-backed keystores). 5.1.2.3 Network Function Asset Code: AS-NF-03 Asset Name: Network Function Asset Description: A network function (NF) encompasses any virtualized or physical function that plays a role in packet handling, control signaling, or service delivery. Beyond SA3’s baseline assumptions, this asset includes ephemeral internal states, such as memory artifacts, temporary routing rules, and runtime labels, that may be visible to co-located workloads or side-channel analysis. An attacker compromising an NF could potentially observe or disrupt LI-related actions indirectly, especially in service-based architectures where functions communicate over open or loosely controlled interfaces. 5.1.2.4 Network Service Asset Code: AS-NETWORK-SERVICE-04 Asset Name: Network Service Asset Description: This can be thought of simplistically as a chain of network functions. However, this category includes the end-to-end behavior of services delivered by the network, including latency, throughput, jitter, and session continuity. Deviations in these metrics, if correlated with LI activity, could enable detection of interception events, particularly by observant external agents or passive observers. An LI system that degrades network services in a distinguishable way may inadvertently disclose its presence. Ensuring uniform service behavior, whether or not interception is active, is critical to undetectability requirements. 5.1.2.5 LI Function Asset Code: AS-LI-FUNCTION-05 Asset Name: LI Function Asset Description: This asset represents the internal mechanisms and runtime state of the LI function itself. It includes service status flags, job queues, inter-process communication, service mesh labels, and other operational artifacts. Exposure of this state, even in logs, metrics, or crash dumps, could reveal active or planned LI operations, or offer an attacker insights into provisioning timing and volume. The integrity of this component is essential to ensure lawful provisioning, reliable delivery, and resistance to insider threats. 5.1.2.6 LI Product Delivery Asset Code: AS-LI-PRODUCT-06 Asset Name: LI Product Delivery Asset Description: This refers to the delivery chain that carries LI content and Intercept Related Information (IRI) from network function Points of Interception (POIs) to the mediation function (MDF), and from there to the Law Enforcement Monitoring Facility (LEMF). Attributes of this path, such as timing consistency, jitter, delays, retransmissions, or packet loss, can serve as side-channel indicators. Disruptions in delivery may undermine undetectability or signal to adversaries that surveillance is occurring. High availability, quality-of-service masking, and traffic normalization are essential to protect this asset. 5.1.2.7 LEMF Attributes Asset Code: AS-LEMF-07 Asset Name: LEMF Attributes Asset Description: This includes the IP address, domain name, or network path of the LEMF endpoint. If the LEMF is statically assigned or its routing patterns are predictable, adversaries may correlate traffic to or from the LEMF to active surveillance. This can compromise the confidentiality of LI recipients and potentially enable network mapping of enforcement infrastructure. Protection of this asset includes obfuscation, dynamic addressing, and encrypted transport. 5.1.2.8 Network User Behavior Asset Code: AS-USER-PATTERN-08 Asset Name: Network User Behavior Attributes Asset Description: These are behavioral signatures or application-layer patterns associated with end users. They may include traffic types, flow durations, usage spikes, or session frequency. If LI functions inadvertently introduce changes to these patterns, such as additional latency, altered timing, or injected traffic, it may be possible to detect surveillance through behavioral analysis. Conversely, behavioral data may also be used to infer target identities if not adequately decoupled. Safeguards should include behavior-preserving interception, noise injection, and usage anonymization. 5.1.2.9 Crypto Store Asset Code: AS-CRYPTO-STORE-09 Asset Name: Crypto Store Asset Description: This includes keystores, certificate chains, and lists of trusted Certificate Authorities (CAs) used within LI systems or the broader network. A compromised certificate store could allow an attacker to issue fraudulent credentials, intercept or forge LI traffic, or break TLS-protected communication. Certificate stores must be tightly controlled, auditable, and isolated from other runtime environments. Particular care should be taken when sharing trust anchors between LI and non-LI systems. 5.1.2.10 API or Configuration State Asset Code: AS-API-CONF-10 Asset Name: API or Configuration State Asset Description: This encompasses the current state and metadata of network APIs, configuration templates, or orchestrator settings used in service delivery. Improper exposure may include target-specific parameters, interception flags, or routing modifications indicative of active LI sessions. Even passive reads of this state can reveal the operational context of LI functions. Configuration drift, race conditions, or excessive verbosity in status endpoints must be mitigated to avoid exposing this asset. 5.1.2.11 LI Product Asset Code: AS-LI-PRODUCT-11 Asset Name: LI Product Asset Description: The LI product comprises content (e.g., voice, SMS, data) and metadata (e.g., call records, IP flow info) delivered as IRI to the LEMF. This is among the highest-value assets in the system and the direct object of the lawful interception operation. Any compromise, whether through leakage, mis-delivery, or tampering, can breach both confidentiality and chain-of-custody requirements. It must be protected in transit and at rest using strong cryptographic measures, secure transport channels, and rigorous access logging.
cf76cbf41e68a296435512370813ffeb
33.129-1
5.2 Attackers
5.2.1 Attackers Overview Attackers can be human or automated. The following table lists the attackers considered in the present multi-part document. Table 5.2-1: Attacker definitions Code Name Description 1 AT-INTERNAL-01 Internal administrator Has privileged access to network functions or management interfaces but no LI authorization. May be, for example: • A log auditor • A config manager • A general platform admin • A network analytics observer • A data center operator Editor's Note: consider exploding this in sub-categories 2 AT-EXTERNAL-02 External agent Has no legitimate access to any internal network interface (although may have access to an external interface such as an end user). May exploit e.g., exposed APIs, timing, network resources. 3 AT-AUTO-AI-03 Automated or AI Agent Operates at higher scales, capable of fast deep analysis and pattern detection or timing inference. 4 AT-PASSIVE-04 Passive Observer Non-real-time observer with access to historical data, can compare pre and post provisioning states, correlate metrics across tenants/users. 5 AT-COMPROMISED_NF-05 Compromised NF An attacker has taken control of an NF and uses it as a pivot point to attack other NFs in the same "perimeter". Editor's Note: Be mindful to not limit attacker to "casual" level - include well-resourced attackers in every test analysis
cf76cbf41e68a296435512370813ffeb
33.129-1
5.2.2 Detailed Attacker Descriptions
5.2.2.1 Internal Administrator Attacker Code: AT-INTERNAL-01 Attacker Name: Internal Administrator Attacker Description: An internal administrator refers to a human actor with privileged access to core network systems, but without explicit authorization to access or manage Lawful Interception (LI) functions. This attacker may hold legitimate operational roles, such as log auditor, configuration manager, infrastructure administrator, or analytics engineer, and typically has routine access to sensitive systems, including logging platforms, telemetry pipelines, or network orchestration tools. Due to proximity and privilege level, this attacker is capable of indirect inference or misuse of general-purpose tools to extract sensitive LI-related insights. These threats are particularly insidious because they originate from trusted roles within the perimeter. Editor's Note: Sub-categorization may be warranted to reflect functional boundaries and privilege tiers. 5.2.2.2 Internal Administrator Granular Breakdown 5.2.2.2.1 Internal Log Auditor Attacker Code: AT-INTERNAL-LOG-01 Attacker Name: Internal Log Auditor Attacker Description: This attacker has legitimate access to system and application logs for operational, compliance, or troubleshooting purposes. While not authorized for LI access, they may infer surveillance activity by observing timing correlations, unusual service requests, or log entries tied to specific identifiers. Because log data often spans multiple services and timestamps, the log auditor can piece together patterns across different layers, particularly when logs are insufficiently redacted or when metadata about LI functions is leaked due to poor segregation. The risk is elevated in environments where centralized observability tools are broadly accessible. Importantly, such individuals may not always be direct employees of the CSP; they may include contractors, outsourced service providers, or regulatory agency auditors. The presence of third parties with log visibility adds further complexity to managing access boundaries and ensuring strict compartmentalization of LI-related activity. 5.2.2.2.2 Internal Configuration Manager Attacker Code: AT-INTERNAL-CONFIG-02 Attacker Name: Internal Configuration Manager Attacker Description: This internal actor has control over or visibility into network and service configuration interfaces, such as provisioning databases, orchestration tools, or infrastructure-as-code systems. While they may not intentionally target LI systems, their access could expose sensitive artifacts like target identifiers, service activation records, or routing behaviors that indirectly reveal LI activity. A misconfiguration, audit bypass, or direct misuse of privilege could lead to the exposure or tampering of LI-related parameters. This attacker is especially dangerous when configuration changes are not subject to strict role-based access control and change logging. 5.2.2.2.3 Internal Infrastructure/Platform Administrator Attacker Code: AT-INTERNAL-INFRA-03 Attacker Name: Internal Infrastructure/Platform Administrator Attacker Description: An infrastructure administrator manages underlying compute, storage, and networking resources. They typically have root-level access to virtual machines, containers, or Kubernetes clusters where LI functions may reside. While this actor may not understand the semantics of LI operations, their access allows for memory inspection, storage snapshotting, or inter-process observation that could compromise confidentiality. Their role sits beneath LI in the stack, creating a high-privilege threat vector. This risk is heightened in cloud-native environments with shared platforms or insufficient tenant isolation. 5.2.2.2.4 Internal Analytics or Monitoring Observer Attacker Code: AT-INTERNAL-OBSERVE-04 Attacker Name: Internal Analytics or Monitoring Observer Attacker Description: This attacker uses monitoring dashboards, telemetry pipelines, or data visualization tools to analyze network performance and user behavior. Although not involved in LI, they may observe outliers, such as sudden QoS changes, endpoint redirection, or anomalous traffic patterns, that align with surveillance activities. Their access is typically read-only, but because they work across many users and services, they can form inferences at scale. If monitoring tools lack data masking or correlation protections, this actor could indirectly deanonymize LI operations. 5.2.2.2.5 Internal Facilities or Data Center Operator Attacker Code: AT-INTERNAL-DATACENTER-05 Attacker Name: Internal Facilities or Data Center Operator Attacker Description: This role includes physical or environmental access, such as rack technicians, cabling engineers, or maintenance personnel. Though easily overlooked, data center operators may intercept or observe physical indications of LI provisioning (e.g., device identifiers, port activation, or localized power usage). If surveillance workloads are not obfuscated within broader platform operations, these actors could observe installation patterns or hardware identifiers tied to LI. This threat is particularly relevant in private or hybrid data centers where physical separation is minimal and operator duties cross tenant boundaries. 5.2.2.3 External Agent Attacker Code: AT-EXTERNAL-02 Attacker Name: External Agent Attacker Description: An external agent is a threat actor entirely outside the administrative domain of the Communication Service Provider (CSP). This entity lacks any legitimate access to internal network functions or LI systems, but may attempt to exploit publicly exposed services, such as user-facing APIs, mobile access interfaces, or Internet-exposed network resources. Attacks may include techniques such as timing analysis, metadata harvesting, endpoint compromise, or denial-of-service strategies. While the external agent has the least direct access, the increasing attack surface from 5G cloud-native and multi-access edge architectures can make this attacker class surprisingly effective, especially when combined with reconnaissance automation. 5.2.2.4 Automated or AI Agent Attacker Code: AT-AUTO-AI-03 Attacker Name: Automated or AI Agent Attacker Description: An automated or AI-driven attacker is a non-human agent capable of processing vast quantities of data in real time or near-real time. These agents leverage machine learning, pattern recognition, or inference engines to discover anomalies, detect provisioning patterns, or identify LI-related events across large data streams. Whether deployed internally or externally, this attacker type can operate continuously, scaling beyond human capacity, and is particularly effective in identifying subtle timing correlations, job queue patterns, or service quality variations. Such agents may be adversarially trained and can pose a significant risk in hybrid environments where observability is distributed. 5.2.2.5 Passive Observer Attacker Code: AT-PASSIVE-04 Attacker Name: Passive Observer Attacker Description: A passive observer is an attacker who does not interfere with live operations but gains access to historical data, telemetry, or pre/post-state snapshots. This actor may compare logs, traces, or service states before and after suspected LI provisioning to infer the presence of surveillance activities. Passive observers may exist within the CSP’s environment or in adjacent systems such as logging infrastructure or analytics data lakes. While they do not actively engage in attacks, their ability to correlate changes over time, particularly across multi-tenant environments, makes them a notable threat, especially when data retention and separation controls are weak. 5.2.2.6 Compromised Network Function Attacker Code: AT-COMPROMISED_NF-05 Attacker Name: Compromised Network Function (NF) Attacker Description: This attacker class represents a network function that has been overtaken, either fully or partially, by an adversary. The compromised NF operates under the control of the attacker and can serve as a pivot point to reach LI systems, intercept provisioning messages, or disrupt internal communications. It may impersonate trusted roles, inject misleading telemetry, or undermine confidentiality by leaking sensitive artifacts. Compromised NFs are especially dangerous in service-mesh architectures where trust boundaries are often implicit. Lateral movement across internal APIs or through shared memory spaces between co-located functions increases the threat radius substantially.
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3 Threats
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.1 Threats Overview
The following table contains named threat types. Each SCAS test can point to one or more. Table 5.3.1-1: Threat definitions Code Name Description 1 T-LOG-01 Log leak LI activity generates logging artifacts observable by non-LI authorized parties. 2 T-CONFIG-02 Config leak LI activity is inferred by analysing config files extracted before and after LI provisioning. 3 T-RES-CPU-03 LI leak via CPU side channel 1 LI activity is inferred by analysing CPU utilization levels, method 1. 4 T-RES-CPU-04 LI leak via CPU side channel 2 LI activity is inferred by analysing CPU utilization levels, method 2. 5 T-RES-NET-05 LI leak via network flow side channel LI activity is inferred by analysing network bandwidth utilization levels. 6 T-TIMING-06 LI detection via timing anomalies. Detection of LI via timing anomalies. 7 T-TIMING-07 MDF-LEMF LI Product Flow Detection Detection of MDF to LEMF LI product flow via timing anomalies. 8 T-INTERRUPTION-08 POI-MDF Link Failure Link-level interruption between POI and MDF used to infer presence or behaviour of LI functions. 9 T-SESSION-COUNT-09 Session count LI detection by session count analysis. 10 T-INTERFACE-SEC-10 Interface security Allowance of insecure (non-TLS) connections. 11 T-FEATURE-11 Unnecessary features Unnecessary features increase the attack surface. 12 T-SERVICE-12 Unnecessary services Unnecessary services increased the attack surface. "Simple MISconfiguration"
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2 Detailed Threat Descriptions
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.1 Log Leak
Threat Code: T-LOG-01 Threat Name: Log Leak Threat Category: Information Disclosure Threat Description: Certain system or network logs may unintentionally record details of Lawful Interception (LI) operations, such as interface initialization, provisioning events, or errors specific to LI services. If such logs are accessible to non-LI-authorized users or monitoring systems, this could result in the detection of LI activity, violating confidentiality and undetectability requirements. Threatened Asset: AS-TARGET-01 Target Identifiers
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.2 Config Leak
Threat Code: T-CONFIG-02 Threat Name: Config Leak Threat Category: Information Disclosure Threat Description: Configuration files or system state snapshots taken before and after LI provisioning may reveal changes indicative of interception functionality, such as new interfaces, active LI modules, or altered routing behaviors. If such configurations are accessible to unauthorized administrators or third-party tools, they may be used to infer the existence or target of an LI operation. Threatened Asset: AS-TARGET-01 Target Identifiers
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.3 LI Leak via CPU Side Channel 1
Threat Code: T-RES-CPU-03 Threat Name: LI Leak via CPU Side Channel (Pattern A) Threat Category: Information Disclosure Threat Description: LI operations may cause observable variations in CPU utilization due to additional processing, packet duplication, or encryption tasks. If an attacker monitors CPU resource usage patterns over time and correlates spikes or periodicity with specific events, it may be possible to infer the presence of active LI functions or associated targets. Threatened Asset: AS-TARGET-01 Target Identifiers
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.4 LI Leak via CPU Side Channel 2
Threat Code: T-RES-CPU-04 Threat Name: LI Leak via CPU Side Channel (Pattern B) Threat Category: Information Disclosure Threat Description: A refined side-channel analysis leveraging advanced statistical or machine learning methods may identify LI-related process signatures at a lower resolution or across virtualized environments. Unlike direct CPU utilization spikes, this method relies on deeper behavioral fingerprinting (e.g., cache usage, execution timing patterns), which may allow even more covert inference of LI presence. Threatened Asset: AS-TARGET-01 Target Identifiers
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.5 LI Leak via Network Flow Side Channel
Threat Code: T-RES-NET-05 Threat Name: LI Leak via Network Flow Side Channel Threat Category: Information Disclosure Threat Description: LI systems typically duplicate or redirect traffic to an MDF or mediation device. This may introduce subtle, but detectable changes in bandwidth utilization, jitter, or packet duplication observable from within the network or via flow records (e.g., NetFlow, sFlow). An attacker monitoring network flow metadata may detect patterns associated with interception activity. Threatened Asset: AS-TARGET-01 Target Identifiers
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.6 LI Detection via Timing Anomalies
Threat Code: T-TIMING-06 Threat Name: LI Detection via Timing Anomalies Threat Category: Information Disclosure Threat Description: The addition of LI processing steps (e.g., duplication, filtering, routing to MDF) can result in increased latency or jitter during communication sessions. An attacker may detect the presence of LI by statistically analyzing round-trip times or response behaviors that differ from baseline behavior when LI is not active. Threatened Asset: AS-TARGET-01 Target Identifiers
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.7 MDF–LEMF LI Product Flow Detection
Threat Code: T-TIMING-07 Threat Name: MDF–LEMF LI Product Flow Detection via Timing Threat Category: Information Disclosure Threat Description: The flow of intercepted traffic (IRI or CC) from the MDF to the LEMF may generate detectable timing patterns, especially if LI sessions are rare or traffic volume fluctuates. Observers with visibility into network patterns or inter-domain timestamps could detect and potentially correlate this flow with LI activities, violating the principle of transparency. Threatened Asset: AS-TARGET-01 Target Identifiers; AS-LI-PRODUCT-11 LI Product
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.8 POI–MDF Link Failure
Threat Code: T-INTERRUPTION-08 Threat Name: POI–MDF Link Failure Threat Category: Denial of Service Threat Description: A network or logical interruption between the Point of Interception (POI) and the MDF may unintentionally reveal the existence of LI. If LI sessions degrade differently from normal user sessions under such link failure conditions, an attacker could induce or observe faults to probe for LI presence or behavior. Threatened Asset: AS-TARGET-01 Target Identifiers; AS-LI-PRODUCT-11 LI Product
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.9 Session Count
Threat Code: T-SESSION-COUNT-09 Threat Name: LI Detection via Session Count Threat Category: Information Disclosure Threat Description: Provisioning of LI may introduce additional sessions (e.g., replicated flows, internal signaling) that appear in session monitoring tools or access logs. If the session count increases in a predictable manner during LI activation, an unauthorized observer could infer LI activity simply by counting active or historical sessions. Threatened Asset: AS-TARGET-01 Target Identifiers
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.10 Interface Security
Threat Code: T-INTERFACE-SEC-10 Threat Name: Interface Security Misconfiguration Threat Category: Tampering / Information Disclosure Threat Description: If LI-related interfaces (e.g., between POI, MDF and LEMF) are not properly secured using cryptographic protocols such as TLS, an attacker may eavesdrop on or manipulate LI product traffic. This threatens both confidentiality and integrity of intercepted data and may result in exposure of sensitive law enforcement operations. Threatened Asset: AS-TARGET-01 Target Identifiers
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.11 Unauthorized Use of Unnecessary Features
Threat Code: T-FEATURE-11 Threat Name: Unauthorized Use of Unnecessary Features Threat Category: Information Disclosure / Misuse of Resources Threat Description: Default-enabled but unnecessary software or hardware features may remain active after installation or commissioning. Attackers may exploit these dormant features (e.g., debugging functions, unused interfaces, auxiliary services) to gain unauthorized access, escalate privileges, or collect sensitive information. Such features increase the system’s attack surface and may be leveraged for reconnaissance or direct compromise. Threatened Asset: AS-LI-FUNCTION-05, AS-API-CONF-10
cf76cbf41e68a296435512370813ffeb
33.129-1
5.3.2.11 Unauthorized Use of Unnecessary Services
Threat Code: T-SERVICE-12 Threat Name: Unauthorized Use of Unnecessary Services Threat Category: Information Disclosure / Misuse of Resources Threat Description: After installation, supplier-preset, local, or network-accessible services may remain active that are not required for the LI system’s intended operation. Attackers can exploit these services to gain unauthorized access, consume resources, or leverage unpatched configurations. Unnecessary services expand the system’s attack surface and may provide footholds for compromise, particularly if they lack hardened security configurations. Threatened Asset: AS-LI-FUNCTION-05, AS-API-CONF-10 6 Common Tests 6.1 Supply Chain 6.1.1 Vendor 6.1.1.1 Normal Vendor-Supported Products Requirement Name: Vendor-Supported Products Requirement Reference: TBD Requirement Description: Software and hardware of the system must be covered by security vulnerability support from the supplier. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD Threat reference: TBD Test case: Test Name / ID: TC_LI_COMMON_SUPPLIER_VULN_MONITORING Purpose: Validate that the supplier provides continuous vulnerability monitoring, timely advisories, and effective updates for all in-use software and hardware. Pre-Conditions: 1. A complete system inventory (hardware and software, with versions) is available. 2. Supplier documentation regarding security support policy and timelines is available. 3. The system under test is currently within the vendor’s standard support phase. Execution Steps: 1. The tester obtains a list of recent Common Vulnerabilities and Exposures (CVEs) relevant to the in-use products from a third party independent of the vendor. 2. The tester verifies that advisories from the supplier match public CVE disclosures (cross-check NVD, vendor PSIRT, and CERT feeds). 3. The tester uses an automatic tool to scan for all CVEs affecting the product. 4. The tester verifies that the supplier provides either a patch or documented mitigation within a reasonable timeframe (e.g., within published SLA). 5. The tester checks that the update/mitigation can be applied or has been applied to the deployed version without loss of security support. Expected Results: 1. Supplier advisories cover all known CVEs relevant to the products in use. 2. Advisories are timely and consistent with industry disclosure best practices. 3. Updates or mitigations are available and applicable to the deployed system. Expected Format of Evidence: The following are acceptable: 1. Document what tool was used to automatically scan for CVEs. 2. Copy of supplier advisories. 3. Cross-reference table (inventory vs. CVE database vs. supplier feed). 4. Patch/mitigation bulletin and applied change record. 5. Plain-language conclusion confirming supplier monitoring and patching. 6.1.1.2 Open-Source Products Requirement Name: Vendor-Supported Products Requirement Reference: TBD Requirement Description: Software and hardware of the system must be covered by security vulnerability support from the supplier. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD Threat reference: TBD Test case: Test Name / ID: TC_LI_COMMON_OPEN_SOURCE_VULN_SUPPORT Purpose: Ensure open-source components are covered by a reliable vulnerability management program (community or designated third party). Pre-Conditions: 1. Inventory identifies open-source components in the system. 2. Evidence exists of an active community or commissioned third party maintaining vulnerability advisories. 3. Mailing lists, public trackers, or equivalent communication channels are accessible. Execution Steps: Note: the following shall be performed for each artifact. 1. The tester identifies open-source components in the Inventory. 2. The tester queries the community/project tracker for recent vulnerability advisories. 3. The tester selects one CVE from the tracker. 4. The tester verifies that either a patch release or mitigation note was published. 5. The tester checks that the patch/mitigation can be integrated into the deployed version in use. Expected Results: 1. Vulnerability monitoring exists and is demonstrably active. 2. Advisories are consistent with public CVE disclosures. 3. Patches/mitigations are available for exploitable vulnerabilities. Expected Evidence: The following are acceptable: 1. Extracts from project mailing lists/trackers. 2. CVE reference with matching advisory. 3. Patch or workaround instructions. 4. Plain-language conclusion whether open-source support is reliable and comprehensive. 6.1.1.3 Trusted Sources Requirement Name: Trusted sources Requirement Reference: TBD Requirement Description: All software used on the system (firmware, OS, libraries, applications, appliances, containers) must be obtained from trusted sources (official supplier channels, authorized distributors, or official provisioning servers with validated cryptographic protection). References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD Threat reference: TBD Test case: Test Name / ID: TC_LI_COMMON_TRUSTED_SOURCES Purpose: Ensure software is only obtained from official supplier channels, authorized distributors, or trusted provisioning servers. Pre-Conditions: 1. Inventory of software/firmware to be obtained. 2. Supplier documentation of official distribution channels exists and is obtained. 3. Access to logs of package managers or download clients is available. Execution Steps: Note: the following shall be performed for each artifact. 1. Attempt to download artifacts from an official supplier server with HTTPS/sFTP. 2. Validate TLS certificate/host key against supplier reference values. 3. Prefer(?) cryptographically signed/hashed artifacts where available. Editor's Note: Question: Allow variance or not? 4. Negative test: attempt download from a non-authorized mirror or staging server with invalid cert; confirm abort. Editor's Note: Answer to the previous question affects this. Expected Results: 1. Only artifacts from trusted sources are accepted. Editor's Note: Answer to the previous question affects this. 2. Certificates/keys validated; untrusted endpoints blocked. 3. Signed/hashed artifacts are used in preference to unprotected ones. Expected Evidence: 1. Download logs with FQDN/IP and TLS details. 2. Certificate/host key validation records. 3. Supplier list of approved channels cross-referenced with observed downloads. 4. Plain language conclusion. 6.1.1.4 Integrity Requirement Name: Integrity checking Requirement Reference: TBD Requirement Description: All software used on the system (e.g., firmware, OS, libraries, applications, appliances, containers) must be verified for integrity before installation (e.g., supplier-provided hashes, signatures, Certificate of Authenticity on physical media) References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD Threat reference: TBD Test case: Test Name / ID: TC_LI_COMMON_INTEGRITY_CHECKING Purpose: Ensure downloaded software is integrity-verified using supplier-provided checksums or signatures. Pre-Conditions: 1. Supplier-provided checksum/signature available. 2. Verified trust anchors for signature validation exist and are accessible. 3. Local verification tools available (sha256sum, gpg, etc.) are available. Execution Steps: 1. Compute cryptographic hash of the artifact; compare with supplier reference from an independent channel. 2. If available, verify cryptographic signature (e.g., GPG/X.509). 3. Negative test A: modify artifact (bit flip); confirm hash/signature fails. 4. Negative test B: attempt to install artifact with forged signature; confirm block/failure. Expected Results: 1. Hash/signature verification passes before install. 2. Any mismatch or invalid signature aborts install. Expected Evidence: 1. Hash verification output. 2. Signature verification transcript (key fingerprint, issuer, validity). 3. Plain language conclusion. 6.1.1.5 Feature Deactivation Requirement Name: Feature Deactivation Requirement Reference: TBD Requirement Description: Features that are not required in the software and hardware used shall be deactivated. References: Asset reference: AS-LI-FUNCTION-05, AS-API-CONF-10 Attacker reference: AT-INTERNAL-01, AT-EXTERNAL-02 Threat reference: T-INTERFACE-SEC-10, T-FEATURE-11 Test case: Test Name / ID: TC_LI_COMMON_FEATURE_DEACTIVATION Purpose: During the initial installation of software, default-activated services that are not necessary for the operation and functionality of the specific system shall be disabled. These features typically cannot be uninstalled individually but must be deactivated via configuration settings. Disabled features shall remain permanently inactive across reboots. Similarly, unnecessary hardware functions (e.g., unused interfaces) must be permanently disabled during initial commissioning. Inactive features reduce the system’s attack surface and minimize opportunities for unauthorized access, manipulation, or information leakage. Pre-Conditions: 1. A complete system inventory (software modules, hardware interfaces) exists. 2. Documentation from suppliers listing configurable features is available. 3. Access to system configuration and runtime verification tools is available. Execution Steps: 1. Enumerate all enabled software features and hardware interfaces at installation/commissioning. 2. Compare enumerated list with operational requirements; mark unnecessary features. 3. Disable each unnecessary feature via configuration (software) or BIOS/firmware settings (hardware). 4. Reboot/restart the system; verify disabled features remain inactive. 5. Attempt negative tests: a. Access a disabled service or interface and confirm rejection. b. Re-enable a disabled feature without explicit administrator action, and confirm block/failure. 6. Cross-check runtime logs and monitoring to ensure no activation after reboot. Expected Results: 1. Only features required for LI system operation remain active. 2. Disabled features remain inactive across reboots and cannot be accessed. 3. Negative tests confirm blocked access or failure of unauthorized re-enablement. Expected Evidence: 1. Inventory with list of active vs. disabled features. 2. Configuration files or screenshots showing deactivation. 3. Runtime verification output after reboot. 4. Logs confirming rejected access to disabled features. 5. Plain-language conclusion confirming permanent deactivation. f6.1.1.6 Service Deactivation Requirement Name: Service Deactivation Requirement Reference: TBD Requirement Description: Only services necessary for system operation may remain active. All supplier-preset, local, or network-accessible services that are not required for the LI system (e.g., default web servers or file-sharing daemons that are not part of LI operation) shall be disabled immediately after installation. Further, less secure management protocols (e.g., Telnet, FTP) shall be removed in favor of more secure alternatives. Disabled services shall remain inactive across system restarts. References: Asset reference: AS-LI-FUNCTION-05, AS-API-CONF-10 Attacker reference: AT-INTERNAL-01, AT-EXTERNAL-02 Threat reference: T-INTERFACE-SEC-10, T-FEATURE-11 Test case: Test Name / ID: TC_LI_COMMON_SERVICE_DEACTIVATION Purpose: Unnecessary services increase the system’s attack surface and risk of compromise, particularly since such services are rarely optimized for secure operation. Pre-Conditions: 1. Inventory of all services running after system installation exists. 2. Documentation identifying required services for LI system operation is available. 3. Access to system configuration and runtime service status is available. Execution Steps: 1. Enumerate all running services after installation. 2. Compare list with documented operational requirements, and mark unnecessary services. 3. Disable identified services via configuration or package management. 4. Reboot the system; verify disabled services do not restart. 5. Negative test: attempt to connect to a disabled service remotely or locally; confirm access is denied. Expected Results: 1. Only necessary services remain active. 2. Disabled services remain inactive across restarts. 3. Unauthorized attempts to access disabled services fail. Expected Evidence: 1. Inventory with required vs. disabled service list. 2. Service configuration files or screenshots showing deactivation. 3. Logs confirming rejection of access attempts. 4. Plain-language conclusion confirming that unnecessary services remain disabled. 6.1.1.7 Standardized Cryptographic Algorithms and Primitives Requirement Name: Standard Cryptographic Primitives Requirement Reference: TBD Requirement Description: Only standardized cryptographic algorithms and primitives published by accredited organizations shall be used. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD Threat reference: TBD Test case: Test Name / ID: TC_LI_COMMON_STANDARDIZED_CRYPTO_ALGORITHMS Purpose: All cryptographic algorithms, primitives, protocols, and parameters used in development and integration shall conform to standards published by accredited bodies (e.g., ETSI, SOGIS, NIST, ISO/IEC, IETF, BSI). Any deviation shall be itemized and justified. Pre-Conditions: 1. Approved cryptographic policy/whitelist (algorithms, modes, curves, key sizes, digests, KDFs/MACs from e.g., ETSI, SOGIS, NIST, ISO/IEC, IETF, BSI) is available. 2. Inventory of crypto dependencies (libs, HSMs, protocol stacks) is available. 3. Access to code/configs/binaries and running services exists. Execution Steps: 1. Extract crypto usages from code/configs/binaries (static analysis, grep, library settings). 2. Enumerate supported/negotiated ciphers on network services (e.g., testssl.sh, nmap --script ssl-enum-ciphers). 3. Compare against the whitelist and accredited standards. 4. Negative: attempt to enable a disallowed algorithm/mode (e.g., RC4, MD5, SHA-1 signatures, 3DES, RSA-1024) and confirm the pipeline or config hardening blocks it. Expected Results: 1. Only approved algorithms are present/negotiable; deprecated/non-standard options are disabled. 2. Attempts to enable disallowed crypto are rejected by Continuous Integration/policy or runtime controls. Expected Evidence: 1. List of accreditation bodies and standards used 2. Whitelist policy + mapping table. 3. Scanner outputs and config snippets showing allowed sets. 4. Logs showing rejection of disallowed algorithms.
cf76cbf41e68a296435512370813ffeb
33.129-1
6.1.1.8 Use of Well-Established and Up-to-Date Crypto Libraries
Requirement Name: Standard Crypto Libraries Requirement Reference: TBD Requirement Description: Well-established and up-to-date cryptographic libraries must be used to implement cryptographic algorithms. The use of self-implemented cryptographic methods is prohibited unless explicitly required, in which case such implementations must follow industry best practices. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD Threat reference: TBD Test Case: Test Name / ID: TC_LI_COMMON_CRYPTO_LIBRARIES Purpose: Ensure that only well-established and up-to-date cryptographic libraries are used. Self-implemented cryptographic methods shall be avoided unless justified. Pre-Conditions: 1. Approved crypto library whitelist (e.g., Botan, Bouncy Castle, GnuTLS, OpenSSL, wolfCrypt) is defined and available. 2. Inventory of crypto dependencies (source code, third-party libraries, protocol stacks, HSMs) is available. 3. Access to build environment, code repositories, and runtime binaries is granted. Execution Steps: 1. Identify and extract all cryptographic function calls from source code and binaries (static analysis, code review, dependency scanners). 2. Cross-check identified crypto usages against the whitelist of approved libraries. 3. Verify library versions against latest available patched releases (e.g., OpenSSL Security Advisory, distro package versions). 4. Negative: Introduce a self-implemented crypto routine (e.g., custom AES, SHA-1 hash function, RC4 fallback) and verify that security review/Continuous Integration policy blocks or flags it. Expected Results: 1. Only approved and up-to-date crypto libraries are used. 2. Deprecated, self-implemented, or unapproved crypto code is absent or explicitly documented and justified under supervision. 3. Vulnerable or outdated library versions are flagged for update. Expected Evidence: 1. List of approved crypto libraries and current versions. 2. Dependency scanner output or inventory including crypto libraries. 3. Security advisories mapping showing libraries are up-to-date. 4. Logs or CI reports showing rejection of self-implemented crypto functions.
cf76cbf41e68a296435512370813ffeb
33.129-1
6.1.1.9 Replaceable Cryptographic Modules
Requirement Name: Modular Cryptographic Implementations Requirement Reference: TBD Requirement Description: Cryptographic methods must be implemented in replaceable modules. Static implementations are prohibited, as they hinder corrections, replacements, and upgrades in the event of security incidents, evolving threats (e.g., quantum computing), or changing performance requirements. Implementations must allow seamless substitution of algorithms and provide sufficient hardware resources to support stronger cryptographic methods. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD Threat reference: TBD Test Case: Test Name / ID: TC_LI_COMMON_REPLACEABLE_CRYPTO_MODULES Purpose: Verify that cryptographic methods are implemented in modular, replaceable components such that algorithms, key lengths, or libraries can be substituted without requiring major redesign or system downtime. Pre-Conditions: 1. System architecture documentation describing cryptographic module boundaries is available. 2. Inventory of cryptographic libraries and their integration points is available. 3. Test environment with ability to swap crypto libraries/configurations is set up. Execution Steps: 1. Inspect software design and code for modular integration of cryptographic functions (e.g., plugin, API, or dynamic linking approach). 2. Attempt replacement of an existing crypto library with an alternative approved one (e.g., replace OpenSSL with GnuTLS, or update a library version). 3. Validate system operation with substituted algorithm or key length. 4. Negative: attempt to hard-code or statically link crypto algorithm implementations and verify that this is detected and flagged. Expected Results: 1. Cryptographic functions are implemented as replaceable modules (dynamic, configurable, or API-based). 2. System continues to operate correctly after replacing an algorithm or library. 3. Statically embedded or hard-coded cryptographic implementations are absent or flagged as non-compliant. 4. Hardware resources (e.g., CPU, HSM, accelerator capacity) are sufficient to handle stronger crypto algorithms when required. Expected Evidence: 1. Architecture documentation showing modular crypto design. 2. Test logs or CI outputs demonstrating successful swap of crypto libraries/algorithms. 3. Configuration or build scripts showing dynamic linking or pluggable crypto modules. 4. Negative test evidence showing static or hard-coded crypto is rejected.
cf76cbf41e68a296435512370813ffeb
33.129-1
6.1.1.10 Configurable and Exchangeable Cryptographic Methods
Requirement Name: Configurable Cryptographic Methods Requirement Reference: TBD Requirement Description: Applications must support configuration of cryptographic methods and provide functions to exchange encryption algorithms. Deactivation and modification capabilities (e.g., cipher suite adjustments) must be built during development. Functions to exchange encryption algorithms (re-encryption) apply only to persistent data storage, not to transport encryption. This enables substitution of broken schemes due to new attacks or future computing architectures. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD Threat reference: TBD Test Case: Test Name / ID: TC_LI_COMMON_CONFIGURABLE_CRYPTO_METHODS Purpose: Verify that cryptographic methods are configurable and that applications can exchange encryption algorithms for persistent data storage. Ensure that cipher suite modification and algorithm substitution functions are implemented and usable. Pre-Conditions: 1. Documentation of configurable crypto parameters and supported cipher suites is available. 2. Test data sets in persistent storage encrypted with an initial algorithm (e.g., AES-128-CBC) are prepared. 3. Administrative access to application configuration and key management is available. Execution Steps: 1. Inspect code/configuration interfaces for crypto parameterization (cipher suites, key lengths, modes). 2. Modify crypto configuration to deactivate or change cipher suites (e.g., remove AES-128-CBC, enable AES-256-GCM). 3. Perform re-encryption of stored data from one algorithm to another. 4. Verify that transport encryption (e.g., TLS sessions) does not expose runtime re-encryption functions. 5. Negative: attempt re-encryption of transport sessions and confirm it is unsupported. Expected Results: 1. Application supports enabling/disabling and modification of cryptographic methods at configuration level. 2. Re-encryption of persistent data from one algorithm to another is successful. 3. Transport encryption is not subject to runtime re-encryption functions. 4. Attempts to re-encrypt transport sessions are rejected. Expected Evidence: 1. Configuration documentation and sample settings for cryptographic method changes. 2. Test logs showing cipher suite modification and successful re-encryption of persistent data. 3. Screenshots/configuration outputs verifying AES-128-CBC replaced with AES-256-GCM (or equivalent). 4. Negative test results confirming re-encryption of transport encryption is blocked.
cf76cbf41e68a296435512370813ffeb
33.129-1
6.1.1.11 Continuous Integration/Continuous Delivery Separation
Requirement Name: CI/CD Separation Requirement Reference: TBD Requirement Description: The CI/CD chain must be separate from systems that use it; there must exist no shared hosts/components/networks. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD Threat reference: TBD Test Case: Test Name / ID: TC_LI_COMMON_CI/CD_SEPARATION Purpose: The goal of this test is to verify that the CI/CD chain is fully separated from software/systems that use it (tenants), and that no tenant workloads (including jobs executed on runners) can reach or use CI/CD internal components (e.g., Source Code Management Database, runner management endpoints, internal message bus, package registry internals, artifact storage internals, management UIs). Pre-Conditions: 1. CI/CD chain (e.g., GitLab/Gitea, runners, artifact store, container registry, internal DB/message bus) is deployed on hosts/subnets not shared with tenant systems. 2. At least one tenant project with functioning pipelines and a non-privileged runner scoped to that project/group exists. 3. The following CI/CD internals identified with network/host inventory exist: a. SCM application nodes (control plane/API/UI) b. SCM internal DB (e.g., PostgreSQL) c. Runner management/control interfaces d. Internal message bus/queues (if any) e. Artifact store internal endpoints (not the public download URL) f. Container/package registry internal endpoints g. Admin/management interfaces (UI/API) 4. Network policy documents are available (firewall rules, ACLs, security groups, service mesh policies). 5. Admin credentials for CI/CD are separate from tenant accounts. 6. A “probe job” template the lab can run in a tenant pipeline (non-privileged) to attempt egress connections (TCP/UDP/HTTP(S)). Execution Steps: 1. Host & Network Separation Check a. Collect host inventory: confirm CI/CD nodes and tenant application nodes are distinct (no shared VMs/nodes). b. Collect subnet/VLAN/Security Group definitions: CI/CD internals isolated from tenant subnets. c. If Kubernetes is used, verify no shared Kubernetes namespaces or nodes between CI/CD control plane/runners and tenant apps. 2. Identity & Role Separation Check a. Verify CI/CD admin accounts are not used for tenant repos or pipelines. b. Verify runner registration tokens/credentials are not exposed in tenant projects. c. Confirm tenant maintainers cannot access CI/CD system/global settings. 3. Network Reachability (Active) from Tenant Job Using the probe job in a tenant pipeline (non-privileged runner): a. Attempt TCP/UDP connections to each CI/CD internal component (list from Preconditions #3). b. Attempt HTTP(S) GET/POST to CI/CD admin/management endpoints and runner management endpoints. c. Attempt DNS resolution of internal hostnames (if split-DNS is used). d. Attempt access to SCM internal DB (e.g., TCP 5432) and message bus ports. e. Attempt access to artifact/registry internal endpoints (not public URLs). f. Record results (connectivity blocked/allowed, HTTP status codes, TLS handshake outcomes). 4. Runner Boundary Enforcement a. Inspect runner configuration: ensure no “privileged” or host-mounted sensitive paths that could expose CI/CD internals (e.g., docker.sock, host networking). b. Validate runner scope: project/group-scoped; not shared globally with CI/CD internals. c. If Kubernetes executors are used, validate network policies (no egress to CI/CD internals; default-deny/explicit-allow only to public endpoints required for builds). 5. Administrative Surface Isolation a. From a tenant maintainer account, attempt to reach admin areas (system settings, user management, runner admin pages). b. Verify HTTP(S) returns 403/404 or redirects to login without privilege escalation. 6. Logging & Detection a. Confirm that blocked access attempts from the probe job are logged by Firewall/Web Application Firewall/service-mesh (and optionally alerted). b. Verify CI/CD app logs show no successful privileged access from tenant identities. 7. Exception Handling (Self-Hosting Code Only, No Self-Deployment) a. Create a repo that stores CI/CD deployment code (e.g., Ansible/Terraform) inside the CI/CD. b. Ensure pipelines that would deploy/redeploy the CI/CD are disabled or blocked (e.g., protected branch rules, approval gates that prohibit execution, or policy-as-code denying these jobs). c. Attempt to run a deployment pipeline; verify it is prevented per policy (store/test allowed; deploy not allowed). Expected Results: 1. Host/Network: a. No shared compute nodes between CI/CD internals and tenant systems. b. CI/CD internal subnets not routable from tenant runners/namespaces (default-deny in place). 2. Identity/Role: a. Tenant identities cannot view/modify CI/CD global settings, runners, or secrets. b. Runner tokens/registrations are compartmentalized; no cross-tenant leakage. 3. Reachability: a. All direct connections from tenant jobs to CI/CD internals fail (SYN blocked, TLS handshake fails, HTTP 403/404 for public edges). b. DNS for internal hostnames not resolvable from tenant jobs. 4. Runner Boundary: a. Runners are non-privileged for tenant projects; no host networking, no docker.sock, no sensitive mounts (any volume/pipe/socket/device a runner job mounts that could give it control of the host, access to CI/CD internals, or long-lived secrets/credentials beyond that job’s scope). b. Runner scope does not include CI/CD administrative projects or org level. 5. Admin Surface: a. Tenant maintainers cannot access admin/management pages or APIs. 6. Logging: a. Blocked attempts are recorded with source project/runner identity and destination component; optional alert raised. 7. Exception (Self-Hosting Code): a. Storing/testing CI/CD deployment code is allowed. b. Any attempt to deploy CI/CD from within CI/CD is blocked by policy/gates; evidence shows prevented execution. 8. General: a. If any internal endpoint is reachable from tenant jobs, this is a FAIL (a requirement violation). b. Pay special attention to “hidden” internals exposed by misconfigured service discovery, sidecars, or shared node-locals (e.g., metadata services, registries on host network). c. For Kubernetes: verify NetworkPolicy/CNI enforces default-deny egress from runner pods. Expected Evidence: 1. Host inventory (screenshots/exports) showing no shared hosts. 2. Network diagrams and effective firewall/security-group/service-mesh policies. 3. Runner configuration exports (executor type, privileges, scopes). 4. Pipeline logs from probe job showing connection failures & HTTP statuses. 5. CI/CD audit logs confirming no admin access by tenant identities. 6. Security device logs (Firewall/Web Application Firewall/service-mesh) showing blocked flows with timestamps. 7. Policy-as-code or CI settings demonstrating blocked self-deployment attempts (and the failed pipeline run).
cf76cbf41e68a296435512370813ffeb
33.129-1
6.1.1.12 Log Leak of LI Identifiers During LI Provisioning
Requirement Name: Confidentiality of LI Identifiers Requirement Reference: TS 33.126: R6.6 - 30 Undetectability by Non-Authorized Parties Requirement Description: General-purpose logs must not contain Lawful Interception (LI) identifiers or other sensitive LI information. Only LI-protected audit logs, only accessible to LI-cleared personnel, may contain such details. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: AT-INTERNAL-01 Threat reference: T-LOG-01 Test Case: Test Name / ID: TC_LI_LOG_IDENTIFIER_LEAK_PROVISIONING Purpose: Validate that LI identifiers and LI-specific events are not written during provisioning activities to general-purpose system or application logs accessible by non-LI-authorized administrators. Pre-Conditions: 1. LI functionality is activated and operational in the system under test. 2. A general-purpose logging subsystem (e.g., syslog, journald, or vendor-specific log service) is enabled. 3. A test operator has LI clearance and can initiate LI operations. 4. A test operator has administrator-level access to general-purpose logs but no LI clearance (to simulate risk exposure). Execution Steps: 1. Initiate an LI session (e.g., activate an intercept, provision target identifiers). 2. Trigger LI-related events likely to produce logs (e.g., provisioning errors, interface restarts). 3. Collect all general-purpose logs from the system during and after LI operations. 4. Inspect logs for presence of LI identifiers (e.g., IMSI, MSISDN, warrant ID, intercept ID). 5. Repeat under different conditions (normal activation, error cases, reconfiguration). Expected Results: 1. General-purpose logs contain no LI identifiers or warrant information. 2. LI events in general-purpose logs, if present, are limited to non-sensitive metadata (e.g., “LI subsystem error” without identifiers). 3. Detailed LI logs with identifiers are only recorded in LI-protected audit logs, accessible to LI-cleared personnel. Expected Evidence: 1. Copy of collected general-purpose logs during LI activity. 2. Annotated inspection showing absence of LI identifiers. 3. Copy of LI-protected logs confirming that identifiers are only stored in the restricted audit facility. 4. Plain-language conclusion affirming compliance.
cf76cbf41e68a296435512370813ffeb
33.129-1
6.1.1.13 Log Leak of LI Identifiers During Communication Time
Requirement Name: Confidentiality of LI Identifiers Requirement Reference: TS 33.126: R6.6 - 30 Undetectability by Non-Authorized Parties Requirement Description: General-purpose logs must not contain sensitive LI information. Only LI-protected audit logs, only accessible to LI-cleared personnel, may contain such details. When identifiers of intercepted targets appear in general-purpose logs (e.g., as part of routine signaling or service activity), no additional information shall indicate that the subscriber is subject to Lawful Interception. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: AT-INTERNAL-01 Threat reference: T-LOG-01 Test Case: Test Name / ID: TC_LI_LOG_IDENTIFIER_LEAK_RUN_TIME Purpose: Validate that general-purpose logs, while possibly containing subscriber identifiers as part of normal service records, do not contain information or markers that reveal LI surveillance activity. Pre-Conditions: 1. LI provisioning is active for a target identifier in the system under test. 2. General-purpose logging (e.g., network event logs, call detail records, session initiation logs) is enabled and accessible to administrators without LI clearance. 3. The target subscriber initiates communication (e.g., call setup, session initiation, messaging). Execution Steps: 1. Provision a target identifier for interception in the LI system. 2. Have the target subscriber initiate multiple communications (e.g., calls, sessions, messages). 3. Collect general-purpose logs generated during these communications. 4. Inspect logs for signs of surveillance context, such as: a) Explicit LI-related flags, tags, or annotations. b) Error messages referencing LI functions. c) Duplicated or anomalous log entries indicating redirection or duplication of traffic. 5. Compare log entries of intercepted subscriber activity with log entries of non-intercepted subscribers for consistency. Expected Results: 1. General-purpose logs contain only routine identifiers and service-related information (e.g., IMSI, MSISDN, session IDs). 2. No indication is present that the subscriber is under interception (no LI flags, tags, error codes, or, particularly, duplicate entries). 3. Log patterns for intercepted subscribers are indistinguishable from non-intercepted subscribers. 4. Surveillance-related records are only present in LI-protected audit logs. Expected Evidence: 1. Copies of general-purpose logs showing intercepted and non-intercepted subscriber activities. 2. Annotated analysis demonstrating that intercepted subscriber logs do not reveal surveillance status. 3. Copy of LI-protected logs showing that surveillance records are confined to the restricted LI audit domain. 4. Plain-language conclusion confirming that LI activity remains undetectable in general-purpose logs.
cf76cbf41e68a296435512370813ffeb
33.129-1
6.1.1.14 Log Segregation
Requirement Name: Segregation of LI Logging Requirement Reference: TS 33.126: R6.6 - 30 Undetectability by Non-Authorized Parties Requirement Description: LI audit and operational logs must be segregated from all non-LI logging subsystems. Access to LI logs must be restricted to LI-cleared personnel only. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: AT-INTERNAL-01 Threat reference: TBD Test Case: Test Name / ID: TC_LI_LOG_SEGREGATION Purpose: Validate that the LI logging subsystem is logically and physically segregated from non-LI (general purpose) logs, ensuring that LI log data cannot be accessed through non-LI interfaces or roles. Pre-Conditions: 1. LI subsystem is deployed and active. 2. General-purpose system logging (e.g., syslog, journald, platform management logs) is operational. 3. LI-specific logging facility is configured and accessible only to LI-cleared roles. 4. Test operators possess two distinct roles: one LI-cleared and one non-cleared administrative account. Execution Steps: 1. Generate LI-related events (e.g., provisioning, activation, LI delivery errors). 2. Generate non-LI system events (e.g., user login, system health checks, configuration updates). 3. Collect logs from both the LI logging subsystem and the general logging subsystem. 4. Attempt to access LI logs using the non-cleared administrator role. 5. Verify log storage segregation (e.g., separate file paths, databases, log streams). 6. Inspect general logs for any LI log entries, references, or cross-linkages. Expected Results: 1. LI log data is stored in a distinct, access-controlled subsystem. 2. LI logs are not visible through general log collectors, APIs, or management tools. 3. Non-LI logs do not contain pointers, cross-references, or metadata revealing LI activity. 4. Access attempts to LI logs by non-cleared roles are denied and auditable. Expected Evidence: 1. Copies of LI and non-LI log directories or service configuration showing segregation. 2. Access-control matrix demonstrating that only LI-cleared roles can access LI logs. 3. Screen captures or outputs of denied access attempts from non-cleared accounts. 4. Plain-language conclusion confirming effective segregation of LI and non-LI logging domains. Annex <A> (normative): <Normative annex for a Technical Specification> Start each annex on a new page. Annexes are labelled A, B, C, etc. and designated either "normative" or "informative" depending on their content. Normative annexes only to appear in Technical Specifications. Use style "Heading 8". Annex <B> (informative): Vulnerability/Compromise Spectrum B.1 Vulnerability/Compromise Spectrum Table B.1-1: Vulnerability/Compromise Spectrum Code Name Description Notes Test IDs Failed Criticality (None, Low, Medium, High, Critical) 1 LI capability exists The presence of an installed LI capability was detected. e.g., on disk, but not running 2 LI capability characterization Capabilities of the installed LI function were extracted. e.g., capacity numbers, in terms of targets provisionable or bandwidth available for LI 3 LI running state detection Detected that LI is currently running on the Target of Evaluation (TOE).   4 LI running instance characterization Capabilities of the running instance of LI were extracted, such as number of targets provisionable, etc. e.g., number of current taps 5 LI running state manipulation LI was either started or stopped against normal procedures.   6 LI topology Extracted network/physical location of other functions that may (do?) contain LI capability. e.g., information about other POIs, MDFs, ADMFs, or even LEMFs 7 Target ID extracted A (any) target ID was extracted. without a priori choice of target 8 Specific target ID detected A specific target ID was detected on the TOE. with a priori choice of target 9 IRI extracted IRI was extracted pertaining to any current target ID on the TOE. without a priori choice of target 10 Content extracted Content was extracted pertaining to any current target ID on the TOE. without a priori choice of target 11 Specific target IRI extracted IRI was extracted pertaining to a specific target ID on the TOE. with a priori choice of target 12 Specific target content extracted Content was extracted pertaining to a specific target ID on the TOE. with a priori choice of target 13 One new target was inserted A new target inserted outside normal procedures.   14 Multiple targets inserted More than one target inserted outside normal procedures. pathway to LI DOS 15 Full target list extracted A complete list of target IDs on the TOE was extracted.   16 IRI of all targets extracted IRI pertaining to all targets was extracted.   17 Content of all targets extracted Content pertaining to all targets was extracted.   18 Control of non-LI functionality achieved through LI entry Control of TOE functionality outside LI was achieved.     Editor's notes (Apr 7 call): * Add DELETION (targets, IRI, content), * modify (INSERT/DELETE) delivery endpoints * insert before 7: access/token compromise/privilege escalation EDITORS NOTES: Parking Lot 0. Find a way to publish an implementation/configuration guide to state "the obvious", e.g. 33.128 Annex, or its own document, etc. 1. Think about a test for trust domain crossing. If a (non-LI) network function is required to take some action on behalf of LI and does not have a POI, this creates a security concern. 2. Test that POI code and data are not accessible from outside the enclave. 3. Inter-LEA confidentiality. Is there a way to test it explicitly, or do we rely on inference from a subset of tests. Annex <C>: <Informative annex title for a Technical Report> Informative annexes in Technical Reports do not use "(informative") in the title, since all annexes in TRs are informative. Use style "Heading 9" in TRs. Annex <D> (informative): Bibliography Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs. The Bibliography is optional. If it exists, it shall follow the last technical annex in the document. The following material, though not specifically referenced in the body of the present document (or not publicly available), gives supporting information. Bibliography format <Publication>: "<Title>". Annex <E> (informative): Index Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs. The Index is optional. If it exists, it shall immediately precede the Changes history annex. Generate the index using MS Word's index field feature. Annex <F> (informative): Change history Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs. This is the last annex for TS/TSs which details the change history using the following table. This table is to be used for recording progress during the WG drafting process till TSG approval of this TS/TR. For TRs under change control, use one line per approved Change Request Date: use format YYYY-MM CR: four digits, leading zeros as necessary Rev: blank, or number (max two digits) Cat: use one of the letters A, B, C, D, F Subject/Comment: for TSs under change control, include full text of the subject field of the Change Request cover New vers: use format [n]n.[n]n.[n]n Change history Date Meeting TDoc CR Rev Cat Subject/Comment New version 2025-07 SA3#98-LI s3i250357 - - - First introduction of the baseline to the group. 0.0.8
6487dfe513b60123776855ad6d67a5a9
30.801
1 Scope
This permanent document describes the principle and the working method of the Inter Group Co-ordination ad-hocs (IGCs), the scope, reference and output of each individual IGC and the overall time plan.
6487dfe513b60123776855ad6d67a5a9
30.801
2 Working method of the technical Inter-Group Co-ordination ad-hocs (IGCs)
TSG-SA has a responsibility of technical co-ordination within 3GPP. TSG-S2 has been allocated a task to divide the feature descriptions defined by TSG-S1 to a Building blocks or Work packages based on System architecture and elaborate a project plan. Therefore Inter Group Co-ordination ad-hocs (IGCs) are created. The outcome of the IGCs should be a draft 3GPP wide project plan for each feature, defining the work that is needed and proposing the responsible WGs/TSGs and a time schedule. These draft project plans will become 3GPP project plans after they have been approved by all relevant WGs/TSGs and finally by TSG-SA. The project plans will be elaborated with all concerned working group of the technical subject, where from each working group a contact person is nominated. The task of the IGCs is not to perform any technical work of substance on the technical issue (e.g. as architectural work). The method of working of the IGC meetings shall be mainly by email or tele-conferencing. For each IGC, a permanent document is maintained comprising • Work identified to fullfill the requirements • List of all the deliverables applicable to the subject Note that a deliverable can be applicable to more than one technical project co-ordination subject • Time plan for Release 99 and subsequently for future releases.
6487dfe513b60123776855ad6d67a5a9
30.801
3 List of IGCs
0 General Coordinator: Alain Sultan, MCC (alain.sultan@etsi.fr) Site: ftp://ftp.3gpp.org/TSG_SA/WG2_Arch/IGC 1 Bearer Services and QoS Chair: Oscar Lopez-Torres, T-Mobil (Oscar.Lopez@t-mobil.de) Site: ftp://ftp.3gpp.org/TSG_SA/WG2_Arch/IGC/Bearer&QoS reflector address: 3GPP_TSG_SA_IGC_Bearer&QoS@list.etsi.fr 2 GSM/UMTS Interoperation and Mobility Management Chair: François Courau, Alcatel (francois.courau@alcatel.fr) Site: ftp://ftp.3gpp.org/TSG_SA/WG2_Arch/IGC/GUinterop&MM reflector address: 3GPP_TSG_SA_IGC_GUinterop&MM@list.etsi.fr 3 Location based services (LCS) and Cell Broadcast Services (CBS) Chair: - LCS: Jan Kåll, Nokia (jan.kall@NOKIA.COM) - CBS: Martin Güntermann, Mannesmann Site: ftp://ftp.3gpp.org/TSG_SA/WG2_Arch/IGC/LCS reflector address: 3GPP_TSG_SA_IGC_LCS@list.etsi.fr 4 Packet Architecture and Circuit Architecture Chair: Ulrich Dropmann, Siemens (Ulrich.Dropmann@ICN.SIEMENS.DE) Site: ftp://ftp.3gpp.org/TSG_SA/WG2_Arch/IGC/PS&CS reflector address: 3GPP_TSG_SA_IGC_PS&CS@list.etsi.fr 5 Security Chair: Chris Pudney, Vodafone (chris.pudney@VF.VODAFONE.CO.UK) Site: ftp://ftp.3gpp.org/TSG_SA/WG2_Arch/IGC/Security reflector address: 3GPP_TSG_SA_IGC_Security@list.etsi.fr 6 Services and Service platforms Chair: Rob Schmersel, Ericsson (Rob.Schmersel@era.ericsson.se) Site: ftp://ftp.3gpp.org/TSG_SA/WG2_Arch/IGC/Services reflector address: 3GPP_TSG_SA_IGC_Services@list.etsi.fr
6487dfe513b60123776855ad6d67a5a9
30.801
4 Scope of the IGCs
6487dfe513b60123776855ad6d67a5a9
30.801
4.1 Bearer Services and QoS
[editor's note: the scope has to be revised to reflect more clearly that the IGC is only supervising the groups and not providing the actual technical work] The scope is to provide a consistent definition of the Services and Bearer Services mapping throughout the system: UMTS bearers, bearer management in the control and user planes, for the circuit switched and packet domains. Regarding QoS, the scope is to provide a comprehensive QoS model and mapping of parameters for the different interfaces, reference points, and layers (a two-dimensional approach) throughout the system.
6487dfe513b60123776855ad6d67a5a9
30.801
4.2 GSM/UMTS Interoperation and Mobility Management
[editor's note: to be further elaborated by the IGC chairman] Consistent UMTS/GSM interoperation Mobility handling within the system, RRC and MM interaction, MAP, consistent mobility management
6487dfe513b60123776855ad6d67a5a9
30.801
4.3 Location based services (LCS) and Cell Broadcasting Services(CBS)
The UMTS LCS and CBS inter group co-ordination ad hoc group shall co-ordinate the work on location services in UMTS and ensure that all 3GPP groups relevant for location services get involved in a timely manner. The ongoing work in T1P1.5 on GSM LCS Phase II shall be taken in account as well. The UMTS LCS and CBS inter group co-ordination ad hoc group shall also co-ordinate the work on cell broadcasting services in UMTS and ensure that all 3GPP groups relevant for cell broadcasting services get involved in a timely manner. The LCS and CBS ad hoc group shall evaluate the UMTS location services and cell broadcast services in order to identify what issues are to be standardized and what are the appropriate Work Groups for this and set up a time plan for the work. The Location services feature in UMTS is mainly a release 2000 issue, but the LCS and CBS ad hoc shall also seek to identify what LCS system functions should be included in Release 99 and the affected WGs and specifications. The Cell Broadcast Service (CBS) is a release 99 requirement and shall be provided seamlessly (as far as the user or the users terminal equipment is concerned) across the UMTS and GSM network in order to guarantee the continuity of the corresponding GSM services in UMTS. LCS and CBS ad hoc reports to TSG SA WG2.The UMTS LCS IGC shall coordinate the work on location services in UMTS and ensure that all 3GPP groups relevant for location services get involved in a timely manner. The ongoing work in T1P1.5 on GSM LCS Phase II shall be taken in account as well. The LCS IGC shall evaluate the UMTS location services in order to identify what issues are to be standardized and what are the appropriate Work Groups for this and set up a time plan for the work. LCS in UMTS is mainly a release 2000 issue, but the LCS IGC ad hoc shall also seek to identify what LCS system functions should be included in Release 99 and the affected WGs and specifications. LCS IGC ad hoc reports to TSG SA WG2. Locationing and the location based services shall be considered.
6487dfe513b60123776855ad6d67a5a9
30.801
4.4 Packet Architecture and Circuit Architecture
The technical scope of the “packet and circuit architecture IGC” is to work on the architecture of the packet and circuit domain and protocols. It contains the following main areas: 1. The identification of new entities and interfaces of the overall system architecture 2. The determination of the principle protocol stacks of the user and control plane 3. Call control/session management related control plane issues Examples of issues are of the area of “packet and circuit architecture” are (without indication of whether R99 and R00 issue): • Multimedia architectural issues • Multicall issues • Location of the transcoder in the core network • Identification of new interworking scenarios • Evolving interworking functions to other networks • Control plane architecture of the UTRAN Not part of the “packet and circuit architecture” area are architectural questions clearly associated with one of the other technical areas (Location Based Services, Services and Service platforms, Mobility Management&GSM/UMTS interoperation, Security, Bearer&QoS). The IP/packet domain architecture and protocols The PSTN/ISDN domain architecture and protocols
6487dfe513b60123776855ad6d67a5a9
30.801
4.5 Security
This ad hoc group is intended to produce, maintain and monitor the work plan for the delivery of a consistent security specifications for release 99. The work items being progressed in TSG-S3 are listed in the table below. Each work item addresses a particular security issue and is assigned a particular priority which includes whether or not the feature or mechanism should be specified in Release 99. This table is an updated version of a table presented to TSG-S#4 in Tdoc SP-99284. Table 2 : Priorities of security work items assigned by TSG-S3 Work item Priority 1 User identity confidentiality The specification of an enhanced mechanism to help guard against active attacks against user identity confidentiality on the radio interface is essential in R99. Note that only the transport mechanism needs to be specified. The exact mechanism to protect the user identity can be home operator dependent. The specification of algorithm requirements and interfaces is also essential for R99, although the algorithms themselves can be home operator dependent and do not need to be specified. 2 Authentication and key agreement The specification of an enhanced mechanism to help guard against active attacks on the radio interface is essential for R99. Furthermore, the specification of algorithm requirements and interfaces is also essential for R99, although the algorithms themselves can be home operator dependent and do not need to be specified. 3 Access link integrity protection This is a new security mechanism in UMTS introduced to help guard against active attacks on the radio interface. The specification of the message authentication mechanism is essential in R99. 4 Access link confidentiality The GSM ciphering mechanism cannot be used in the new access network and the GSM algorithms are unsuitable. The specification of a new ciphering mechanism and algorithm is essential in R99. 5 Network-wide encryption Appropriate ‘hooks’ must be provided in the R99 specification so that network-wide encryption can be introduced in later releases. It may be possible to re-use the algorithm for ciphering in the UTRAN. If a new algorithm is required then its specification can be left to later releases providing that appropriate ‘hooks’ are incorporated into the R99 specification. 6 User equipment identification TSG-S have recommended that TSG-S3 specify a secure mechanism in R99. The mechanism will require manufacturers to secure terminal identities and associated authentication data. 7 Core network signalling security Although this is a high priority item, it is recognised that implementable specifications might not be achievable in R99. A cipher algorithm designed by ETSI SAGE for this purpose called BEANO is already available. Off-the-shelf algorithms are likely to be suitable for the message authentication functions. 8 Fraud information gathering system The GSM mechanism can be used. Enhancements will be considered in later releases. 9 USIM application security The GSM mechanisms can be used. Enhancements will be considered in later releases. 10 Visibility and configurability An encryption indicator should be included in R99. Other items are of lower priority and will be considered in later releases. 11 Mobile Execution Environment Security The GSM mechanisms will be enhanced in R99. 12 Location services Specification of privacy mechanism is essential in R99. Can be largely based on GSM Location Services privacy mechanisms. 13 Lawful interception architecture The specification of a lawful interception architecture is essential in R99. This architecture can be largely based on the GSM/GPRS architecture. 14 IP security Impact not fully understood. Priority is unclear. Owing to the requirements for both CS and PS ‘handover’ between UMTS and GSM and to the requirements to be able to perform roaming between GSM and UMTS networks, for all these items, dual mode UMTS/GSM operational aspects need to be considered. Consistent security architecture
6487dfe513b60123776855ad6d67a5a9
30.801
4.6 Services and Service platforms
The 3GPP Services and Service Platforms IGC is responsible for the following activities: • establish a common understanding in 3GPP of the VHE and OSA work to be carried out for stage2 and 3 in 3GPP Release99; • identify the appropriate working groups for carrying out the VHE and OSA work and ensure these groups get involved in a timely manner; • coordinate the work on VHE and OSA in 3GPP;establish a time plan for the work. WAP, VHE, Camel, OSA, Mexe, the consistent service and service generation platform concept
6487dfe513b60123776855ad6d67a5a9
30.801
5 Overall time plan
[Ed. note: scope to be provided by the rapporteur] Meeting Date Activity SA2#9 October 25-29, 1999 Define overall workplan. Start work on identifying requirements and issues related to architectural and functional aspects as compared to R99 (TR 23.ywz) SA2#10 Nov 29 –Dec 3, 1999 Identify additional requirements from architectural and functional aspects as compared to R99 (TR 23.ywz). Start definition of R00 documents. SA1#6 Nov 29 - Dec 3, 1999 Start work on R00 Stage 1 SA#6 December 15-17, 1999 R99 finalized. SA2#11 January 24-28, 2000 Refined version of TR. Review draft Stage 1 description. Start Project Plan work. Continue definition of R00 documents. SA1#7 Feb 7-11, 2000 Refine R00 stage 1. SA2#12 March 6-9, 2000 TR v 1.0.0. Review R00 Stage 1 description . Continue Project Plan work. Finilize definition of R00 documents. Based on the TR, start the CR process for S2’s technical specifications. SA#7 March 15-17, 2000 R00 Stage 1 stable. SA2#13 May 22-26, 2000 Work on TR discontinued. Finalize Project Plan work. Finalize definition of R00 documents. Continue the CR process. SA#8 June 21-23, 2000 R00 Stage 2 at least 80% complete. Project Plan approved. Definition of R00 documents approved. SA2#14 September 4-8, 2000 Finilize R00 Stage 2 work. SA#9 September 27-29, 2000 R00 work approved. SA2#15 November 13-17, 2000 Start R01 work. SA#10 December 13-15, 2000 R00 approved.
6487dfe513b60123776855ad6d67a5a9
30.801
6 Change history
Version Date Subject/Comments 0.0.0 July 1999 Creation of document 0.1.0 August 1999 Inclusion of comments from SA2#7 0.2.0 September, 4th 1999 Inclusion of results from SA2#8: addition of scope of IGC Security, Bearer and QoS, PS and CS architecture, Services and Service Platform, LCS. 0.3.0 September, 23rd 1999 Addition of the chapter 3, deletion of the Annex on "Proposed Structure for all Inter Group Co-ordination work plans" 1.0.0 October, 7th 1999 Prepared for presentation to TSG SA#5 (content identical to v.0.0.3, except for some minor editorial corrections) 1.1.0 December, 2nd 1999 Addition of Overall time plan (as agreed in S2-99C16) and incorporation of BCS material
c3e756be2cf10e873aefa14b6b740064
30.504
3 Indicates TSG approved document under change control.
y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the specification; 2 Introduction The present document shall provide a work plan and study items as agreed within the 3GPP TSG RAN working group 4. For the FDD mode, as proposed in the input paper of R4-99160 the items shown in that document absolutely need to be finalised by the Japanese regulatory organisation, Telecommunications Technical Council of Japan, by the end of June 1999 so that MPT will be able to legislate on schedule for the regulation for the 3G system of Japan. For the TDD mode, some deviations in achieving the intermediate milestones are shown, compared to FDD. However, it is strictly intended to have the same final milestone kept for TDD as for FDD.. 3 Meeting Schedule The milestones used in this document are based on the following meeting schedule. Year 1999 WG4 #4 : May 10 – May 12, Kista Stockholm, Sweden WG4 #5 : June 14 – June 16, Miami Florida, USA RAN #4 : June 17 – June 18, ditto WG4 #6 : July 26 – July 29, South Queensferry Scotland, UK WG4 #7 : September 7 – September 10, Makuhari Chiba, Japan RAN #5 : October 6 – October 8, Kyongju, Korea WG4 #8 : October 26 – October 29, Sophia Antipolis, France WG4 #9 : December 6 7 – December 910, Bath, UK RAN #6 : December 15 13 – December 1715, Sophia AntipolisNice, France Year 2000 WG4 #10 : January 18 – January 21, San Jose, California, USA WG4 #11 : February 28 – March 3, TBD RAN #7 : March 13 – March 15, Madrid, Spain WG4 #12 : May 22 – May 26, TBD RAN #8 : June 19 – June 21, Dusseldorf, Germany WG4 #13 : September 11 – September 16, TBD RAN #9 : September 25 – September 27, TBD WG4 #14 : November 27 – November 30, TBD RAN #10 : December 11 – December 13, TBD, USA Note that some of the future meetings have been re-scheduled. 4 Work Plan Table 4 shows the agreed work plan for the TSG RAN WG4 and document status as well as of the issuance of this document. Table 4:Work Plan Specification number WG4 #4 WG4 #5 RAN #4 WG4 #6 WG 4 #7 RAN #5 WG4 #8 WG4 #9 RAN #6 Remarks 25.101 - UE TX & RX (FDD) 1 2 3 25.104 - BTS TX & RX (FDD) 1 2 3 25.102 - UE TX & RX (TDD) 1 2 3 (1) 25.105 - BTS TX & RX (TDD) 1 2 3 (1) 25.103 - RF parameters 1 2 3 (2), (3) 25.133 - Support of RF parameters in Radio Resource Management (FDD) 2 3 (3) 25.123 - Support of RF parameters in Radio Resource Management (TDD) 2 3 (3) 25.141 - BS Conformance Test (FDD) 1 2 3 25.142 - BS Conformance Test (TDD) 1 2 3 25.113 - BS EMC 1 2 3 (2) 25.941 - Document Structure 1 2 3 25.942 - RF System Scenarios 1 2 3 Notes: • 1 means the document is agreed as version 1.0.0 at RAN WG4 • 1 (underlined) means the document has already been agreed as version 1.0.00 at RAN WG4 • 2 means the document is agreed as version 2.0.0 at RAN WG4 • 2 (underlined) means the document has already been agreed as version 2.0.0 at RAN WG4 • 3 means the document is approved as version 3.0.0 at TSG RAN • 3 (underlined) means the document has already been approved as version 3.0.0 at TSG RAN • The version numbers must be understood based on the explanation in the section 8 “Document/version numbering” of the Report of the TSG-RAN meeting #3 [RP-99305]. (1) Milestone for version 3 has been brought in to be in line with PCG#2(99)21 in ver 1.1.0. (2) (2) Agreed at the WG4 #7 meeting to push back the milestone for version 3 as seen in the table. (3) Agreed at the WG4 #8 meeting to split 25.103 into two separate specifications, which are 25.133 for FDD and 25.123 for TDD. 5 Study Item A table “Study Items for 25.xyz” shows all the items that have not been agreed or are tbd in that particular document as of the issuance of this 30.504 document. A mark X indicates that the marked item needs to be agreed and fixed by the indicated milestone. Moreover, X-marked milestones for the FDD mode are absolute deadlines. 5.1 25.101 (UE TX & RX for FDD) Table 5-1 shows the agreed study items for the 25.101 specification document. Table 5-1:Study Items for 25.101 Items WG4 #4 WG4 #5 RAN #4 WG4 #6 WG 4 #7 RAN #5 WG4 #8 WG4 #9 RAN #6 Remarks Frequency Bands and Channel Assignment • TX-RX frequency separation X TX characteristics • Max output power X • Closed loop power control in DL X • Power control steps X • Adjacent Channel Leakage Ratio (ACLR) X (1) • Modulation Accuracy X • Peak code Domain error X RX characteristics • Static reference sensitivity level X • Maximum input level X • Adjacent Channel Selectivity (ACS) X • Blocking characteristics X • Spurious response X • Intermodulation characteristics X Performance Requirement • Test Environment (Packet switched data) X • Demodulation in non fading channel X • Demodulation of DTCH X • Inter-cell Soft Handover X • RX Synch. Characteristics X • Timing Characteristics X Notes: • (1) Milestone was moved from WG4 #4 to WG4 #5 in ver 0.0.2. 5.2 25.104 (BTS TX & RX for FDD) Table 5-2 shows the agreed study items for the 25.104 specification document. Table 5-2:Study Items for 25.104 Items WG4 #4 WG4 #5 RAN #4 WG4 #6 WG 4 #7 RAN #5 WG4 #8 WG4 #9 RAN #6 Remarks Frequency Bands and Channel Assignment • TX-RX frequency separation X TX characteristics • BS Max output power X Extreme conditions • Frequency Stability X • Output Power Dynamics X • Adjacent Channel Leakage Ratio (ACLR) X • Spurious Emissions X • Transmit Intermodulation X • Modulation Accuracy X • Peak code Domain error X RX characteristics • Reference Sensitivity level X • Maximum frequency Deviation for Receiver Performance X • Dynamic Range X • Adjacent Channel Selectivity (ACS) X • Blocking characteristics X • Spurious response X • Intermodulation characteristics X • Spurious Emissions X Performance Requirement • Performance in AWING Channel X • Performance in Multipath Fading Channels X 5.3 25.102 (UE TX & RX for TDD) Table 5-3 shows the agreed study items for the 25.102 specification document. Table 5-3:Study Items for 25.102 Items WG4 #4 WG4 #5 RAN #4 WG4 #6 WG 4 #7 RAN #5 WG4 #8 WG4 #9 RAN #6 Remarks Frequency Bands and Channel Assignment • Frequency Bands X TX characteristics • Max output power X • UE frequency stability X • Open loop power control UL X • Closed power control UL X • Power control steps X • Power control cycles per second X • Minimum transmit output power X • Transmit on/off ratio/DTX X • Adjacent Channel Leakage Ratio (ACLR) X • Transmit intermodulation X • Modulation Accuracy X RX characteristics • Static reference sensitivity level X • Maximum input level X • Adjacent Channel Selectivity (ACS) X • Blocking characteristics X • Spurious response X • Intermodulation characteristics X • Spurious emissions X Performance Requirement • Test Environment X • Demodulation in non fading channel X • Demodulation of PCH/FACH/DTCH X • Multi-Link Performance X • RX Synch. Characteristics X • Interfrequency handover X • Timing Requirements X 5.4 25.105 (BTS TX & RX for TDD) Table 5-4 shows the agreed study items for the 25.105 specification document. Table 5-4:Study Items 25.105 Items WG4 #4 WG4 #5 RAN #4 WG4 #6 WG 4 #7 RAN #5 WG4 #8 WG4 #9 RAN #6 Remarks Frequency Bands and Channel Assignment • Frequency Bands X TX characteristics • Max output power X Extreme Conditions • UE Frequency Stability X • Open Loop Power Control UL X • Closed Power Control UL X • Power control steps X • Power Control Steps per Second X • Minimum Transmit Output Power X • Transmit on/off ratio/DTX X • Adjacent Channel Leakage Ratio (ACLR) X • Intermodulation Characteristics X • Modulation Accuracy X RX characteristics • Static reference sensitivity level X • Maximum input level X • Adjacent Channel Selectivity (ACS) X • Blocking characteristics X • Spurious response X • Intermodulation characteristics X • Spurious Emissions X Performance Requirement • Test Environment X • Demodulation in non fading channel X • Demodulation of PCH/FACH/DTCH X • Multi-Link Performance X • RX Synch. Characteristics X • Interfrequency handover X • Timing Characteristics X 5.5 25.103 (RF Parameters) Table 5-5 shows a first draft proposal for an updated version of study items for the 25.103 specification document. Table 5-5:Study Items for 25.103 Items WG4 #4 WG4 #5 RAN #4 WG4 #6 WG 4 #7 RAN #5 WG4 #8 WG4 #9 RAN #6 Remarks Idle Mode Tasks (FDD) Cell Selection Scenario • Cell selection delay – Text X • Cell selection delay - Value X Cell Re-Selection Scenario • Cell re-selection delay – Text X • Cell re-selection delay – Value X • Cell List Size – Text X • Cell List Size – Value X • Maximum number of cells to be monitored – Text X • Maximum number of cells to be monitored – Value X • Cell Re-selection reaction time – Text X • Cell Re-selection reaction time – Value X RF Parameters used for Cell Re-Selection X PLMN Selection and Re-Selection Scenario – Text X PLMN Selection and Re-Selection Scenario – Values X Location Registration Scenario – Text X Location Registration Scenario – Values X Idle Mode Tasks (TDD) Cell Selection Scenario • Cell selection delay – Text X • Cell selection delay - Value X Cell Re-Selection Scenario • Cell re-selection delay – Text X • Cell re-selection delay – Value X • Cell List Size – Text X • Cell List Size – Value X • Maximum number of cells to be monitored – Text X • Maximum number of cells to be monitored – Value X • Cell Re-selection reaction time – Text X • Cell Re-selection reaction time – Value X • RF Parameters used for Cell Re-Selection X PLMN Selection and Re-Selection Scenario – Text X PLMN Selection and Re-Selection Scenario – Values X Location Registration Scenario – Text X Location Registration Scenario – Values X RRC Connection Mobility Handover 3G to 3G FDD Soft/Softer Handover • Maximum number of cells to be monitored – Text X • Maximum number of cells to be monitored – Value X • Measurement reporting delay – Text X • Measurement reporting delay – Value X • Active set dimension – Text X • Active set dimension – Value X • Active set update time interval – Text X • Active set update time interval – Value X • Frame offset Measurement Accuracy – Text X • Frame offset Measurement Accuracy – Value X FDD Inter-Frequency Handover • Maximum number of cells/frequencies to be monitored – Text X • Maximum number of cells/frequencies to be monitored – Value X • Measurement reporting delay – Text X • Measurement reporting delay – Value X • Frame offset Measurement Accuracy – Text X • Frame offset Measurement Accuracy – Value X FDD/TDD Handover • Requirements –Text X • Requirements - Values X • RF Parameters X TDD/TDD Handover • Requirements –Text X • Requirements- Values X • RF Parameters X Radio Link Management Link adaptation • Link adaptation delay minimum requirement – Value X • Link adaptation accuracy minimum requirement – Value X Cell Update X URA Update X Admission Control (FDD) X Admission Control (TDD) X Radio Access Bearer Control (FDD) X Radio Access Bearer Control (TDD) X Dynamic Channel Allocation (FDD) X Dynamic Channel Allocation (TDD) X Radio Link Surveillance (FDD) X Radio Link Surveillance (TDD) X Radio Link Measurement Requirements – Text X Radio Link Measurement Requirements – Values X Radio Link Failure Requirements – Text X Radio Link Failure Requirements – Values X [Editor’s note: The above table was developed by the editor of the TS 25.103.] 5.6 25.141 (BS Conformance Test for FDD) Table 5-6 shows the identified study items for the 25.141 specification document. Table 5-6:Study Items for 25.141 Items WG4 #4 WG4 #5 RAN #4 WG4 #6 WG 4 #7 RAN #5 WG4 #8 WG4 #9 RAN #6 Remarks General test conditions and declarations • BTS Configurations X Transmitter • Base station maximum output power X • Frequency stability X • Clock Frequency accuracy X • Output power dynamics X • Transmitted RF carrier power versus time X • Output RF spectrum emissions X • Transmit intermodulation X Receiver characteristics • General X • Test conditions and measurement methods X • Dynamic range X • Adjacent Channel Selectivity (ACS) X • Blocking characteristics X • Spurious response X • Spurious emissions X Performance requirement • BS Dynamic reference sensitivity performance X [Editor’s note: The above table was developed by the editor based on the open item list included in TS 25.141 V1.0.4.] 5.7 25.142 (BS Conformance Test for TDD) Table 5-7 shows the identified study items for the 25.142 specification document. Table 5-7:Study Items for 25.142 Items WG4 #4 WG4 #5 RAN #4 WG4 #6 WG 4 #7 RAN #5 WG4 #8 WG4 #9 RAN #6 Remarks Transmitter characteristics • Maximum output power X • Frequency stability X • Output power dynamics X • Transmitted ON/OFF ratio X • Output RF spectrum emissions X • Transmit intermodulation X • Modulation accuracy X Receiver characteristics • Reference sensitivity level X • Dynamic range X • Adjacent Channel Selectivity (ACS) X • Blocking characteristics X • Spurious response X • Intermodulation characteristics X • Spurious emissions X • Timing advance (TA) requirements X Performance requirement • Dynamic reference sensitivity performance X [Editor’s note: The above table was developed by the editor of the TS 25.142.] 5.8 25.113 (BS EMC) Table 5-8 shows the identified study items for the 25.113 specification document. Table 5-8:Study Items for 25.113 Items WG4 #4 WG4 #5 RAN #4 WG4 #6 WG 4 #7 RAN #5 WG4 #8 WG4 #9 RAN #6 Remarks Definitions, symbols and abbreviations • Definition of: Loss of service & Loss of call X • Definition of:Transient phenomena & Continuous phenomena X Test Conditions X Performance Assessment X Performance Criteria • Number of tests X • Self recovery X Applicability Overview X [Editor’s note: The above table was developed by the editor based on the open item list included in TS 25.113 V1.1.1.] 6 Open Item for Release 1999 A table in the following sub-sections shows all the open items that have been agreed in each specification document as of the issuance of the most updated documents. The contents are subject to change depending on further studies. 6.1 TS25.101 (UE TX & RX for FDD) Table 6-1 shows the identified open items for the 25.101 specification document. Table 6-1:Open Items for 25.101 Section number Section description Status 3.1 Definitions Definition of average power …. 5.2 Frequency bands The deployment of TDD in the 1920 MHz to 1980 MHz band is an open item 6.6.2.2 Adjacent Channel Leakage power Ratio (ACLR) The possibility is being considered of dynamically relaxing the ACLR requirements for User Equipment(s) under conditions when this would not lead to significant interference (with respect to other system scenario or UMTS operators). This would be carried out under network control, primarily to facilitate reduction in UE power consumption. 6.4.2.1.1 Power control steps minimum requirement The timing requirement for power control steps is FFS 6.4.2.1.1 Power control steps minimum requirement The current text does not cover the case where a power command is a multiple of the step size defined in 6.4.3 RAN WG1 is currently; • Analyzing the benefits of introduction of smaller step sizes (<1 dB>as an option • Investigating the benefits of emulated step size which imply that changes in the output power occurs at a rate lower than the one defined in 6.4.5 6.8.3 Peak code domain error Outstanding 7 Receiver characteristic All tables need change due to harmonization and changes to the downlink measurement channels in measurement. Note that the requirements are unchanged. 6.2 TS25.104 (BTS TX & RX for FDD) Table 6-2 shows the identified open items for the 25.104 specification document. Table 6-2:Open Items for 25.104 Section number Section description Status 6.2.1 Base station max output power Minimum requirement in extreme conditions is ffs. 6.3 Frequency accuracy Should there also be an accuracy requirement on the clock rate? Alternatives are to either tie the clock rate to the frequency accuracy or to have a separate clock rate requirement. 6.4.2 Power control dynamic range The need for this parameter to be specified should be confirmed. The power control dynamic range necessary as a minimum requirement needs to be reviewed. 6.4.3 Total power dynamic range The total power dynamic range necessary as a minimum requirement needs to be reviewed. 6.4.5 Primary CPICH power Value is TBD. Details of the path loss estimation method is under study in WG1. 6.6.1 Occupied bandwidth Measurement bandwidth for the total integrated power is ffs. Is this section still required? 6.6.2.3 Protection outside a licensee’s frequency block This requirement needs to be reviewed in content and application, since it is a regional requirement (FCC part 24.) The current text is based closely on FCC part 24. It may be possible to clarify the requirement (to allow more consistent testing) by including parameters which are specific to UTRA, including: • defining requirement as an absolute value. • Defining the minimum carrier spacing from the edge of the licensee’s frequency block. • Defining the –26dB bandwidth of the emission. Defining the resolution bandwidth in the first 1MHz (the requirement would appear to be about 45kHz or greater; is it possible to perform this measurement with this value of resolution bandwidth?) 6.6.3.3.2 Co-existence with GSM 900; co-located base stations Scenario calculations should be performed to confirm the requirement, currently –[98]dB. 6.6.3.4.2 Co-existence with DCS 1800; co-located base stations Scenario calculations should be performed to confirm the requirement, currently –[98]dB. 6.8.2 Modulation accuracy Further consideration is needed, especially for the multicode case. 6.8.3 Peak code domain error The requirement is ffs. 7.1 General Definition of requirements for antenna diversity is ffs. 7.3 Dynamic range The requirement (BER/FER, value and channel type) is ffs. The effect of applying mast head LNAs to the dynamic range specification is ffs. 8 Performance requirement Values are TBD. Requirements for BS without dual receiver diversity is ffs. 6 or 8 Transmit diversity Specification text for SSDT requirement is needed, unclear in what section or possibly in TS 25.103. 6.3 TS25.102 (UE TX & RX for TDD) Table 6-3 shows the identified open items for the 25.102 specification document. Table 6-3:Open Items for 25.102 Section number Section description Status 3 Definitions, Symbols, Abbreviations Update required 5.2 Frequency bands The deployment of TDD in the 1920 MHz to 1980 MHz band is an open item. 6.6.2.2.1 ACLR, Minimum requirement The possibility is being considered of dynamically relaxing the ACP requirements for User Equipment(s) under conditions when this would not lead to significant interference (with respect to other system scenario or UMTS operators). This would be carried out under network control, primarily to facilitate reduction in UE power consumption. 6.7.2.1 Spectrum emission mask Requirements for other than UE power class 21dBm 6.7.2.2 ACLR Requirements for other than UE power class 21dBm 6.8 Transmit Intermodulation Requirements for other than UE power class 21dBm 6.9.3 Peak Code Domain Error Requirement to be defined. 7.5 ACS Value in square brackets 7.9 Spurious Emissions Values in square brackets 8 Performance Requirement Values are TBD, update of structure needed. Annex E2 Service Implementation Capabilities For further study 6.4 TS25.105 (BTS TX & RX for TDD) Table 6-4 shows the identified open items for the 25.105 specification document. Table 6-4:Open Items for 25.105 Section number Section description Status 3 Definitions, symbols and abbreviations Update needed 6.3 Frequency stability Should there also be an accuracy requirement on the clock rate ? Alternatives are to either tie the clock rate to the frequency accuracy or to have a separate clock rate requirement. 6.4.3 Power control dynamic range Redundant requirement included. The need for this parameter to be specified should be confirmed. 6.4.6 Power control cycles per second Adaptation to 15 slots per frame needed, depending on WG1 specification, requirement needed ? 6.4.7 Perch channel power Requirement for reference power in the cell is TBD. 6.6.2.1 Spectrum mask Not included 6.6.2.2 ACLR Values in square brackets 6.6.3.2.2 Co-existence with GSM 900; co-located base stations Scenario calculations should be performed to confirm the requirement, currently [-98] dB. 6.6.3.3.2 Co-existence with GSM 1800; co-located base stations Scenario calculations should be performed to confirm the requirement, currently [-98] dB. 7.3 Dynamic Range Value in square brackets 7.4 ACS Requirement is TBD. 7.8 Spurious Emissions Values in square brackets 8 Performance Requirement Values are TBD. Requirement for BS without dual receiver diversity is ffs. 6.5 TS25.133 (Support of RF Parameters in Radio Resource Management for FDD) Table 6-5 shows the identified open items for the 25.133 specification document. Table 6-5:Open Items for 25.133 Section number Section description Status [Editor’s note: The above table needs input from the editor of this specification] 6.6 TS25.123 (Support of RF Parameters in Radio Resource Management for TDD) Table 6-6 shows the identified open items for the 25.123 specification document. Table 6-6:Open Items for 25.123 Section number Section description Status [Editor’s note: The above table needs input from the editor of this specification] 6.7 TS25.141 (BTS Conformance test for FDD) Table 6-7 shows the identified open items for the 25.141 specification document. Table 6-7:Open Items for 25.141 # Section Section description Current status Remarks 1 2 References Shall be filled in later. Some are added. (May not exhaustive) 2 3.1 Definitions To be filled in later. Some are added. (May not exhaustive) 3 3.2 Symbols To be properly defined later. Editorial. Shall be filled in later if needed 12 6.2.1 Base station maximum output power Table 6.2.-1 and Table 6.2-2 should be filled in. Remove Editor’s note, since measuring the total power is enough. (Working assumption for power ratio for each channel shall be taken from AH1-DL discussion in Aug.30.) 13 6.3 Frequency stability Test conditions shall be revised properly. Adding draft text for it. Q.1: Should Signal to be measured be modulated? Q2: If it is the case, what kind of channel structure defined? Q3: Are there any need to defiene “Frequency measuring equipment” as a “wide-bande frequency counter”? 14 6.4.2 Power control steps There are some TBD parameters in the test conditions. Revise description. Q1: How to measure a particular DPCH shall be sprcified. Q2: By what method (can spectrum analyzer do this?) shall be specified. 15 6.4.2.2 Minimum requirement - Step size torelance is ffs. To define the transmitter power as “code domain power” is ffs. 16 6.4.3 Power control dynamic range There are some TBD parameters in the test conditions. 17 6.4.4 Minimum transmit power There are some TBD parameters in the test conditions. 18 6.4.5 Total power dynamic range There are some TBD parameters in the test conditions. 19 6.4.6 Power control cycles per second There are some TBD parameters in the test conditions. 20 6.5 Transmitted RF carrier power versus time Table 6.5-1 should be filled in. 21 6.5.4 Primary CPICH power There are some TBD parameters in the test conditions. 22 6.6.1 Occupied bandwidth Texts for measurement method are needed. Table 6.6-1 should be filled in. 23 6.6.3 Spurious emissions There are some TBD parameters in the test conditions. Table 6.6-3 and Table 6.6-4 should be filled in. 24 6.7 Transmit intermodulation There are some TBD parameters in the test conditions. Further input for co-located cellular systems are needed. 34 8.2.1 Performance in AWGN channel - BER (or FER) measurement method should be defined. - There are some TBD parameters in Table 8.2-1 - Add description in Annex-A. Baseline text is taken from Annex A in [5]. (- Table 8.2-1 still requires further study.) 35 8.2.2.4[6.4.1.3] Uplink power control Text for this section is needed. 36 8.2.2.5[6.4.1.4] Soft handover performance FFS. 38 8.2.2.2 Performance without TPC There are some TBD parameters in the table. 39 8.2.2.3 Performance with TPC There are some TBD parameters in the table. 44 6.2.1.1 Test Conditions and measurement method Which part of the code shll be measured should be specified. 45 6.4.2.1 Test conditions and measurement method <Editor’s note: In whichh symbol rate, should measurement done shall be specified.> 46 6.4.2.1 Test conditions and measurement method <Editor’s note: In whichh symbol rate, should measurement done shall be specified.> 47 6.4.3.1 Test conditions and measurement method <Editor’s note: In whichh symbol rate, should measurement done shall be specified.> 48 6.4.4.1 Test conditions and measurement method <Editor’s note: In whichh symbol rate, should measurement done shall be specified.> 49 6.4.5.1 Test conditions and measurement method <Editor’s note: In whichh symbol rate, should measurement done shall be specified.> 50 6.4.6.1 Test conditions and measurement method <Editor’s note: In whichh symbol rate, should measurement done shall be specified.> 51 6.9 Clock Frequency accuracy Conformance requirement for it is F.F.S. 52 6.6.2.1 Spectrum emission mask Test conditions and measurement methods are FFS. Description of minimum requirement shall be simplified. 6.8 TS25.142 (BTS Conformance test for TDD) Table 6-8 shows the identified open items for the 25.142 specification document. Table 6-8:Open Items for 25.142 Section number Section description Status [Editor’s note: The above table needs input from the editor of this specification] 6.9 TS25.113 (BTS EMC) Table 6-9 shows the identified open items for the 25.113 specification document. Table 6-9:Open Items for 25.113 Section number Section description Status 3.1 Definition of: Loss of service Loss of call Contributions invited. 3.1 Definition of: Transient phenomena Continuous phenomena Editor to check if any generally accepted definition already exists 4 New text to be proposed by correspondence following WG4#7 5 New text to be proposed by correspondence following WG4#7 6.1, 6.2 Number of tests The number of different bearers which need to be tested needs to be defined. 6.2 Self recovery Conditions for “System operation self-recoverable” need to be defined. 7 New text to be approved by correspondence to identify relevant sections of Annex A for phenomena 7 Work Item for Release 2000 History Document history Date Version Comment May 11th, 1999 0.0.1 Initial version as R4-99251 based on R4-99190 and R4-99252. June 3rd, 1999 0.0.2 Revised the items pointed out at the WG4 #4 meeting. Incorporated the Study Items shown in R4-99253. June 16th, 1999 1.0.0 Table 5.5 was revised to incorporate agreed part of R4-99316. July 15th, 1999 1.0.1 Minor editorial changes incorporated. July 24th, 1999 1.1.0 Milestone change incorporated to be in line with PCG#2(99)21. August 25th, 1999 1.2.0 Revised the meeting schedule for #9 meeting as agreed at #6 meeting and updated Table 4:Work Plan. September 8th, 1999 1.3.0 Incorporated the following pages. 5.6 25.141 (BS CONFORMANCE TEST FOR FDD) 5.7 25.142 (BS CONFORMANCE TEST FOR TDD) 5.8 25.113 (BS EMC) September 30th, 1999 1.4.0 Editorial error in Table 4 corrected. Milestone change incorporated as agreed at the WG4 #7 meeting. Updated the following pages. 5.5 25.103 (RF Parameters) 5.7 25.142 (BS CONFORMANCE TEST FOR TDD) 5.8 25.113 (BS EMC). October 7th, 1999 1.4.0 Noted by TSG-RAN#5 October 27th, 1999 2.0.0 Table 4 updated to reflect the result of TSG RAN #5. Meeting schedule for year 2000 incorporated. December 5th, 1999 2.1.0 Meeting schedule for year 2000 updated. December 10th, 1999 2.2.0 Table 4 updated to reflect the split of 25.103. Created a new section of “6. Open Item for Release 1999” and text changes proposed in R4-99907 except the table for 25.103 were incorporated into that section. Created a new section of “7. Work Item for Release 2000” with no content. October 7th, 1999 1.4.0 Noted by TSG-RAN#5 Editor for 30.504 Work Plan and Study Items is: Masaaki Iwasa Motorola Japan Limited Tel. : +81 (0)3 3280 8435 Fax : +81 (0)3 3440 3105 Email : RTY868@email.mot.com This document is written in Microsoft Word 97.
27beca56e63e2e84b7c4306bba73a041
25.831
3 Indicates TSG approved document under change control.
y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the specification. 1 Scope The scope of this Technical Report is to list technical features and functions of UTRAN (Study Items) that are currently assumed by TSG RAN WG3 to be outside the scope of UMTS Release 99, but that should be considered for future releases. Agreed technical descriptions of these features and functions are also included to the extent they are available. 2 References The following documents contain provisions, which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. • For a specific reference, subsequent revisions do not apply. • For a non-specific reference, the latest version applies. • A non-specific reference to an ETS shall also be taken to refer to later versions published as an EN with the same number. [1] TS 25.433 UTRAN Iub interface NBAP Signalling Specification [2] 3 Definitions, symbols and abbreviations 3.1 Definitions For the purposes of the present document, the [following] terms and definitions [given in ... and the following] apply. 3.2 Symbols For the purposes of the present document, the following symbols apply: 3.3 Abbreviations For the purposes of the present document, the following abbreviations apply: 4 Study item list [Editor's Note: This chapter should include the list of the study items, i.e. the features and functions of UTRAN outside the scope of UMTS Release 99]. The study items outside the scope of UMTS Release 99 are the following (non exhaustive): • Parallelism in the execution of NBAP procedures. • 5 Parallelism in the execution of NBAP procedures 5.1 Feature/Function description and status [Editor's Note: This section should include the description of the feature/function related to the study item and its status]. In release 99, it is a working assumption that there is only one ongoing procedure per UE context i.e. one NBAP procedure cannot be executed as long as another NBAP procedure for the same UE is still on going. 5.2 In further releases, it will be possible to have more than one on going NBAP procedure for a given UE, depending on the on going and the new procedures. Benefits and details are to be clarified.Impacts on specifications 5.2.1 Impacted specifications [Editor's Note: This section should list the TSG RAN WG3 specifications, which are impacted by the feature/function]. Impacted RAN WG3 specifications are: • TS 25.433 (NBAP Specification) [1] 5.2.2 Impacts on TS 25.433 (NBAP Specification) [Editor's Note: This subsection should include agreed modifications, text and figures needed for that specification]. The following text is included in chapter 8. 8.x. Procedure management Table x shows the support for parallel procedure execution by the NBAP protocol. New procedure Ongoing procedure RL- Setup RL-Addition RL- Reconf (unsync) RL- Reconf (Sync) RL- Deletion RL-Setup Not applicable Not possible RL-Addition RL-Reconf (unsync) Supported RL-Reconf (sync) Not supported RL-Deletion Note: it is up to an implementation to actually support the parallelism offered by the NBAP protocol. Since all procedures are initiated by an RNC, this RNC can choose not to use the offered parallelism. A simple node_B implementation might choose to execute all procedures sequentially. 5.2.3 Impacts on specification 2 [Editor's Note: This subsection should include agreed modifications, text and figures needed for that specification]. 6 Feature/Function description and status [Editor's Note: This section should include the description of the feature/function related to the study item and its status]. 6.1 Impacts on specifications 6.1.1 Impacted specifications [Editor's Note: This section should list the TSG RAN WG3 specifications which are impacted by the feature/function]. 6.1.2 Impacts on specification 1 [Editor's Note: This subsection should include agreed modifications, text and figures needed for that specification]. 6.1.3 Impacts on specification 2 [Editor's Note: This subsection should include agreed modifications, text and figures needed for that specification]. 7 Study item 2 8 History Document history V0.0.1 1999-05 Initial Specification Structure V0.0.2 1999-06 Addition of study item 1 "Parallelism in the execution of NBAP procedures" according to RAN WG3#4 meeting, based on tdoc R3-99449. V0.0.2 1999-06 Noted by TSG-RAN Editor for 3GPP RAN TS 25.831 is: Nicolas Drevon Alcatel Tel.: +33 1 3077 0916 Fax : +33 1 3077 9430 Email : nicolas.drevon@alcatel.fr This document is written in Microsoft Word version 7/97.
fd9931b60fc241f651706643f1ed6e48
33.900
3 Indicates TSG approved document under change control.
y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the specification; 2 Introduction This document is intended to offer security guidance to those involved in 3GPP systems. All specifications have to take into account the cost and feasibility of security features and functions. Inevitably, some compromise is necessary, and so it is important to realise where possible risks and threats may exist. The document describes those security issues that have been identified in the formulation of the standards. 3 Scope The present document gives a general description of the security architecture and features of 3rd Generation Security. It is intended to provide an overview of security, for detailed explanation and the actual standards the reader is referred to the appropriate standards. It also serves the purpose of identifying the potential risks and threats that have been highlighted and require careful consideration when implementing a third generat6ion mobile system. The document attempts to identify whether the security features and mechanism provided in the latest version of the 3G security architecture specification {1} address the 2G security weaknesses. 4 References Reference to an ETS shall also be taken to refer to later versions published as an EN with the same number. [1] 3G TS 33.102, 3G Security; Security Architecture, version 3.0.0 [2] 3G TS 33.120, 3G Security; Security Principles and Objectives, version 3.0.0 [3] 3G TS 21.133, 3G Security; Security Threats and Requirements, version 3.0.01 5 Definitions, symbols and abbreviations 5.1 Definitions 5.2 Symbols 5.3 Abbreviations 6 A brief overview of 3GPP Security 3GPP security was based on GSM security, with the following important changes: • A change was made to defeat the false base station attack. The security mechanisms include a sequence number that ensures that the mobile can identify the network. • Key lengths were increased to allow for the possibility of stronger algorithms for encryption and integrity. • Mechanisms were included to support security within and between networks. • Security is based within the switch rather than the base station as in GSM. Therefore links are protected between the base station and switch. • Integrity mechanisms for the terminal identity (IMEI) have been designed in from the start, rather than that introduced late into GSM. • The authentication algorithm has not been defined, but guidance on choice will be given. • When roaming between networks, such as between a GSM and 3GPP, only the level of protection supported by the smart card will apply. Therefore a GSM smart card will not be protected against the false base station attack when in a 3GPP network. 7 Counteracting envisaged 3G attacks Many of the security enhancements required to 2G systems are intended to counteract attacks which were not perceived to be feasible in 2G systems. This includes attacks that are, or are perceived to be, possible now or very soon because intruders have access to more computational capabilities, new equipment has become available, and the physical security of certain network elements is questioned. In order to perform the attacks the intruder has to possess one or more of the following capabilities: • Eavesdropping. This is the capability that the intruder eavesdrops signalling and data connections associated with other users. The required equipment is a modified MS. • Impersonation of a user. This is the capability whereby the intruder sends signalling and/or user data to the network, in an attempt to make the network believe they originate from the target user. The required equipment is again a modified MS. • Impersonation of the network. This is the capability whereby the intruder sends signalling and/or user data to the target user, in an attempt to make the target user believe they originate from a genuine network. The required equipment is modified BS. • Man-in-the-middle. This is the capability whereby the intruder puts itself in between the target user and a genuine network and has the ability to eavesdrop, modify, delete, re-order, replay, and spoof signalling and user data messages exchanged between the two parties. The required equipment is modified BS in conjunction with a modified MS. • Compromising authentication vectors in the network. The intruder possesses a compromised authentication vector, which may include challenge/response pairs, cipher keys and integrity keys. This data may have been obtained by compromising network nodes or by intercepting signalling messages on network links. The first capability is the easiest to achieve the following capabilities are gradually more complex and require more investment by the attacker. Therefore, in general, an intruder having a certain capability is assumed also to have the capabilities positioned above that capability in the list. The first two capabilities were acknowledged in the design of 2G systems. 3G security however should thwart all five types of attacks. In the following we consider several attacks to 3G systems which may not have been fully addressed in 2G systems and attempt to identify whether the security features and mechanisms provided in the latest version of the 3G security architecture specification counteracts each of these attacks. 7.1 Denial of service We distinguish between the following denial of service attacks: 7.1.1 User de-registration request spoofing Description: An attack that requires a modified MS and exploits the weakness that the network cannot authenticate the messages it receives over the radio interface. The intruder spoofs a de-registration request (IMSI detach) to the network. The network de-registers the user from the visited location area and instructs the HLR to do the same. The user is subsequently unreachable for mobile terminated services. Does 3G security architecture counteract the attack: Yes Integrity protection of critical signalling messages protects against this attack. More specifically, data authentication and replay inhibition of the de-registration request allows the serving network to verify that the de-registration request is legitimate. 7.1.2 Location update request spoofing Description: An attack that requires a modified MS and exploits the weakness that the network cannot authenticate the messages it receives over the radio interface. Instead of the de-registration request, the user spoofs a location update request in a different location area from the one in which the user is roaming. The network registers in the new location area and the target user will be paged in that new area. The user is subsequently unreachable for mobile terminated services. Does 3G security architecture counteract the attack: Yes Integrity protection of critical signalling messages protects against this attack. More specifically, data authentication and replay inhibition of the location update request allows the serving network to verify that the location update request is legitimate. 7.1.3 Camping on a false BS Description: An attack that requires a modified BS and exploits the weakness that a user can be enticed to camp on a false base station. Once the target user camps on the radio channels of a false base station, the target user is out of reach of the paging signals of the serving network in which he is registered. Does 3G security architecture counteract the attack: No The security architecture does not counteract this attack. However, the denial of service in this case only persists for as long as the attacker is active unlike the above attacks which persist beyond the moment where intervention by the attacker stops. These attacks are comparable to radio jamming which is very difficult to counteract effectively in any radio system. 7.1.4 Camping on a false BS/MS Description: An attack that requires a modified BS/MS and exploits the weakness that a user can be enticed to camp on a false base station. A false BS/MS can act as a repeater for some time and can relay some requests in between the network and the target user, but subsequently modify or ignore certain service requests and/or paging messages related to the target user. Does 3G security architecture counteract the attack: No The security architecture does not prevent a false BS/MS relaying messages between the network and the target user, nether does it prevent the false BS/MS ignoring certain service requests and/or paging requests. Integrity protection of critical message may however help to prevent some denial of service attacks, which are induced by modifying certain messages. Again, the denial of service in this case only persists for as long as the attacker is active unlike the above attacks, which persist beyond the moment where intervention by the attacker stops. These attacks are comparable to radio jamming which is very difficult to counteract effectively in any radio system. 7.2 Identity catching We identify the following types of attacks against the user identity confidentiality: 7.2.1 Passive identity catching Description: A passive attack that requires a modified MS and exploits the weakness that the network may sometimes request the user to send its identity in cleartext. Does 3G security architecture counteract the attack: Yes The identity confidentiality mechanism counteracts this attack. The use of temporary identities allocated by the serving network makes passive eavesdropping inefficient since the user must wait for a new registration or a mismatch in the serving network database before he can capture the user’s permanent identity in plaintext. The inefficiency of this attack given the likely rewards to the attacker would make this scenario unlikely. (Note however that the permanent identity may be protected in the event of new registrations or serving network database failure in order to guard against more efficient active attacks.) 7.2.2 Active identity catching Description: An active attack that requires a modified BS and exploits the weakness that the network may request the MS to send its permanent user identity in cleartext. An intruder entices the target user to camp on its false BS and subsequently requests the target user to send its permanent user identity in cleartext perhaps by forcing a new registration or by claiming a temporary identity mismatch due to database failure. Does 3G security architecture counteract the attack: Yes The identity confidentiality mechanism counteracts this attack by using an encryption key shared by a group of users to protect the user identity in the event of new registrations or temporary identity database failure in the serving network. Note however that the size of the groups should be chosen carefully: too small and the group identify may compromise the user identity itself; too large and the group encryption key might be vulnerable to attack. 7.3 Impersonation of the network We identify the following attacks with the objective of impersonating a genuine network. The ultimate aim of such attacks is usually to eavesdrop on user data (see section 2.4), or to send the user information that he subsequently believes to originate from a genuine network or user with whom he is connected through that network. 7.3.1 Impersonation of the network by suppressing encryption between the target user and the intruder Description: An attack that requires a modified BS and that exploits the weakness that the MS cannot authenticate messages received over the radio interface. The target user is enticed to camp on the false BS. When the intruder or the target user initiates a service, the intruder does not enable encryption by spoofing the cipher mode command. The intruder maintains the call as long as it is required or as long as his attack remains undetected. Does 3G security architecture counteract the attack: Yes A mandatory cipher mode command with message authentication and replay inhibition allows the mobile to verify that encryption has not been suppressed by an attacker. 7.3.2 Impersonation of the network by suppressing encryption between the target user and the true network Description: An attack that requires a modified BS/MS and that exploits the weakness that the network cannot authenticate messages received over the radio interface. The target user is enticed to camp on the false BS/MS. When a call is set-up the false BS/MS modifies the ciphering capabilities of the MS to make it appear to the network that a genuine incompatibility exists between the network and the mobile station. The network may then decide to establish an un-enciphered connection. After the decision not to cipher has been taken, the intruder cuts the connection with the network and impersonates the network to the target user. Does 3G security architecture counteract the attack: Yes A mobile station classmark with message authentication and replay inhibition allows the network to verify that encryption has not been suppressed by an attacker. 7.3.3 Impersonation of the network by forcing the use of a compromised cipher key Description: An attack that requires a modified BS and the possession by the intruder of a compromised authentication vector and thus exploits the weakness that the user has no control upon the cipher key. The target user is enticed to camp on the false BS/MS. When a call is set-up the false BS/MS forces the use of a compromised cipher key on the mobile user. The intruder maintains the call as long as it is required or as long as his attack remains undetected. Does 3G security architecture counteract the attack: Yes The presence of a sequence number in the challenge allows the USIM to verify the freshness of the cipher key to help guard against forced re-use of a compromised authentication vector. However, the architecture does not protect against force use of compromised authentication vectors which have not yet been used to authenticate the USIM. Thus, the network is still vulnerable to attacks using compromised authentication vectors which have been intercepted between generation in the authentication centre and use or destruction in the serving network. The user must trust the SN (transitively via the HE) to handle authentication vectors securely. For instance, an attacker with a false BS may work in collusion with an SN to intercept unused authentication vectors, or the SN may expose itself to undue risks because it stockpiles large numbers of authentication vectors before they need to be used. 7.4 Eavesdropping on user data We identify the following attacks with the objective of eavesdropping on user data which is transmitted through the genuine network to the intended recipient. 7.4.1 Eavesdropping on user data by suppressing encryption between the target user and the intruder Description: An attack that requires a modified BS/MS and that exploits the weakness that the MS cannot authenticate messages received over the radio interface. The target user is enticed to camp on the false BS. When the target user or the intruder initiates a call the network does not enable encryption by spoofing the cipher mode command. The attacker however sets up his own connection with the genuine network using his own subscription. The attacker may then subsequently eavesdrop on the transmitted user data. Does 3G security architecture counteract the attack: Yes A mandatory cipher mode command with message authentication and replay inhibition allows the mobile to verify that encryption has not been suppressed by an attacker. 7.4.2 Eavesdropping on user data by suppression of encryption between the target user and the true network Description: An attack that requires a modified BS/MS and that exploits the weakness that the network cannot authenticate messages received over the radio interface. The target user is enticed to camp on the false BS/MS. When the target user or the genuine network sets up a connection, the false BS/MS modifies the ciphering capabilities of the MS to make it appear to the network that a genuine incompatibility exists between the network and the mobile station. The network may then decide to establish an un-enciphered connection. After the decision not to cipher has been taken, the intruder may eavesdrop on the user data. Does 3G security architecture counteract the attack: Yes Message authentication and replay inhibition of the mobile’s ciphering capabilities allows the network to verify that encryption has not been suppressed by an attacker. 7.4.3 Eavesdropping on user data by forcing the use of a compromised cipher key Description: An attack that requires a modified BS/MS and the possession by the intruder of a compromised authentication vector and thus exploits the weakness that the user has no control the cipher key. The target user is enticed to camp on the false BS/MS. When the target user or the intruder set-up a service, the false BS/MS forces the use of a compromised cipher key on the mobile user while it builds up a connection with the genuine network using its own subscription. Does 3G security architecture counteract the attack: Yes The presence of a sequence number in the challenge allows the USIM to verify the freshness of the cipher key to help guard against forced re-use of a compromised authentication vector. However, the architecture does not protect against force use of compromised authentication vectors, which have not yet been used to authenticate the USIM. Thus, the network is still vulnerable to attacks using compromised authentication vectors, which have been intercepted between generation in the authentication centre and use and destruction in the serving network. The user must trust the SN (transitively via the HE) to handle authentication vectors securely. For instance, an attacker with a false BS may work in collusion with an SN to intercept unused authentication vectors, or the SN may expose itself to undue risks because it stockpiles large numbers of authentication vectors before they need to be used. 7.5 Impersonation of the user 7.5.1 Impersonation of the user through the use of by the network of a compromised authentication vector Description: An attack that requires a modified MS and the possession by the intruder of a compromised authentication vector which is intended to be used by the network to authenticate a legitimate user. The intruder uses that data to impersonate the target user towards the network and the other party. Does 3G security architecture counteract the attack: Yes The presence of a sequence number in the challenge means that authentication vectors cannot be re-used to authenticate USIMs. This helps to reduce the opportunity of using a compromised authentication vector to impersonate the target user. However, the network is still vulnerable to attacks using compromised authentication vectors, which have been intercepted between generation in the authentication centre and use and destruction in the serving network. The user must trust the SN (transitively via the HE) to handle authentication vectors securely. For instance, an attacker with a false BS may work in collusion with an SN to intercept unused authentication vectors, or the SN may expose itself to undue risks because it stockpiles large numbers of authentication vectors before they need to be used. 7.5.2 Impersonation of the user through the use by the network of an eavesdropped authentication response Description: An attack that requires a modified MS and exploits the weakness that an authentication vector may be used several times. The intruder eavesdrops on the authentication response sent by the user and uses that when the same challenge is sent later on. Subsequently, ciphering has to be avoided by any of the mechanisms described above. The intruder uses the eavesdropped response data to impersonate the target user towards the network and the other party. Does 3G security architecture counteract the attack: Yes The presence of a sequence number in the challenge means that authentication vectors cannot be re-used to authenticate USIMs. 7.5.3 Hijacking outgoing calls in networks with encryption disabled Description: This attack requires a modified BS/MS. While the target user camps on the false base station, the intruder pages the target user for an incoming call. The user then initiates the call set-up procedure, which the intruder allows to occur between the serving network and the target user, modifying the signalling elements such that for the serving network it appears as if the target user wants to set-up a mobile originated call. The network does not enable encryption. After authentication the intruder cuts the connection with the target user, and subsequently uses the connection with the network to make fraudulent calls on the target user’s subscription. Does 3G security architecture counteract the attack: Partly Integrity protection of critical signalling messages protects against this attack. More specifically, data authentication and replay inhibition of the connection set-up request allows the serving network to verify that the request is legitimate. In addition, periodic integrity protected messages during a connection helps protect against hijacking of un-enciphered connections after the initial connection establishment. However, hijacking the channel between periodic integrity protection messages is still possible, although this may be of limited use to attackers. In general, connections with ciphering disabled will always be vulnerable to some degree of channel hijacking. 7.5.4 Hijacking outgoing calls in networks with encryption enabled Description: This attack requires a modified BS/MS. In addition to the previous attack this time the intruder has to attempt to suppress encryption by modification of the message in which the MS informs the network of its ciphering capabilities. Does 3G security architecture counteract the attack: Yes Integrity protection of critical signalling messages protects against this attack. More specifically, data authentication and replay inhibition of the MS station classmark and the connection set-up request helps prevent suppression of encryption and allows the serving network to verify that the request is legitimate. 7.5.5 Hijacking incoming calls in networks with encryption disabled Description: This attack requires a modified BS/MS. While the target user camps on the false base station, an associate of the intruder makes a call to the target user’s number. The intruder acts as a relay between the network and the target user until authentication and call set-up has been performed between target user and serving network. The network does not enable encryption. After authentication and call set-up the intruder releases the target user, and subsequently uses the connection to answer the call made by his associate. The target user will have to pay for the roaming leg. Does 3G security architecture counteract the attack: Partly Integrity protection of critical signalling messages protects against this attack. More specifically, data authentication and replay inhibition of the connection accept message allows the serving network to verify that the request is legitimate. In addition, periodic integrity protected messages during a connection helps protect against hijacking of un-enciphered connections after the initial connection establishment. However, hijacking the channel between periodic integrity protection messages is still possible, although this may be of limited use to attackers. In general, connections with ciphering disabled will always be vulnerable to some degree of channel hijacking. 7.5.6 Hijacking incoming calls in networks with encryption enabled Description: This attack requires a modified BS/MS. In addition to the previous attack this time the intruder has to suppress encryption. Does 3G security architecture counteract the attack: Yes Integrity protection of critical signalling messages protects against this attack. More specifically, data authentication and replay inhibition of the MS station classmark and the connection accept message helps prevent suppression of encryption and allows the serving network to verify that the connection accept is legitimate. 8 Network issues 8.1 Security policy 8.1.1 Access control policy Access control policy with respect to 3GPP network elements should be consistent with general access control policy as defined in the particular operator’s security policy. As a basis, the following rules should apply: 1. In granting users access rights to 3GPP networks elements or supporting IT systems the following principles should be followed: • every employee should only have access to those resources necessary for the completion of the work-related tasks set, • the “positive access control” principle should be applied, meaning it shall be assumed that an employee is authorised to carry out only those operations for which he has obtained authority, • The right of access to resources should be granted only at the moment when it is actually necessary and should be rescinded when no longer necessary for the completion of work-related tasks. 2. Operator’s employees should be made responsible for the secure storing and use of access control executive components entrusted to them (badges, cards). Access control executive components should not be stored together with a computer used to access the network element or IT system. 3. Every user of a given system should be provided with an identification (log-in name, account name) that is unique within the framework or the Company. The following principles apply: • a user’s identification on its own should not be sufficient for granting access authority, • an identification should not give any indication of the user’s authority within the system, • The use of forms of group identification should only be admissible in exceptional circumstances. Granting of full or very wide rights of access to resources should be limited and strictly controlled. 8.2 Secure network elements interconnection 3GPP network elements must provide means for remote management, maintenance and communication with IT systems (e.g. the billing system). Often an operator’s corporate computer network is used for this purpose. This considerably lower infrastructure costs but poses significant security threats for 3GPP system entities. If no security is applied, usually each user of corporate network can try to access remotely a 3GPP network element, provided its network address is known. As a principle, 3GPP network elements should be separated, at least logically, from an operator’s corporate computer network. A unique username and password should identify each employee who is authorised to access to network element. Proper application and system logs should be maintained, reviewed and protected. Remote access to network entities should be, subject to the operator’s security policy, protected from eavesdropping and session hijacking. Physical access to 3GPP network elements should be controlled by appropriate physical security measures. It is advisable that physical location of network elements be treated as protected information. 8.3 Communications node security To countermeasure the threats described in this document an operator should define and implement proper security measures. The following section specifies the desirable security features that any 3GPP Network Element (NE), Network System (NS), Operations System (OS) or Data Communications Network (DCN) should provide in order to reduce the risk of potentially service affecting security compromises. The term “3GPP node” in the following section is used to imply a NE, NS, OS, or a DCN and its nodes. 8.3.1 Identification Each operations related process running in the 3GPP node should be associated with the corresponding user-ID (so that an audit trail can be established if there is a need). The 3GPP node should disable a user-ID if it has remained inactive (i.e., never used) over a specified time period. 8.3.2 Authentication All Operations, Administration, Maintenance and Provisioning (OAM&P) input ports of the 3GPP node (including direct, dial-up and network access) should require authentication of a session requester, without any provision for a bypass mechanism. A single stored password entry (e.g., in a password file) should not be allowed to be shared by multiple user-IDs. However, the 3GPP node should not prevent a user from choosing (unknowingly) a password that is already being used by some other user. Nor should the 3GPP node volunteer this information to either user. Passwords should be stored in a one-way encrypted form, and should not be retrievable by any user including managers or administrators (of system and security). Also, there should be no clear text display (on a device such as a screen, typewriter, or printer) of a password at any time (e.g., login, file dump, etc.). The 3GPP node should allow passwords to be user changeable (requiring re-authentication), and should require that the user change it the first time he/she establishes a session with the password assigned to him/her. The default should be non-trivial in nature, ideally random. The password should have an “ageing” feature, and it should have a complexity requirement to make it not easily guessed. The 3GPP node should not accept common words or names as valid passwords. Also, it should not allow a recently obsolete password to be readily reselected by the said user. 8.3.3 System Access Control The 3GPP node should not allow access to any session requester unless identified and authenticated. There should be no default mechanism to circumvent it. The 3GPP node should not allow any session to be established via a port that is not authorised to accept input commands. For example, if an output port receives a login request, the 3GPP node should not respond. The entire login procedure should be allowed to be completed without interruption, even if incorrect parameters (such as an incorrect user-ID or an incorrect password) are entered, and no “help message” should be transmitted to the session requester as to whom part of the authentication is incorrect. The only information to be conveyed at the end of the login attempt is that the login is invalid. After a specified number of incorrect login attempts carried out in succession, the 3GPP node should lock out the channel and raise an alarm in real time for the administrator. Before the session begins, the 3GPP node should provide a warning message explicitly alerting the user of the consequences of unauthorised access and use. At the beginning of the session, the 3GPP node should display the date and time of the user’s last successful access and the number of unsuccessful attempts, if any, that have been made to establish a session since the last successful access. There should be a “time-out” feature - i.e., the 3GPP node should disconnect or re-authenticated users after a specified time interval during which no messages were exchanged. Also, there should be a mechanism for user-initiated keyboard locking. The 3GPP node should provide a mechanism to end a session through a secure logoff procedure. If a session gets interrupted due to reasons such as time-out, power failure, link disconnection, etc., the port should be dropped immediately. For dial-up access over untrusted channels, authentication involving one time passwords should be required (e.g., smart card, etc.). 8.3.4 Resource Access Control Access to resources should be controlled on the basis of “privilege” (i.e., access permission) associated with user-ID and channel. It should not be based on a “password” associated with the access function, because that password will have to be necessarily shared among all users requiring such access. Neither should encryption be used as a primary access control mechanism (though encryption may be used to enhance it). The granularity of resource access control should be such that for each resource it should be possible to grant (or deny) access privilege to any single user (or a prescribed group of users). For example, the control should be adequately fine-grained so that user access and channel access can be restricted on the basis of commands, database views (i.e., objects), records (i.e., object instances), and fields (i.e., attributes). If external entities - e.g., customers, are allowed access to the resources, each 3GPP node’s resource (e.g., proprietary data) should be protected from access by unauthorised persons. Executable/loadable/fetchable software should be access controlled for overwrite, update, and execution rights. 8.3.5 Accountability and Audit The 3GPP node should generate a security log containing information sufficient for after-the-fact investigation of loss or impropriety. The security log should be protected from unauthorized access. No user should be allowed to modify or delete a security log. There should be no mechanism to disable the security log. There should be an alarm in real time if the security log does not function properly. The security log should, as a minimum, record events such as: • all sessions established, • invalid user authentication attempts, • unauthorized attempts to access resources (including data and transactions), • changes in users’ security profiles and attributes, • changes in access rights to resources, • changes in the 3GPP node security configuration, • And modification of 3GPP node software. For each such event, the record should, as a minimum, include date and time of event, initiator of the event such as: user-ID, terminal, port, network address, etc., names of resources accessed, and success or failure of the event. Actual or attempted passwords should not be recorded in the security log There should be audit tools to produce exception reports, summary reports, and detailed reports on specifiable data items, users, or communication facilities. 8.3.6 Security Administration The 3GPP node should support functions for the “management” of security related data (e.g., security parameters such as user-IDs, passwords, privileges, etc.) as “separate” from other user functions. Security administration should be reserved only for an appropriate administrator. The administrator should be able to display all currently logged-in users as well as a list of all authorised user-IDs. The administrator should be able to independently and selectively monitor, in real time, the actions of any one or more users based on respective user-IDs, terminals, ports, or network addresses. The administrator should be able to identify all resources owned by or accessible to any specific user along with the associated access privileges. The administrator should be able to enter, edit, delete or retrieve all attributes of a user-ID (except for a password, which should not be retrievable). The administrator should limit the use of a “null password” during system login on a per user or per port basis (i.e., during new release installation). The administrator should be able to save the security log for safe storage, so that it is not written over when the buffer is full. All security parameters (e.g., password-ageing interval, time-out interval, and various alarm conditions) should be specifiable and adjustable by the administrator. This implies that the 3GPP node should not have any security parameters hard coded. 8.3.7 Documentation Any 3GPP node supplier/vendor should provide documentation on security considerations for administrators, operators, and users. They can be stand-alone documents or sections incorporated in appropriate vendor manuals. The administrator’s guide should contain items such as: functions and privileges that need to be controlled to secure the facility, proper usage of security audit tools, procedures for examining and maintaining audit files, procedures for periodic saving and backup of security logs, recommendations on setting the minimum access permissions on all files, directories, and databases, guidelines on security assessment techniques. The operator’s guide should contain procedures necessary to initially start the 3GPP node in a secure manner and to resume secure operation after any lapse that may have occurred. The user’s guide should describe the protection mechanisms that are non-transparent to the user, should explain their purpose, and provide guidelines on their use. It should not contain any information that could jeopardise the security of the 3GPP node if made public. Passwords should be stored in a one-way encrypted form, and should not be retrievable by any user including managers or administrators (of system and security). Also, there should be no clear text display (on a device such as a screen, typewriter, or printer) of a password at any time (e.g., login, file dump, etc.). The 3GPP node should allow passwords to be user changeable (requiring reauthentication), and should require that the user change it the first time he/she establishes a session with the password assigned to him/her. The default should be non-trivial in nature, ideally random. 9 Inter Network Security 9.1 Signalling system Number 7 Mobile networks primarily use Signaling System no. 7 (SS7) for communication between networks for such activities as authentication, location update, and supplementary services and call control. The messages unique to 3GPP are MAP messages. The security of the global SS7 network as a transport system for signaling messages e.g. authentication and supplementary services such as call forwarding is open to major compromise. The problem with the current SS7 system is that messages can be altered, injected or deleted into the global SS7 networks in an uncontrolled manner. In the past, SS7 traffic was passed between major PTO’s covered under treaty organization and the number of operators was relatively small and the risk of compromise was low. Networks are getting smaller and more numerous. Opportunities for unintentional mishaps will increase, as will the opportunities for hackers and other abusers of networks. With the increase in different types of operators and the increase in the number of interconnection circuits there is an ever-growing loss of control of security of the signaling networks. There is also exponential growth in the use of interconnection between the telecommunication networks and the Internet .The IT community now has many protocol converters for conversion of SS7 data to IP, primarily for the transportation of voice and data over the IP networks. In addition new services such as those based on IN will lead to a growing use of the SS7 network for general data transfers. There have been a number of incidents from accidental action, which have damaged a network. To date, there have been very few deliberate actions. The availability of cheap PC based equipment that can be used to access networks and the ready availability of access gateways on the Internet will lead to compromise of SS7 signaling and this will effect mobile operators. The risk of attack has been recognised in the USA at the highest level of the President’s office indicating concern on SS7. It is understood that the T1, an American group is seriously considering the issue. For the network operator there is some policing of incoming signaling on most switches already, but this is dependent on the make of switch as well as on the way the switch is configured by operators. Some engineering equipment is not substantially different from other advanced protocol analysers in terms of its fraud potential, but is more intelligent and can be programmed more easily. The SS7 network as presently engineered is insecure. It is vitally important that network operators ensure that signaling screening of SS7 incoming messages takes place at the entry points to their networks and that operations and maintenance systems alert against unusual SS7 messages. There are a number of messages that can have a significant effect on the operation of the network and inappropriate messages should be controlled at entry point. Network operators network security engineers should on a regular basis carry out monitoring of signaling links for these inappropriate messages. In signing agreements with roaming partners and carrying out roaming testing, review of messages and also to seek appropriate confirmation that network operators are also screening incoming SS7 messages their networks to ensure that no rouge messages appear. In summary there is no adequate security left in SS7. Mobile operators need to protect them selves from attack from hackers and inadvertent action that could stop a network or networks operating correctly. Operators should note that HPLMN control over a subscriber roaming in a VPLMN using different MAP release could be limited. To avoid this, operators should assure that their roaming partners use the current MAP version, as specified by the 3GPP Association. 10 Intra network security 10.1 3GPP Network elements and interfaces Unauthorised, local or remote access to 3GPP network elements can result in access to confidential data stored by system entities, unauthorised access to services and resources, misuse of the network element to gain access to data or services or denial of service. The following section gives an outline of potential threats related to attacks on 3GPP network elements and recommendations. 10.1.1 Home Location Register - HLR An unauthorised access to HLR could result in activating subscribers not seen by the billing system, thus not chargeable. Services may also be activated or deactivated for each subscriber, thus allowing unauthorised access to services or denial of service attacks. In certain circumstances it is possible to use Man-Machine (MM) commands to monitor other HLR user’s action - this would also often allow for unauthorised access to data. An operator should not rely on the fact that an intruder’s knowledge on particular vendor’s MM language will be limited. Those attacks can be performed both by external intruders and by operator’s employees. Access control to HLRs should be based on user profiles, using at least a unique username and a password as authentication data. Remote access to HLR should be protected from eavesdropping, source and destination spoofing and session hijacking. An operator may therefore wish to limit the range of protocols available for communication with HLR.. 10.1.2 Authentication Centre - AuC An intruder who gains direct access to an AuC can effectively clone all subscribers whose data he had access to. Number of employees having physical and logical access to AuC should be limited. From security point of view it is then reasonable to use an AuC which is not integrated with HLR. Operators should carefully consider the need for encryption of AuC data. Some vendors use default encryption, the algorithm being proprietary and confidential. It should be noted that strength of such encryption could be questionable. If decided to use an add-on ciphering facility, attention should be paid to cryptographic key management. Careless use of such equipment could even lower AuC security. Authentication triplets can be obtained from AuC by masquerading as another system entity (namely HLR). The threat is present when HLR and AuC are physically separated. 10.1.3 Mobile Switching Centre - MSC An MSC is one of the most important nodes of any 3GPP network. It handles all calls incoming to, or originating from subscribers visiting the given switch area. Unauthorised, local or remote, access to an MSC would likely result in the loss of confidentiality of user data, unauthorised access to services or denial of service for large numbers of subscribers. It is strongly recommended that access to MSCs is restricted, both in terms of physical and logical access. It is also recommended that their physical location is not made public. When co-located, several MSCs should be independent (i.e. separated power, transmission,) in order to limit the impacts from accidents on one particular MSC (e.g. fire). 10.1.4 3GPP network interfaces An intruder gaining access to 3GPP network interfaces would primary gain access to information sent on the interface targeted. However, playing denial-of-service attacks would also be feasible - dependent on how the interface is technically realised (e.g. cable or wireless). Telecommunication networks are usually designed with necessary redundancy, allowing for reconfiguration in case of loss of a link or links. From security point of view it is particularly important to foresee alternate connection paths where links vulnerable to denial-of-service attacks (e.g., microwave links susceptible to jamming) are in use. 10.1.5 Billing system / Customer Care system Billing/customer care systems are critical for maintaining the business continuity of a 3GPP Operator. Unauthorised access to the billing or customer care system could result in • loss of revenue due to manipulated CDRs (on the mediation device/billing system level) • unauthorised applying of service discounts (customer care system level), unauthorised access to services (false subscriptions) • and even denial of service - by repeated launching of resource - consuming system jobs. Attention should be paid to the fact that access rights to the billing/customer care system are often granted to temporary employees. As 3GPP network operators should introduce proper access control mechanisms, coherent with the Operator’s general security policy. In particular, it would be advisable to: • Control the access to the billing data on the database level. • All users of the billing system should be authenticated by the billing database and access rights should be granted by the database upon successful authentication. Relaying on the application-to-database authentication leaves the database open for a skilled attacker. • Review the activation process. The same employee should not carry out both tasks; data verification should involve a trusted employee. Activation should be made only upon confirmation of the person verifying the data entered. 11 User Module and Smart Card If a 3GPP SIM is integrated on a multi-application smart card, there should be sufficient guarantees that the Ki cannot be read or used by any application other than the 3GPP application. Also there should be clear and secure procedures for placing applications and information on the smart card, ensuring that 3GPP information cannot be changed in an unauthorised way. There should be clear responsibilities and procedures for dealing with stolen or malfunctioning cards. The importance of secure management of Ki’s is already detailed above. In addition it is important that SIM status lists are kept up to date and that operators define measures to detect and investigate the misuse of SIMs. There should be procedures to replace SIMs, for example at the end of their validity period, and to deal with stolen SIMs. It is particularly important that individual operators devise and operate secure SIM management processes with their SIM suppliers and throughout the SIM distribution channel. 12 Algorithms 12.1 Authentication algorithm 3GPP does not define a standard authentication algorithm, allowing operators to choose their own versions, which comply with the published standards. However, in order to help operators guidelines are available as to how to develop a suitable algorithm. The authentication algorithm is contained within the smart card. The individual key for each IMSI must be chosen to be random, and must be protected in order to prevent the user from being duplicated. Throughout the security process Ki should be protected. 12.2 Confidentiality algorithm 3GPP defines a standard confidentiality algorithm, which is contained within all mobiles, and protects user data from the mobile to the serving node. This is not only over the radio path as in GSM, but also continues back over the links to the serving node. The confidentiality algorithm, called Kasumi, is expected to be published. 13 Services There are many value-added services within the ETSI standards, which will sometimes, when wrongly implemented or interpreted, can be used for fraud. For example, call forwarding can be set which will then allow calls made to a mobile to be sent to expensive destination numbers. This could be done, for example, by ringing a mobile customer and getting them to put in a call forward number themselves by persuading them that they are testing the mobile. Many other similar problems exist, such as follow-me services, voicemail, and explicit call transfer. It is to expected that as the services offered by 3GPP become more complex (and include for example Internet connectivity, packet data services as well as MExE which runs code on the mobile, and Java multi application smart cards) then the problem can only become worse. Operators should ensure that they look carefully at every new network feature and service product to ensure that such problems will not occur in their networks. 13.1 Location services The location service feature in 3GPP depends on the accuracy of the mechanism used within the mobile equipment. It cannot be though of as accurate, as the mobile software can be modified, or the GPS (Global Positioning System by Satellite) could be displaced by a differential input. 13.2 Mobile Execution Environment - MExE The ability to remotely modify remote and run code on a mobile clearly introduces a security risk. In the case of MExE it is up to the user to determine if a possible security risk is introduced, and stop the action from taking place. It is to be expected that a smart attacker will be able to introduce code that will fool a user into setting up services or connection that will compromise them or result them in losing money. 14 Index 15 16 History Document history 1.0.0 Oct 1999 Publication as first draft to 3GPP TSG SA WG3 Security 1.1.0 Nov 1999 Presented at No 6 for information 1.2.0 Jan 2000 Presented at No 10 for comment
223bf418b59ea1d3b400a69f37607082
23.700-30
1 Scope
The present document studies additional architecture support of Ambient IoT for the support of Rel-19 AIoT Devices defined in TS 23.369 [3] in Topology 2 based on the RRC-based option as described in clause 8.1.3.3 of TR 23.700‑13 [7] and support for new AIoT Devices that will support the DO-A traffic type as described in the "RAN WID Solutions for Ambient IoT (Internet of Things) in NR Phase 2" RP-251885 [9] and "RAN SID Study on enhancements for solutions for Ambient IoT (Internet of Things) in NR outdoor for active devices" RP-251884 [8].
223bf418b59ea1d3b400a69f37607082
23.700-30
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. - For a specific reference, subsequent revisions do not apply. - For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications". [2] 3GPP TS 22.369: "Service requirements for Ambient power-enabled IoT". [3] 3GPP TS 23.369: "Architecture support for Ambient power-enabled Internet of Things; Stage 2". [4] 3GPP TS 23.501: "System Architecture for the 5G System (5GS); Stage 2". [5] 3GPP TS 23.502: "Procedures for the 5G System; Stage 2". [6] 3GPP TS 23.503: "Policies and Charging control framework for the 5G System; Stage 2. [7] 3GPP TR 23.700‑13: "Study on Architecture support of Ambient power-enabled Internet of Things". [8] 3GPP RP-251884: "New SID on enhancements for solutions for Ambient IoT (Internet of Things) in NR outdoor for active devices". [9] 3GPP RP-251885: "New WID on Solutions for Ambient IoT (Internet of Things) in NR Phase 2". [10] 3GPP TR 38.848: "Technical Specification Group Radio Access Network; Study on Ambient IoT (Internet of Things) in RAN". [xx11] 3GPP  TS  33.369: "Security aspects of ambient IoT services in 5G".
223bf418b59ea1d3b400a69f37607082
23.700-30
3 Definitions of terms, symbols and abbreviations
223bf418b59ea1d3b400a69f37607082
23.700-30
3.1 Terms
For the purposes of the present document, the terms given in TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905 [1]. Definition format (Normal) <defined term>: <definition>. example: text used to clarify abstract rules by applying them literally.
223bf418b59ea1d3b400a69f37607082
23.700-30
3.2 Abbreviations
For the purposes of the present document, the abbreviations given in TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905 [1]. Abbreviation format (EW) <ABBREVIATION> <Expansion>
223bf418b59ea1d3b400a69f37607082
23.700-30
4 Architectural Assumptions and Requirements
223bf418b59ea1d3b400a69f37607082
23.700-30
4.1 Architectural Assumptions
The following traffic types for AIoT Device are to be studied: - DT: Device-terminated; - DO-DTT: Device-originated - device-terminated triggered; and - DO-A: Device-originated - autonomous. Common architectural assumptions: - Architecture reference models defined in TS 23.369 [3] are used as the baseline architecture for this study. - The AIoT Device is agnostic to topologies, i.e. Topology 1 and Topology 2. Architectural assumptions for support of Topology 2 for Key Issue#1: - No Rel-19 AIoT Device impact is expected. - The following topology as defined in TR 38.848 [10] is assumed: - BS <--> intermediate node <--> Ambient IoT Device: Only a UE can act as an intermediate node which is under the network control - Only Indirect Connectivity (i.e. NG-RAN <-> AMF <-> AIOTF) is applied. - The support of Topology 2 in this study is based on the RRC-based option and the interim conclusions of Rel-19 in TR 23.700-13 [7] is the baseline. Architectural assumptions for support of DO-A Capable AIoT Devices: - The AIoT Device is agnostic to Topology 1 architecture types, i.e. Direct Connectivity architecture and Indirect Connectivity architecture. NOTE 1: Coordination with RAN WGs is required to determine the AIoT Device capabilities in relation to system level of functionality (considering e.g. traffic scenarios, connectivity topologies, etc.). NOTE 2: The security aspects for Ambient IoT require coordination with SA WG3. NOTE 3: The charging aspects for Ambient IoT will be studied by SA WG5.
223bf418b59ea1d3b400a69f37607082
23.700-30
4.2 Architectural Requirements
The following architectural requirements are applicable to this study: - Solutions shall build on the 5G System architectural principles as in TS 23.501 [4], including flexibility and modularity for newly introduced functionalities. - The enhancements to support topology 2 shall not impact Rel-19 AIoT devices. - Solutions shall build on the AIoT architectural principles as in TS 23.369 [3]. - Support for AIoT Services needs to adhere to the nature of the AIoT Devices (e.g. ultra-low complexity, cost and resource-constrained). NOTE: Privacy protection and other security aspects will be coordinated with SA WG3.
223bf418b59ea1d3b400a69f37607082
23.700-30
5 Key Issues
223bf418b59ea1d3b400a69f37607082
23.700-30
5.1 Key Issue #1: support AIoT services under the RRC-based option for UE Reader connectivity
NOTE 1: Only CM-CONNECTED with RRC_CONNECTED UE Reader is in the scope. Only the following aspects will be included: - How to perform and revoke authorization of UE Readers. NOTE 2: Rel-19 interim conclusion in TR 23.700-13 [7] should be used as basis for UE Reader authorization. - Potential impact from how the NG-RAN node and UE reader selection can be performed. NOTE 3: The aspect of NG-RAN node and UE reader selection requires coordination with RAN WG3. - Whether and how the AIOTF can provide the information of the UE readers to the NG-RAN node to assist NG-RAN for UE reader selection. NOTE 4: Rel-19 interim conclusion in TR 23.700-13 [7] should be used as basis for this key issue. No Rel-19 AIoT Device impact from this key issue is expected. NOTE 5: Conclusions of this KI will be coordinated with RAN WGs.
223bf418b59ea1d3b400a69f37607082
23.700-30
5.2 Key Issue #2: Support of DO-A Capable AIoT Devices
This key issue will study the system architecture to support DO-A capable Ambient IoT Devices in Topology 1 and Topology 2. The following aspects will be studied: - How the AIoT Device informs the network of its presence autonomously (e.g., an AIoT Device initiated registration-like procedure) and what are the triggers for the DO-A capable device to inform the network of its presence. - Whether and how to consider power consumption of DO-A Capable AIoT Devices. - How an AIoT Device sends data to the AIOTF autonomously. - Support for routing the data received by AIOTF from an AIoT Device to an AF. - Whether and how to enhance the Inventory and Command procedures defined in TS 23.369 [3] to support DO-A capable AIoT Devices. - Naiotf, Namf and Nnef interface enhancements to support DO-A capable AIoT Device. NOTE 1: The conclusions from Key Issue #1 are the basis for supporting DO-A capable AIoT Devices in topology 2 in this key issue. NOTE 2: Coordination with RAN WGs is required.
223bf418b59ea1d3b400a69f37607082
23.700-30
6 Solutions
223bf418b59ea1d3b400a69f37607082
23.700-30
6.0 Mapping of Solutions to Key Issues
Table 6.0-1: Mapping of Solutions to Key Issues Key Issues Solutions Key Issue #1 <Key Issue #2> #1 X #2 X #3 X #4 X #X5 X #X6 X #X7 X #X8 X #X9 X #10X X #11X X #12X X #13X X #14X X #15X X #16X X #17X X #18X X #X19 X
223bf418b59ea1d3b400a69f37607082
23.700-30
6.1 Solution #1: Enable 5G delivery AIoT device initiated traffic
223bf418b59ea1d3b400a69f37607082
23.700-30
6.1.0 High-level solution principles
The key technical principles proposed in this solution are summarized below: 1. AIoT Device Profile Enhancement: The AIoT Device Profile is extended to include additional information, such as AF/NEF associations and the device’s registration status. 2. Device Registration Requirement: Each AIoT Device must be registered with the 5G network to enable support for DO-A traffic. 3. Energy-Aware Communication Initiation: An AIoT Device may initiate communication when sufficient energy is available from non-RF sources. The device can also request the network to supply energy for subsequent transmissions by indicating its Active Time. 4. Redundant Traffic Management: The NG-RAN can identify and suppress redundant transmissions originating from multiple readers, indicating which reader is selected for subsequent forwarding. Readers maintain a local device context to prevent unnecessary traffic duplication. 5. Per-Device Session Context at AIOTF: The AIOTF maintains a session context for each device, including session IDs that allow subsequent messages to bypass repeated authorization and NEF discovery, improving efficiency. 6. Timestamp-Based Deduplication and Data Integrity: Each message carries a timestamp to enable detection and elimination of duplicate data, supporting network-side data cleaning and ensuring consistency. NOTE: The feasibility of using timestamp depends on the RAN WGs. 7. NEF Selection Based on Device Profile: The AIOTF determines the appropriate NEF for forwarding traffic based on the AIoT device profile and the requested AF.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.1.1 Description
The introduction of Device Oriented-Autonomous (DO-A) traffic type addresses a significant gap in AIoT networks, where devices initiate communication autonomously based on available energy resources. This capability was not supported in previous releases and is now within the scope of this Release. The proposed solution outlines a series of procedures that enable efficient handling of DO-A traffic, ensuring optimized network resource utilization. Key Procedures: 1. AIoT Device Profile enhancement: the AIoT device profile stored in the ADM is enhanced to also include supported AF IDs along with their corresponding NEF IDs, and the AIoT device registration status. 2. Registration and Context Creation: AIoT devices register with the network by sending their device ID, which is encapsulated and forwarded through network elements for security validation. Upon successful authentication, the device profile is updated, and a context is created, detailing registration status and access permissions. 3. DO-A Traffic Initiation: When an AIoT device has sufficient energy, it autonomously initiates communication by sending a DO-A request message. This message includes device identification, a timestamp for data management, and an Active Time parameter indicating communication duration capability. 4. Traffic Routing and Optimization: The network elements, including AIoT readers and NG-RAN, manage traffic routing, ensuring efficient handling of DO-A messages. Duplicate data is identified and managed using timestamps, and session IDs are allocated for ongoing communications. 5. Authorization and Forwarding: The AIOTF verifies device context and authorizes traffic based on stored profile data. It forwards authorized traffic to the appropriate NEF, which then communicates with the requested AF. 6. Session Management: Subsequent communications utilize allocated session IDs, streamlining authorization processes and enabling direct traffic forwarding to known NEFs. This proposal aims to enhance AIoT network functionality by supporting autonomous device communication, optimizing energy use, and improving network efficiency.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.1.2 Procedures
Figure 6.1.2-1: Procedure for Enable 5G delivery AIoT device initiated traffic 0. The AIoT device profile per an AIoT device is provisioned in the ADM (AIoT specific UDM). The AIoT device profile includes the following parameters: - AIoT Device Permanent ID: Uniquely identifies the AIoT Device. - Last known AIOTF information: Indicates the last known AIOTF that served the AIoT device, or unknown. - AF ID together with NEF ID: Indicates which AFs the AIoT device is allowed to access and which NEFs are used for communication with the AFs. - Registration status: Indicates if the AIoT device is already registered with the network or not. 1. The AIoT device performs registration by sending a message containing its AIoT device ID to the AIoT reader. The reader forwards this message to the NG-RAN, which then passes it to the AIOTF for security validation. Upon successful authentication, the AIOTF updates the device profile status with the ADM, which responds with the updated profile data, including AF and NEF IDs, and provides a registration response message, which includes the registration result indicating whether it was successful or not to the AIoT device via the NG-RAN as well as the AIoT reader. 2. The AIOTF generates the AIoT device context which includes whether it is registered, which AFs it can access, and which NEFs should be used to communicate with the AFs. 3. When the AIoT device has something to send the network and has enough energy to do so, it initiates communication by sending the DO-A (Device Oriented-Autonomous) request message. This message includes the AIoT device ID (e.g., temporary ID, if it has been allocated by the network during the registration already) for the network to identify the AIoT device, timestamp indicating when this message was initiated, and the AIoT NAS message for the actual communication with the network and the AF (data consumer). The timestamp is later used by the network to perform data cleaning (e.g., removing data duplications). And the AIoT device ID and timestamp are not part of the AIoT NAS message to ensure they are understood by the AIoT reader and NG-RAN for proper traffic routing and optimization. The AIoT device also includes an Active Time parameter, which indicates how long the device can remain active to communicate with the network for subsequent messages. This Active Time can be zero if the AIoT device only had enough energy to send a single DO-A message. 4. The AIoT reader forwards the AIoT NAS message encapsulated over RRC to the serving NG-RAN. Additionally, the AIoT reader may send its AIoT reader ID, and the received AIoT device ID and timestamp. 5. The NG-RAN optionally checks if multiple AIoT readers are forwarding the same AIoT DO-A traffic from the same AIoT device by verifying the AIoT device ID, timestamp, and AIoT reader ID. This helps avoid sending the same traffic to the network multiple times unnecessarily. NOTE: Energy, Active Time and reader selection aspects depend on RAN WGs. 6. In the RRC response message, the NG-RAN optionally includes the information indicating whether the AIoT reader is selected for the subsequent communications or not. Based on this indication, the AIoT reader can determine whether to keep forwarding the DO-A traffic from the same AIoT device. If it determines not to continue, it shall no longer forward any traffic received from the same A-IoT device for the same AIoT session. The selected AIoT reader locally stores the AIoT device context information including the Active Time. 7. The NG-RAN forwards the AIoT device ID, timestamp and the message carrying the AIoT NAS message to the AMF over the N2 UL message, and the AMF subsequently forwards the received AIoT NAS message to the responsible AIOTF over the SBI interface. 8. The AIOTF verifies if an AIoT device context exists for the device identified by the AIoT device ID. If absent, it retrieves the AIoT device permanent ID and requests the ADM for the device profile data using this ID. Upon obtaining the profile data, the AIOTF authorizes the device to send DO-A traffic to the requested AF by matching the AF ID in the AIoT NAS message with those in the profile data. If duplicate data from the same device is received, the AIOTF retains only one instance based on the timestamp. It then allocates an AIoT session ID for future communications and updates the device context data as necessary. 9. Based on the AIoT device profile data, the AIOTF determines which NEF to forward the AIoT DO-A traffic to and forwards it, including the AIoT device ID, data, and AF ID. 10. The NEF forwards the received traffic to the requested AF, including the AIoT device ID and data. 11. In response to the message in step 7, the AIOTF sends an message carrying the AIoT device AIoT device ID and the AIoT NAS message over the N2 DL message. The AIoT NAS message contains the allocated session ID. 12. The NG-RAN forwards the message to the AIoT reader selected in step 5 over RRC. 13. The AIoT reader provides the DO-A response message to the AIoT device, including the received AIoT NAS message. The AIoT reader provides energy separately or together with the response message if the Active Time stored in the AIoT device context information is shorter than the time required to send the response and the network needs further messages from the AIoT device. 14. When the AIoT device wants to send additional data to the same AF it previously sent data to, the AIoT device includes the allocated session ID in the AIoT NAS message. This message is forwarded to the AIOTF using the same mechanisms explained in steps 4 to 7. 15. When the session ID is included in the AIoT NAS message and is valid, the AIOTF may skip the authorization checking and NEF discovery processes. 16. The AIOTF directly issues the notification message towards the known NEF. 17. The NEF forwards the received traffic to the requested AF, including the AIoT device ID and data.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.1.3 Impacts on Services, Entities and Interfaces
AIoT Device: - Energy Management: The AIoT device autonomously initiates communication based on its energy harvesting capabilities. - Timestamp support: The AIoT device provides time information indicating when the DO-A message was sent. AIoT Reader: - The AIoT reader forwards DO-A messages. - It may provide energy to AIoT devices if needed. - The reader manages session continuity based on network indications. AIOTF: - The AIOTF performs authorization checks to ensure devices are permitted to send DO-A traffic to specific AFs. - Allocation of session IDs for subsequent communications streamlines the process and reduces overhead for repeated authorizations. - Timestamp verification helps manage duplicate data. ADM: - The ADM maintains detailed device profiles, including registration status and access permissions. - Efficient retrieval and updating of device profiles are necessary to support the proposed procedures. NG-RAN: - The NG-RAN may need to implement mechanisms for selecting AIoT readers based on traffic patterns and device context.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.2 Solution #2: AIoT services support for DO-A capable AIoT Devices
223bf418b59ea1d3b400a69f37607082
23.700-30
6.2.0 High-level Solution Principles
This solution addresses Key Issue #2 "Support of DO-A Capable AIoT Devices". The solution combines registration-like procedure and data transfer procedure, and is based on the following general principles to support AIoT services for DO-A capable AIoT Devices: - The DO-A capable AIoT Device initiates registration-like procedure autonomously when it has pending data to be sent to the network. - After registration-like procedure, the AIOTF uses the Command Procedure as defined in TS 23.369 [3] to read the AIoT data from the AIoT Device and sends the AIoT data to the AF via the NEF.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.2.1 Description
This solution is applicable to both the Direct Connectivity and the Indirect Connectivity architectures as defined in TS 23.369 [3]. For a DO-A (Device-originated - autonomous) capable AIoT Device, the device originated traffic is triggered by the AIoT Device itself for, e.g. sending data to the network. The principles of this solution are as follows: - When a DO-A capable AIoT Device has pending data to be sent to the network, the AIoT Device sends Registration Request to the AIOTF. - The AIOTF authorizes and authenticates the AIoT Device and sends Registration Accept to the AIoT Device. - The AIOTF uses the Command Procedure as defined in TS 23.369 [3] to read the AIoT data from the AIoT Device. - The AIOTF sends the AIoT data received from the AIoT Device to the AF via the NEF.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.2.2 Procedures
Figure 6.2.2-1 describes the DO-A Procedure. Figure 6.2.2-1: DO-A Procedure 0. AIoT Device obtains radio resource for D2R message. Editor's note: How AIoT Device obtains radio resource for D2R message is FFS and is to be decided by RAN WGs. 1. The AIoT Device sends the AS D2R message (Registration Request) to the NG-RAN. The AS D2R message includes the AIOTF selection information including PLMN ID and/or NID and/or Third Party ID which is used by the NG-RAN to select the AIOTF. The Registration Request message is an AIoT NAS message and includes the AIoT Device ID and the Pending data indication indicating there is pending AIoT data in the AIoT Device. NOTE 1: The AS layer message in this step and the following steps are to be defined by RAN WGs. 2. The NG-RAN selects the AIOTF based on the AIOTF selection information received in step 1. Editor's note: Further details on AIOTF selection is FFS. 3. The NG-RAN sends the Uplink AIoT information message (Registration Request) to the AIOTF directly or via an AMF. 4. The AITOF performs Authorization and authentication procedure for the AIoT Device. NOTE 2: Security aspects are to be defined by SA WG3. 5. The AIOTF sends the Downlink AIoT information message (Registration Accept, AIOTF AIoT Device NGAP ID) to the NG-RAN directly or via the AMF. 6. The NG-RAN sends the AS R2D message (Registration Accept) to the AIoT Device. The Registration Accept message is an AIoT NAS message. 7. Based on the Pending data indication received, the AIOTF sends the Command Request message (NAS Command Request, AIOTF AIoT Device NGAP ID, Size of the Command Response message) to the NG-RAN directly or via the AMF. The NAS Command Request is Read Request. The AIOTF AIoT Device NGAP ID is used by the NG-RAN to determine the AIoT device context in NG-RAN. Editor's note: Other triggers for the Command Request are FFS. Editor's note: How AIOTF derives the parameters included in the NAS Command Request is FFS. Editor's note: Whether Registration Accept and NAS Command Request are separate or can be combined is FFS. 8. The NG-RAN sends the AS R2D message (NAS Command Request) to the AIoT Device. 9. The AIoT Device sends the D2R message (NAS Command Response) to the NG-RAN. The NAS Command Response is Read Response and includes the AIoT data. 10. The NG-RAN sends the Command Response message (NAS Command Response, AIOTF AIoT Device NGAP ID) to the AIOTF directly or via the AMF. The AIOTF determines the AIoT device context by the AIOTF AIoT Device NGAP ID received. 11. The AIOTF reports the AIoT data to the AF via the NEF. Editor's note: Details on routing of AIoT data from the AIOTF to the AF via the NEF is FFS.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.2.3 Impacts on Services, Entities and Interfaces
Editor's note: This clause captures impacts on existing services, entities and interfaces.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.3 Solution #3: Support of Sensor Data Collection
223bf418b59ea1d3b400a69f37607082
23.700-30
6.3.0 High-level solution Principles
This solution addresses KI #2. It includes a Service Request from AF to 5GS, Parameter Configuration for the service, and Data Transfer for the service
223bf418b59ea1d3b400a69f37607082
23.700-30
6.3.1 Description
The solution is based on the following assumptions: - Sensor Data Collection Service utilizes Periodic DO-A Sensor Data Collection Service from Device including AF, AIOTF, and AIoT Device. It uses Read/Write command type with the parameter Period or separate command types. - Sensor Data Collection Service utilizes Periodic DO-A Sensor Data Transfer (Device, AIoT Reader, AIOTF). - Sensor Data Collection Service Parameters can be pre-configured on AioT Devices or configured by AF. For example, Sensing Period and StartTime. - The AIoT Reader maintains (Device ID and Correlation ID) context for every periodic behaviour.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.3.2 Procedures
The procedure is shown in Figure 6.3.2-1. It includes Service Request from AF to 5GS, Parameter Configuration for the Service, and Data Transfer for the Service. Figure 6.3.2-1: Sensor Data Collection Procedure 1. Step 1 to step 6 of Procedure for Command in clause 6.2.3 of TS 23.369 [3] with additional parameters. AF sends AIoT Command Request to NEF. In includes Device(s) Info, Location (External), AF Transaction ID, Command Type Read, Sensing Result Offset, Length, Period, and Sensing Parameters ([Sensing Period Offset, Period], [StartTime Offset, Now/time/Off]). Sensing Parameters are optional. NEF selects AIOTF, and then NEF sends AIoT Command Request to AIOTF. AIOTF checks AF Authorization by retrieving AF Authorization Profile in ADM. AIOTF sends AIoT Command Response to NEF. It includes Status (Success/Failure), Transaction ID. NEF sends AIoT Command Response to AF. It includes Status (Success/Failure), AF Transaction ID. 2. Step 7 to step 10 of Procedure for Inventory in clause 6.2.2 of TS 23.369 [3] 3. AIOTF retrieves Device Profile Data Including DO-A Capability. If the device does not support DO-A Capability, steps 15 to 19 are skipped. 4a~8a, 4b~8b. Parameter configuration with Write Command can be done instead of parameter configuration included in steps 4~8. 4. AIOTF sends AIoT Command Request to AIoT Reader. This includes Device ID (temporary), (Reader ID), Command Type Read, Correlation ID, Sensing Result Offset, Length, Period, and Sensing Parameters ([Sensing Period Offset, Period], [StartTime Offset, Now/time/Off]). AIoT Reader stores Correlation ID with AIoT Device ID as context data. 5. AIoT Reader sends AIoT Command Request to AIoT Device. This includes Device ID (temporary), (Reader ID), Command Type Read, Correlation ID, Sensing Result Offset, Length, Period, and Sensing Parameters ([Sensing Period Offset, Period], [StartTime Offset, Now/time/Off]). When 4a~8a, 4b~8b are done, Sensing Parameters are omitted. 6. When AIoT Device receives Period with Command Type Read, it starts periodic Read behavior based on the Period value. When AIoT Device receives Sensing Parameters, it sets the parameters to the device. For example, it sets Sensing Period to a specific Period, and/or sets StartTime to Now, a specific time, or Off. If StartTime is set to Now, the device reads and report Sensor Result immediately and every Period. If StartTime is set to a specific time, then the device reads and reports Sensor Result at that time and every Period after that. If StartTime is set to Off, the device reads and reports Sensor Result once, then stops periodic reading and transfer. 7. AIoT Device sends AIoT Command Response to AIoT Reader. This includes Device ID (temporary), and Sensing Result. 8. AIoT Reader sends AIoT Command Response to AIOTF. This includes Device ID (temporary), Sensing Result, and Correlation ID. AIoT Reader retrieves Correlation ID with AIoT Device ID from the stored context. 9. AIOTF sends AIoT Command Notify to NEF. This includes Device ID (permanent), Sensing Result, and Transaction ID. AIOTF retrieves Transaction ID with Correlation ID from the stored context. 10. NEF sends AIoT Command Notify to AF. This includes Device ID (permanent), Sensing Result, and AF Transaction ID. NEF retrieves AF Transaction ID with Transaction ID from the stored context. 11. Every Period, when the energy is enough, the device reads and reports Sensor Result. Depending on the size of the report, the radio resource allocation procedure may vary. Editor's note: How the AIoT Device supports timer is FFS. 12. AIoT Device sends AIoT Command Report to AIoT Reader. This includes Device ID (temporary), Sensing Result. 13. AIoT Reader sends AIoT Command Report to AIOTF. This includes Device ID (temporary), Sensing Result, and Correlation ID. AIoT Reader retrieves Correlation ID with AIoT Device ID from the stored context. If the context is not stored, AIoT Reader sends AIoT Command Report with Device ID (temporary), Sensing Result, and temp-Correlation ID, which AIoT Reader generates as indication of empty Correlation ID. 14. AIOTF sends AIoT Command Notify to NEF. This includes Device ID (permanent), Sensing Result, and Transaction ID. AIOTF retrieves Transaction ID with Correlation ID from the stored context. If step 13 includes temp-Correlation ID, AIOTF retrieves Transaction ID with Device ID (temporary). 15. NEF sends AIoT Command Notify to AF. This includes Device ID (permanent), Sensing Result, AF Transaction ID. NEF retrieves AF Transaction ID with Transaction ID from the stored context.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.3.3 Impacts on services, entities and interfaces
Impacts on existing entities: AIOTF: - Receives AIoT Command Request for Sensor Data Collection Service from AF through NEF. - Performs Inventory procedure and then sends Read Command Request with Period and Sensing Parameters. - Performs Inventory procedure and then sends Write Command Request with Sensing Parameters. - Retrieves Device Profile Data including DO-A Capability. If the device does not support DO-A Capability, AIOTF skips DO-A related steps. - Receives AIoT Command Report from Device(s) through AIoT Reader(s) and delivers it to the AF through the NEF. - Sends AIoT Command Notify to AF via NEF. ADM: - Supports the AIoT Device profile, including DO-A Capability. AIoT Reader: - Supports the AIoT TempID handling, including Device ID and Correlation ID mapping, and maintains the mapping context. - Supports DO-A procedure for AIoT Command Report from AIoT Device(s). AIoT Device: - Supports DO-A procedure for AIoT Command Report from AIoT Device. - Reads and reports Sensing Data to AIoT Reader periodically via the DO-A procedure. - Supports timer. - Considers energy status for its behaviour. - Sets Sensing Parameters and behave according to the Sensing Parameters. - Performs radio resource allocation procedure depending on the size of the report.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.4 Solution #4: Architecture enhancements to support DO-A capable devices
223bf418b59ea1d3b400a69f37607082
23.700-30
6.4.0 High-level solution Principles
This solution proposes call flows to support registration and handling of DO-A capable devices. The solution builds upon an AF request that is to be carried out more than once. The core network uses legacy inventory procedure to find Ambient IoT devices. The Ambient IoT devices indicates their support for registration in the inventory response. The core network registers the device and after that keeps the path back to AF alive. In addition, a UE capability like procedure is provided so that the core network can ask each device for supported features.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.4.1 Description
The Ambient IoT devices of type 2b/c may be able to initiate communication independently with the help of DO-A traffic. This solution builds on the principle that the Ambient IoT device indicates support for registration in response to an AIoT paging message. The support for registration may also be seen as an indication for support of DO-A communication. Registration like procedure is proposed, to ensure the operator can properly control which devices are allowed to send data in the licensed spectrum owned by the operator. The solution does not take a stance on whether the reader prefers to use regular paging or activate DO-A resources for the Ambient IoT device. Further the solution proposes a complementary procedure allowing the network to ask the Ambient IoT device for supported features. This may be helpful if Ambient IoT devices are to support many features and/or if the Ambient IoT device subscription on network side is minimalistic. Another aspect being considered is that features may not always be available, if the battery is low, DO-A communication may not be possible, the device may not have enough power to use an attached sensor etc.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.4.2 Procedures
223bf418b59ea1d3b400a69f37607082
23.700-30
6.4.2.1 Ambient IoT device registration and DO-A execution
Figure 6.4.2.1-1: Ambient IoT device registration and DO-A execution 1. The AF sends Nnef_AIoT_Inventory/Command Request (DO-A dependent service request) to the NEF with a service request that is dependent on DO-A. For example, regular reporting of temperature, etc. 2. NEF selects AIOTF as specified in TS 23.369 [3]. 3. Naiotf_AIOT_Inventory/Command request (DO-A dependent service request) is sent to the selected AIOTF. 4. The AIOTF determines registration is required based on the service being DO-A dependent. 5. AIOTF sends NGAP Inventory Request message (Inventory request transfer (A-IoT Device Identification Requested, Follow on Command Indication)) to the reader. 6. NGAP Inventory Response (). 7. AIoT paging occurs. 8. Ambient IoT NAS Inventory Response message (Registration capability indication, Ambient IoT device ID) is sent to the reader from the Ambient IoT device. The registration capability indication is used to indicate to the network this device is capable of registration. It may also be seen as an implicit indication the Ambient IoT device support DO-A communication. Editor's note: Whether security is required to protect the registration capability indication is FFS. 9. NGAP Inventory Report message (Inventory Report Transfer (Ambient IoT NAS Inventory Response message (Registration capability indication, Ambient IoT device ID), RAN A-IoT Device NGAP ID) is sent from reader to AIOTF. 10. Based on receiving the registration capability indication, the AIOTF determines to attempt registering the Ambient IoT device. 11. The AIOTF sends Nadm_Registration request message (Ambient IoT device ID, AIOTF ID) to the ADM. 12. The ADM determines Ambient IoT device is authorized to register with the network. For example, this can be based on subscription data. 13. Upon successful authorization, the ADM register the AIOTF ID for the Ambient IoT device in the ADM. 14. The ADM sends Nadm_Registration response message (Ambient IoT device ID, result) to the AIOTF, providing the result of the registration attempt. 15. The AIOTF sends NGAP Command Request message (Command request transfer(RAN A-IoT Device NGAP ID, Keep context indication, A-IoT NAS PDU (Command (Registration accept)))) to the reader. Keep context indication is used as an expansion of follow on command indication. Since the DO-A communication may occur over a long time, the reader needs to be able to route DO-A communication over potentially a long time. 16. The reader sends Reader 2 device message (A-IoT NAS PDU (Registration accept)) to the Ambient IoT device. 17. The AIOTF sends NGAP Command Request message (Command request transfer (RAN A-IoT Device NGAP ID, DO-A service indication, A-IoT NAS PDU (DO-A dependent service request payload))) to the reader. The DO-A service indication may be used by the reader to determine whether to activate DO-A or do regular paging for the DO-A service. 18. Execute the DO-A dependent service request. How the reader and Ambient IoT device configures is out of scope for this solution. After this, the Ambient IoT device can send data autonomously. Editor's note: Data delivery details are FFS. Editor's note: RAN working group coordination is required to determine context storage aspects in gNB.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.4.2.2 AIoT device capability syncronization
Editor’s note: It is FFS whether this procedure is needed. Figure 6.4.2.2-1: AIoT device capability synchronization 1. The AIOTF sends NGAP Command Request message (Command request transfer (RAN A-IoT Device NGAP ID, first A-IoT NAS PDU (Command (AIoT device capability request indication)))) to the reader. The AIOT device capability request indication in the command is used by the Ambient IoT device to determine to send AIoT device capability container information element. 2. The reader sends Reader 2 device message (first A-IoT NAS PDU (AIoT device capability request indication)))) to the Ambient IoT device. 3. The Ambient IoT device sends Device to reader message (second A-IoT NAS PDU (AIoT device capability container information element) to the reader. The AIoT device capability container information element can indicate support for DO-A, power saving features, security capabilities, available sensor(s) etc. 4. The reader sends NGAP Command response message (Command Response Transfer (AIoT device capability container information element), RAN A-IoT Device NGAP ID) to the AIOTF. 5. The AIOTF sends Nadm_DM_Update Request (Ambient IoT device ID, AIoT device capabilities) to the ADM with the purpose of registering the AIoT device capabilities with the subscription data of the Ambient IoT device. 6. The ADM sends Nadm_DM_Update Response (result) to the AIOTF.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.4.3 Impacts on Services, Entities and Interfaces
AIOTF: - Support registration of AIoT devices. - Support AIoT capabilities. Reader: - Context handling for DO-A devices. ADM: - Registration. - AIOT device capabilities. AIoT device: - Registration. - AIOT device capabilities. - DO-A. 6.5X Solution #5X: DO-A procedure with configured routing information 6.X5.0 High-level solution Principles This solution aims to resolve KI#2 to support DO-A Capable AIoT Devices, the following principles are followed in this solution: - This solution has reused the architecture defined in clause 4.2.2 in TS 23.369 [X3]. This solution is applied to both direct connectivity and indirect connectivity for Topology 1. - The AIoT Device is not required to perform the registration procedure first before sending the DO-A data. - AIoT Device sends the DO-A routing information along with the DO-A message for AIOTF to find the proper AF. - AF subscribes to the DO-A Data notify by sending a Subscribe Request to the AIOTF (optionally via the NEF). - AIOTF derives the corresponding AF according to the routing information in the NAS DO-A Data Transfer Request message and the context generated in DO-A data subscribe procedure. 6.X5.1 Description This solution resolves KI#2 for support of DO-A Capable AIoT Devices. This solution has the following assumptions: 1) AIoT Device is pre-configured or configured by the network with DO-A routing information. 2) AIoT Device sends the DO-A routing information along with the DO-A message for AIOTF to find the proper AF. 3) The NG-RAN selects the correlated AIOTF according to AIOTF information in the temp ID if a temp ID is included in the D2R AS message. 4) AF subscribes to the DO-A Data notify by sending a Subscribe Request to the AIOTF (optionally via the NEF). AIOTF updates AIoT DO-A Profile in ADM with the associated AF subscription. 5) AIOTF receiving the DO-A data can query the ADM to find the DO-A data associated AIOTF(s) and forward the received DO-A data to the associated AIOTF(s). 6) AIOTF derives the corresponding AF according to the routing information in the NAS DO-A Data Transfer Request message and the associated (AF) Transaction ID used in DO-A data subscribe procedure. 6.X5.2 Procedures 6.X5.2.1 DO-A data subscribe procedure Figure 6.x5.2-1: Figure for DO-A data subscribe procedure 1. The AF sends the DO-A data subscribe request to NEF with AF ID and target AIoT device information to subscribe for the notification of the DoA data. 2. NEF performs AIOTF selection based on the target AIoT device information. 3. The NEF sends the DO-A data subscribe request to the selected AIOTF with a Transaction ID. 4. The AIOTF authorizes the AF request to check whether the AF is allowed to subscribe to DO-A delivery, based on the AF authorization data stored in the ADM. 5. If authorization succeeded, the AIOTF updates AIoT DO-A Profile in ADM with the associated AF subscription. 6. If the AIOT device is not pre-configured, the AIOTF allocates the routing information for the DO-A data transfer and configure the AIOT device via e.g. AIoT Command procedure defined in clause  6.2.2 in TS  23.369  [X3]. In this step, the AIOTF may also allocate a Temp ID to AIoT Device for NAS DOA Data Transfer. 7. AIOTF sends response to the NEF with a Transaction ID for the DO-A data subscribe request. 8. NEF sends response to AF with AF Transaction ID for the DO-A data subscribe request. 6.X5.2.2 DO-A data transfer procedure Figure 6.x5.2-2: Procedure for DO-A procedure with configured routing information 0. DoA routing information (e.g. AF ID or AIOTF allocated DO-A association ID) at the AIoT device side or configured by the network as defined in clause 6.X5.2.2.1.. Security information for DO-A traffic may also be pre-configured or configured along with the DoA routing information. Editor’s note: DO-A traffic security mechanism will be determined by SA WG3. 1. The AIoT Device decides to trigger a DO-A message (e.g. detecting DO-A trigger broadcast signal, etc.). Editor's note: DO-A trigger broadcast signal is further defined in RAN WGs. 2. The AIoT Device sends the AS D2R message (Temp ID, NAS DOA Data Transfer Request message (DO-A data, AIoT device ID, routing information)) to the NG-RAN. AIoT device ID may be a permanent Device ID or Temp Device ID. The temp ID is also provided in the AS D2R message if the AIOTF has allocated a Temp ID to AIoT Device during or after the Command procedure, or during the previous DO-A Data Transfer procedure. 3. The NG-RAN allocates an NGAP ID for the AIoT device and forwards the NAS DO-A Data Transfer Request message in Initial DO-A message to the AIOTF. If a temp ID is included AS D2R message, the NG-RAN can select the AIOTF according to the temp ID. If the temp ID is not included in AS D2R message or the AIOTF derived from the AIOTF in the temp ID can not be selected, the NG-RAN can select an AIOTF which can serve the AIoT Device. The selected AIOTF can query the ADM to find the DO-A data associated AIOTF(s) and forward the received DO-A data to the associated AIOTF(s) Editor’s note: Whether and how temp ID can be used to find the AIOTF is FFS. 4. Upon receiving the Initial DO-A Message, the AIOTF performs a device check with device profile data retrieved from the ADM to validate the AIoT device. Editor's note: Details for device check for DO-A Data Transfer procedure will be determined by SA WG3. 5. After the successful device check, the AIOTF derives the corresponding AF according to the routing information in the NAS DO-A Data Transfer Request message and the associated Transaction ID received in step 3 of clause  6.X5.2.1. The AIOTF sends the Naiotf_AIoT_Data Transfer message including the DO-A data and AIoT Device ID to the NEF. 6. The NEF invokes the AIoT_Data Transfer service to forward the DO-A data to the AF according to the AF Transaction ID and AF ID used in DO-A data subscribe procedure. 7. The AF sends the AIoT_Data Transfer_Response to NEF with AIoT device ID and the response to the DoA data, which may include further data or acknowledgments related to the DO-A Data Transfer process. 8. The NEF invokes AIoT_Data Transfer_Response to AIOTF. The message includes the DO-A data response and related AIoT device ID. 9. The AIOTF allocates an NGAP ID for the AIoT device and sends DL NAS message to NG-RAN with the DO-A data response. In this step, the AIOTF may also allocate a Temp ID to AIoT Device NAS DOA Data Transfer Response message. Editor’s note: Whether inventory procedure for the DL NAS messages transfer is needed is FFS. 10. The NG-RAN sends the AS R2D message to the AIoT device including the NAS message. 6.X5.3 Impacts on services, entities and interfaces The solution has impacts on the following entities: AIoT Device: - Support to initiate DO-A message transfer procedure and send routing information along with the DO-A data. AIOTF: - Support to route the DO-A message to proper NEF/AF according to the routing information. NG-RAN: - Support to select the AIOTF based on the temp ID if provided by the AIoT device. - Support to establish NGAP connection with AIOTF for DO-A message transfer. 6.X6 Solution #X6: Support Reporting operator triggered by events without registration for DO-A capable AIoT Devices 6.X6.0 High-level Solution Principles This solution addresses Key Issue #2 "Support of DO-A Capable AIoT Devices". AIoT device sends report message when triggered by events, includes pending data, power on, device specific events (e.g., temperature higher than a threshold). The information for the device specific events can be provisioned by AF via Command operation, e.g., writing the threshold to the AIoT device. 6.X6.1 Description This solution is applicable to both the Direct Connectivity and the Indirect Connectivity architectures as defined in TS 23.369 [3]. For a DO-A capable AIoT Device, the device is triggered by events to report its presence and/or send data to the network. The principles of this solution are as follows: - No registration-like procedure needed for the DO-A capable AIoT Device. - The AIOTF for routing the DO-A report and the AIOTF for inventory and command operations can be different. - The events triggered DO-A report includes target AF and may include data from the AIoT Device. 6.X6.2 Procedures Figure 6.X6.2-1 describes the Reporting procedure from DO-A capable AIoT Device. Figure 6.X6.2-1: DO-A device reporting procedure 0. The AIoT device is pre-configured with target AF information, e.g., FQDN, by the owner of the AIoT device for routing the information in the Report Request. Allowed AF(s) may be pre-configured in the AIoT device profile data in ADM. The information for device specific events may be provisioned by the AF using the Command operation, e.g., write a shareshold related to a device specific event to the AIoT device. NOTE 1: The allowed AF(s) in the ADM can be changed via OAM. The target AF information may be configured by the owner of the device via Inventory and Command operator. 1. The AF subscribes to the NEF with the AF information and optional the service area. The NEF selects AIOTF(s), e.g., based on pre-configuration or the service area, and subscribes to the selected AIOTF(s). NOTE 2: It is assumed all the AIOoTFs serving the service area and/or serving the AF are subscribed by the NEF. 2. The AIoT device is triggered by events, e.g., pending data, power on, or device specific events. 3. The AIoT device sends D2R message including AIoT NAS Report Request (Device ID, target AF, [data]) to the RAN Reader. In case there are pending data in the AIoT device, the data is included in the AIoT NAS Report Request message. Editor's note: How the AIoT device sends the D2R message to the RAN Reader is FFS. Editor's note: Whether the solution is applicable for UE Reader case is FFS. NOTE 3: Security aspects related to the Device ID and the data protection are to be defined by SA WG3. 4. The NG-RAN selects an AIoOTF, e.g., based on local policy or pre-configuration. 5. The NG-RAN sends a N2 request message (indirect) or AIOT2 request message (direct) including the Reader ID and the AIOT NAS Report Request message towards the selected AIOTF. 6. The AIOTF requests authorization data from ADM. 7. The AIOTF authorizes the Report Request from the device, e.g., based on whether the target AF is in the allowed AF(s) per the device, per the group of the device, or per the network, whether the device is allowed to initiate Report Request, whether the location is allowed to send the report per the device, etc. If the authorization of report from the AIoT device is successful, goes to step 8, otherwise goes to step 9 with proper cuause value. 8. The AIOTF maps the Reader ID into location information, and sends a Notify (Device ID, location info, [data]) message towards the AF via the NEF based on the target AF. The NEF forwards the Notify message towards the AF. 9. The AIOTF responds to the RAN Reader. The AIOTF may update the last known reader information in the AIoT device profile data in the ADM. 10. The RAN Reader sends R2D message to the AIoT Device. 6.X6.3 Impacts on Services, Entities and Interfaces Editor's note: This clause captures impacts on existing services, entities and interfaces. AIoT Device: - Support initiate Report Request procedure triggered by events. NG-RAN: - Support AIOTF selection. AIOTF: - Support Report Request authorization. - Support sending Device ID, location information, and optional data to target AF indicated in the Report Request. NEF: - Support managing AF sessions for AIOT service between AFs and AIOTFs. ADM: - Support providing authorization data to AIOTF when requested. 6.X7 Solution #7: DO-A procedure for DO-A Capable AIoT Devices 6.X7.0 High-level solution Principles This solution is for Key Issue #2, corresponding to bullet 3: How an AIoT Device sends data to the AIOTF autonomously. It includes DO-A procedure to send data to the AIOTF, get network resource/assistance information to initial DO-A procedure, and DO-A policy information which describe when will perform the DO-A procedure. 6.X7.1 Description This solution is for Key Issue #2, corresponding to bullet 3: How an AIoT Device sends data to the AIOTF autonomously. This solution is to support for an DO-A Capable AIoT Device autonomously originated DO-A procedure to send data to the AIOTF, and support for routing the received data by AIOTF to AF. The main points are as following: - The DO-A Capable AIoT Devices support autonomously originating DO-A procedure to send data to the AIOTF. - The DO-A Capable AIoT Device has pre-configurated network resource/assistance information(e.g. frequency, Qos, Resource Expiration Date, etc) for autonomously originating DO-A procedure; or support to receive the network resource information/assistance information (e.g. frequency, QosS, Resource Expiration Date, etc) from the network for autonomously originating DO-A procedure, using by AIoT write commands or new AIoT service, or network system information etc. NOTE  1: How to get and the details of the network resource/assistance information for autonomously originating DO-A procedure will be coordinated with RAN WG2. - When the DO-A Capable AIoT Device will autonomously originates DO-A procedure to send data, is based on the DO-A policy information. The DO-A policy information may be received from network or AF via the network, which send by AF using AIoT write commands or some new AIoT service. Or the DO-A policy information can be pre-configurated in the AIoT device or UICC if have. - The DO-A policy information may includes: - Target information: identify where and which AF the DOA data sends/routes to by AIoT device, for example AF identify, etc; - Service policy: describe when and how the AIoTt device autonomously originated to send DOA datas, such as: 9:00 am every day, when the timer expired, the upper layer initials, etc. NOTE  2: The details of DO-A policy are coordinated between the operator and AF vender, which is out of 3GPP scope. - The DO-A Capable AIoT Device supports to autonomously originating procedure to send data to the AIOTF, and support for routing the received data by AIOTF. The procedure may includes: security data, target information and the data information. The securuity data is used for the network authentication AIoT device; and the target information is used to identify where and which AF the DOA data sends/routes to, for example AF identify, etc; the data information is the real data which the AIoT device wants to send for AF. 6.X7.2 Procedures The following figure presents a DO-A procedure for DO-A Capable AIoT Devices for Topology 1 and Topology 2. Figure 6.x7.2-1: DO-A procedure for DO-A Capable AIoT Devices 0-a. DO-A Capable AIoT Devices may be pre-configured with network resource/assistance information(e.g. frequency, QoSs, Resource Expiration Date, etc) for autonomously originating DO-A procedure. 0-b. DO-A Capable AIoT Devices may be pre-configured with DO-A policy information for autonomously originating DO-A procedure. NOTE  31: How information is configured into AIoT device is out of scope of 3GPP. NOTE  42: How to get and the details of the network resource/assistance information for autonomously originating DO-A procedure will be coordinated with RAN WG2. 1. AF sends like DO-A service request to NEF via AIoT write command or new AIoT Service, it may includes following parameters: AIoT devices ID, AF ID, DO-A policy information, and so on. - DO-A policy information may includes: - Target information: identify where and which AF the DOA data sends/routes to by AIoT device, for example AF identify, etc; - Service policy: describe when and how the AIoTt device autonomously originated to send DOA datas, such as: 9:00 am every day, when the timer expired, the upper layer initials, etc. NOTE  53: The details of DO-A policy are coordinated between the operator and AF vender, which is out of 3GPP. 2. AIOoTF/NEF receives the DO-A service request from AF, and will check the authorization of AF and the authorization of DO-A Capable of AIoT devices based on the subscription in ADM. If it is allowed, the network function(e.g. AIOoTF or RAN/UE reader) will send the network resource information/assistance information(e.g. frequency, QoSs, Resource Expiration Date, etc) for DO-A Capable of AIoT devices autonomously originating DO-A procedure. DO-A Capable of AIoT devices receives these network resource information/assistance information. 3. AIOoTF/NEF sends the DO-A policy information from AF to DO-A Capable of AIoT devices. DO-A Capable of AIoT devices receives these DO-A policy information. 4. DO-A Capable of AIoT devices store these receiving network resource and/or DO-A policy information for DO-A procedure from network. 5. When DO-A policy information is applied, for example: the timers from the DO-A policy information expired, the DO-A Capable of AIoT device performs the DO-A procedure. 6. The DO-A Capable of AIoT device sends DO-A data to network/AF via RAN/UE Reader, using the storing or pre-configured network resource. The procedure may includes: security data, target information and the data information. The securuity data is used for the network authentication AIoT device; and the target information is used to identify where and which AF the DOA data sends/routes to, for example AF identify, etc; the data information is the real data which the AIoT device wants to send for AF. 7. RAN/UE Reader routes the DO-A Data from AIoT device to AF via AIiOoTF based on the target information provided by AIoT device or other solutions. Editor’s note: How the RAN/UE Reader routes the DO-A Data to AF will be coordinated with solutions for KI 2 bullet of “Support for routing the data received by AIOTF from an AIoT Device to an AF”, or be FFS. 6.X7.3 Impacts on services, entities and interfaces NEF: - Supports AF to provide DO-A policy informaitoninformation; AIOoTF: - Supports to receive DO-A data from DO-A capcablecapable AIoT Device and route for AF; - Supports to provide network resource/assistance information(e.g. frequency, Resource Expiration Date, etc) for AIoT Device DO-A procedure; RAN Reader or UE Reader: - Supports to receive DO-A data from DO-A capcablecapable AIoT Device and route for AIOoTF; - Supports to provide network resource/assistance information(e.g. frequency, Resource Expiration Date, etc) for AIoT Device DO-A procedure; AIoT Device: - Pre-configured or stores network resource/assistance information(e.g. frequency, Resource Expiration Date, etc) and/or DO-A policy information; - Performing DO-A procedure once it is needed to send DO-A data. - Support DO-A Policy(e.g. timer) NOTEote 6: How the AIoT device support DO-A Policy, e.g. timer, is up to UE implementation. 6.X8 Solution #X8: Service Procedure for DO-A Capable AIoT Devices 6.X8.0 High-level solution Principles This solution addresses Key Issue #2 "Support of DO-A Capable AIoT Devices", especially the following aspects: - How the AIoT Device informs the network of its presence autonomously (e.g., an AIoT Device initiated registration-like procedure) and what are the triggers for the DO-A capable device to inform the network of its presence. - How an AIoT Device sends data to the AIOTF autonomously. - Support for routing the data received by AIOTF from an AIoT Device to an AF. The solution defines two types of DO-A messages sent from the AIoT Device: one is initiating message which is used to determine the serving AIOTF for the AIoT Device; another is DO-A data transfer message which is used to transfer AIoT data from the AIoT Device to the AF through the core network. This solution also proposes call flows for initiating message and DO-A data transfer message. In addition, an AF subscription procedure is provided so that the AF can subscribe the AIoT data from a specific AIOT Device. 6.X8.1 Description The Ambient IoT devices of type 2b/c may initiate communication independently with DO-A traffic. This solution is applicable to both the Direct Connectivity and the Indirect Connectivity architectures for Topology 1. The principles of this solution are as follows: - Two types of DO-A messages sent from the AIoT Device: one is initiating message which is used to determine the serving AIOTF for the AIoT Device; another is DO-A data transfer message which is used to transfer AIoT data from the AIoT Device. - The procedure for initiating message to determine the serving AIOTF for the AIoT Device is proposed. - The procedure for DO-A data transfer frjom the AIoT Device is proposed. - The procedure for AF subscription for the AIoT data from a specific AIoT Device is proposed. - The ADM is used to store the serving AIOTF for the AIoT Device and the subscription relationship between the AIoT Device and the AF. - The AIOTF stores the subscription relationship between the AIoT Device and the AF and sends the AIoT data received from the AIoT Device to the AF via the NEF. 6.X8.2 Procedures 6.8X.2.1 Initiating message and data transfer procedure Figure 6.X8.2.1-1: Initiating message and data transfer procedure 0. The AIoT Device decides to trigger an initiating message based on some conditions, e.g. the AIoT Device needs to report AIoT data such as sensing data detected, the time for periodic reporting arrives, or the AIoT Device moves to a new position. In this stage the AIoT Device has no serving AIOTF available. Editor’s note: Whether using registration like procedure instead of this initiating message procedure is FFSS. 1. The AIoT Device sends the initiating message to the NG-RAN. The initiating message includes the AIoT Device ID information, optional pending data transfer indication. 2. The NG-RAN selects the serving AIOTF for the AIoT Device, taking into account the Device ID information, the PLMN ID and NID, and/or the AIoT area which this AIoT Device belongs to. 3. The NG-RAN sends the initiating message to the selected AIOTF directly (for direct connectivity option) or via an AMF (for indirect connectivity option); the initiating message includes the AIoT Device ID information. 4. The AIOTF discovers the serving ADM and interacts with the ADM to fetch the subscription information and may update the AIoT Device information stored in the ADM. 5. The ADM updates the AIoT Device information and the Device’s serving AIOTF information. 6. The AIOTF sends the initiating message response with the serving AIOTF ID to the NG-RAN directly or via the AMF. Editor’s note: The details of AIoT Device or Temporary ID used in the initiating request/response message is FFSS. 7. The NG-RAN sends the initiating message response with the serving AIOTF ID to the AIoT Device. The AIoT Device stores the serving AIOTF ID 8. The AIoT Device decides to trigger an AIoT data transfer message when the AIoT Device needs to report AIoT data such as sensing data detected, or the time for periodic reporting arrives. 9. The AIoT Device sends the data transfer message to the NG-RAN. The data transfer message includes the AIoT Device ID information, the AIoT data, and its serving AIOTF ID. 10. The NG-RAN sends the data transfer message to the indicated AIOTF. 11. The AIOTF sends the data transfer message response to the AIoT Device through NG-RAN. 12. The AIOTF finds the AF subscribing to the AIoT data of the AIoT Device, and then transmits the data transfer message to the NEF which serves the AF. The AF subscribing procedure is described in clause  6.X8.2.2. NOTE: The ADM may store the information of the subscription relationship between an AF and the AIoT Device; in this case, the AIOTF interacts with the ADM to fetch this subscription information. 13. The NEF transmits the data transfer message to the AF. 14. The AF may send back the data transfer message response to the AIOTF through the NEF. 6.X8.2.2 AF subscription procedure Figure 6.X8.2.2-1: AF subscription procedure 1. If an AF decides to subscribe the AIoT data from a specific AIoT Device, the AF sends a subscription request to the NEF. The subscription request includes the AIoT Device ID, AF ID. 2. The NEF discovers an ADM based on the AIoT Device ID and interacts with the selected ADM to fetch the serving AIOTF for this AIoT Device. NOTE: The ADM may store the information of the subscription relationship between the AF and the AIoT Device. 3. The NEF transmits the subscription request to the AIOTF serving the AIoT Device. The subscription request includes the AIoT Device ID, AF ID. 4. The AIOTF stores the information of the subscription relationship between the AF and the AIoT Device. 5. The AIOTF sends the subscription response to the NEF to indicate the subscription request successes or fails. 6. The NEF transmits the subscription response the AF. 6.X8.3 Impacts on Services, Entities and Interfaces AIOTF: - Handle the AIoT data of AIoT Devices. - Interact with the ADM to store the AIoT Device information. - Store the subscription information. NG-RAN: - Select the AIOoTF serving the AIoT Device. - Route the messages between the AIoT Device and the AIOTF. ADM: - Store the AIoT Device information. - Optionally store the subscription information. AIoT Device: - Send DO-A initiating messages. - Send DO-A data transfer messages. NEF: - Route the messages between the AF and the AIOTF 6.X9 Solution #X9: Autonomous registration and data transfer from AIoT Device 6.X9.0 High-level solution Principles The following principles apply: - The Reader broadcasts system information that defines contention-based uplink resources for initial access of AIoT Device. - An AIoT Device, upon power-on or sensing an event to report, uses the broadcasted information to autonomously register and once registered to the network, it can transmit data to the AF via the network. - The AIOTF is enhanced to support the AF request for the DO-A activation, handle registration and data transfer request from the DO-A capable AIoT Device forwarded by the Reader, authenticate and authorize the request, create device context, respond to the AIoT Device with the assigned temporary ID. Editor’s note: The need for the request from AIOTF to the NG-RAN for broadcasting access parameters is FFS. 6.X9.1 Description This solution addresses Key Issues #2 by defining the procedure for the DO-A capable AIoT Device applicable to both Topology 1 (using RAN Readers) and Topology 2 (using UE Readers). It enables a DO-A capable AIoT Device to trigger its own registration with the network to autonomously inform the network of its presence without a prior network command and to send data to the designated AF based on the AF requested DO-A activation. 6.X9.2 Procedures The DO-A procedure can be initiated by the AF to request the activation for one or more DO-A capable AIoT Devices or a group of DO-A capable AIoT Devices in an area to execute the autonomous registration and data transfer. The DO-A procedure can be also activated based on configuration in the network. In this case, the AIOTF is configured with information to select NG-RAN node(s) and optionally Readers and send DO-A activation request. 6.X9.2.1 DO-A procedure for Topology 1 Figure 6.X9.2.1-1: Device initiated Registration and Data Transfer procedure for Topology 1 1. The AF requests for the AIoT DO-A activation which may include the External Target Area information and/or information about the target AIoT Device(s) to the NEF. Editor’s note: How to handle and coordinate the requests from multiple AFs is FFS. 2. The NEF selects the AIOTF(s) as described in clause 5.3.1 of TS 23.369 [x3] and sends the AIoT DO-A activation request from the AF to the selected AIOTF(s). 3. The AIOTF selects NG-RAN node(s) and optionally RAN readers based on the configured NG-RAN node selection information. The AIOTF may also consider the Target Area information and/or information about the target AIoT Device(s) if received in Step 1, and the stored last known RAN Reader information if available e.g. by means of prior Inventory procedure. 4. The AIOTF sends the AIoT DO-A activation response to the AF via NEF. 5. The AIOTF sends the DO-A activation request to each selected NG-RAN node, either directly or through the selected AMF which may include the Requested Service Area Information and/or the AIoT Identification Information. Editor’s note: The detailed parameters to be included in the DO-A activation request is FFS. 6. The RAN Reader periodically broadcasts access parameters related to Random Access for AIoT Device for autonomous transmissions based on the DO-A activation request from the AIOTF. NOTE 1: The mechanism for broadcasting access parameters needs coordination with RAN WGs. 7. The AIoT Device listens to access parameters from the RAN Reader and performs Random Access to establish the AS connection with the RAN Reader. 8. The AIoT Device transmits the AIoT Registration Request message including the AIoT Device Permanent Identifier. The RAN Reader receives the request and forwards the AIoT Registration Request to the AIOTF directly or via an AMF. Editor’s note: Whether and how the privacy protection for the AIoT Device Permanent Identifier applies is FFS. 9. The AIOTF validates the AIoT Registration Request message with DO-A capability of the AIoT Device and the target AF information in the AIoT Device Profile Data provisioned, the Target Area information and/or information about the target AIoT Device(s) configured or received in Step 1. If validation fails, the AIOTF issues failure response to the AIoT Device and the rest of the procedure is not performed. Upon successful, the AIOTF updates the AIoT Device Profile Data in the ADM with the Last known AIOTF information. The AIOTF retrieves the AIoT Device Temporary ID from the ADM, associating it with the last known Reader and the target AF and stores the mapping between the RAN Reader ID, AIoT Device Temporary ID and the AF ID in the AIoT Device context. NOTE 2: The security aspects for authentication, authorization and the use of AIoT Device Temporary ID needs coordination with SA WG3. 10. The AIOTF sends an AIoT Registration Accept message back to the device via the RAN Reader. The message contains the assigned AIoT Device Temporary ID for the AIoT Device. The AIoT Device receives the AIoT Registration Accept message and uses the AIoT Device Temporary ID for subsequent communication. 11. The AIoT Device sends the event-driven or periodic AIoT Data Transfer Request message including the assigned AIoT Device Temporary ID. The AIOTF validates the request using the AIoT Device Profile and sends the message to the target AF found in the AIoT Device context directly or via NEF. The AIOTF sends the AIoT Data Transfer Response message to the AIoT Device via the RAN Reader including a new AIoT Device Temporary ID. 6.X9.2.2 DO-A procedure for Topology 2 Figure 6.X9.2.2-1: Device initiated Registration and Data Transfer procedure for Topology 2 1. During the registration, the UE indicates the support for the UE Reader Capability to the AMF. The AMF checks if the UE is authorized to act as a Reader based on subscription data. The AMF stores the mapping information between candidate UE Reader(s) and the NG-RAN in the local context. 2. The AF requests for the AIoT DO-A activation which may include the External Target Area information and/or information about the target AIoT Device(s) together with an indication for the use of the UE Reader to the NEF. Editor’s note: How to coordinate and handle requests from multiple AFs is FFS. 3. The NEF selects the AIOTF(s) as described in clause 5.3.1 of TS 23.369 [x3] and sends the AIoT DO-A activation request from the AF to the selected AIOTF(s). 4. The AIOTF selects the AMF considering the Target Area information if received in Step 2 or based on local configuration. The AIOTF, based on the indication for the use of the UE Reader in the request or based on local configuration to select UE reader(s), retrieves/subscribes to the AMF to obtain the available UE Reader(s) for the selected NG-RAN and selects UE Reader(s). The AIOTF may also consider the stored last known UE Reader information if available e.g. by means of prior Inventory procedure. 5. The AIOTF sends the AIoT DO-A activation response to the AF via NEF. 6. The AIOTF sends the DO-A activation request to the selected AMF including the Requested Service Area Information and/or the AIoT Identification Information together with the authorized UE reader information (e.g. a list of RAN UE NGAP ID(s)). Editor’s note: The detailed parameters to be included in the DO-A activation request is FFS. Editor’s note: How the AIOTF gets the RAN UE NGAP ID(s) is FFS. The AMF selects serving NG-RAN node corresponds to the UE Reader selected by the AIOTF. NOTE 1: The aspects of NG-RAN selection and UE Reader selection depends on the outcome of KI#1 study. 7. The NG-RAN provides the authorized UE Reader with the access parameters related to Random Access based on the DO-A activation request from the AIOTF, which the UE Reader then periodically broadcasts access parameters related to Random Access for AIoT Device for autonomous transmissions. NOTE 2: The mechanism for broadcasting access parameters needs coordination with RAN WGs. 8. The AIoT Device listens to access parameters from the UE Reader and performs Random Access to establish the AS connection with the UE Reader. 9. The AIoT Device transmits the AIoT Registration Request message including the AIoT Device Permanent Identifier to the UE Reader. The UE Reader receives the request and forwards the AIoT Registration Request to the NG-RAN and the NG-RAN, aware of which AIOTF the message from UE Reader is destined by step 6, sends the received request to the AIOTF via an AMF. Editor’s note: Whether and how the privacy protection for the AIoT Device Permanent Identifier applies is FFS. 10. The AIOTF validates the AIoT Registration Request message with DO-A capability of the AIoT Device and the target AF information in the AIoT Device Profile Data provisioned, the Target Area information and/or information about the target AIoT Device(s) configured or received in Step 2. If validation fails, the AIOTF issues failure response to the AIoT Device and the rest of the procedure is not performed. Upon successful, the AIOTF updates the AIoT Device Profile Data in the ADM with the Last known AIOTF information. The AIOTF retrieves the AIoT Device Temporary ID from the ADM, associating it with the last known UE Reader and the target AF and stores the mapping between the UE Reader ID, AIoT Device Temporary ID and the AF ID in the AIoT Device context. NOTE 3: The security aspects for authentication, authorization and the use of AIoT Device Temporary ID needs coordination with SA WG3. 11. The AIOTF sends an AIoT Registration Accept message back to the AIoT Device via the AMF, NG-RAN and the UE Reader. The message contains the assigned AIoT Device Temporary ID for the AIoT Device. The AIoT Device receives the AIoT Registration Accept message and uses the AIoT Device Temporary ID for subsequent communication. 12. The AIoT Device sends the event-driven or periodic AIoT Data Transfer Request message including the assigned AIoT Device Temporary ID. The AIOTF validates the request using the AIoT Device Profile and sends the message to the target AF found in the AIoT Device context directly or via NEF. The AIOTF sends the AIoT Data Transfer Response message to the AIoT Device via the UE Reader including a new AIoT Device Temporary ID. 6.X9.3 Impacts on services, entities and interfaces AIoT Device: - Support to initiate the registration request message based on the access parameters broadcasted by the Reader. - Support to receive the temporary ID to be used for subsequent autonomous message. Reader (RAN / UE Reader): - Support to broadcast access parameters for the DO-A capable AIoT Device(s). - Support to receives AIoT Device initiated registration and data transfer messages and forwarding it to the AIOTF. AIOTF: - Support procedures for handling the AF request for the DO-A activation and DO-A capable AIoT Device initiated registration and data transfer. - Support to validate requests from DO-A capable AIoT Device, context creation, authentication and authorization, temporary ID assignment. - Support to route the message between the DO-A capable AIoT Device and the AF. 6.X10 Solution #10X: DO-A Data Delivery and Routing 6.X10.0 High-level Solution Principles The solution is based on the following general principles to support DO-A delivery from DO-A capable AIoT devices: - The target address(es) of the AIoT device are stored in the AIoT Device Profile data, which are provided in the subscribe request from the AF. - The DO-A capable AIoT devices sends DO-A data over AIoT NAS between the AIoT devices and the AIOTF. - The AIOTF forwards the DO-A data to the target AF address(es) obtained from AIoT Device Profile data. 6.X10.1 Description This solution addresses KI#2 and focuses on the following aspects: - How an AIoT Device sends data to the AIOTF autonomously. - Support for routing the data received by AIOTF from an AIoT Device to an AF. This solution assumes the AIoT device has registered towards the network (i.e., the AIOTF), and have the security contexts established between between the AIoT devices and the AIOTF. The AIOTF updates its supported domain information or AIoT Device Permanent ID ranges in the NF Profile to the NRF. The NRF supports the AIOTF discovery based on target device information. The AF subscribes to the DO-A Data Delivery by sending a Subscribe Request to the AIOTF (optioally via the NEF). After receiving the Subscribe Request to the DO-A Data Delivery, the AIOTF performs AF authorization by checking the AF authorization data. If the AF request is authorized, the AIOTF updates the target address(es) provided in the Subscribe Request into the AIoT Device Profile Data in ADM. The DO-A capable AIoT devices sends DO-A data over AIoT NAS between the AIoT devices and the AIOTF. For example, the AIoT Device sends NAS DO-A Delivery Request to the AIOTF containing the AIoT Device ID and DO-A data. The AIOTF acknowledges the AIoT Device by sending NAS DO-A Delivery Response. The NAS DO-A Delivery Requeust and DO-A Delivery Response are security protected. NOTE: The form of AIoT Device ID and the security protection of the NAS DO-A Delivery Request/Response are to be addressed by SA3. The AIOTF obtains the target address(es) from the AIoT Device Profile Data in ADM, and forwards the DO-A data to the target address(es) together with the AIoT Device Permanent ID. 6.X10.2 Procedures 6.X10.2.1 Subscribe to DO-A Data Delivery Figure 6.X10.2.1-1 Subscribe to DO-A Data Delivery Figure 6.X10.2.1-1 depicts how the AF subscribes to the DO-A data delivery: 1. The AF sends Subscribe Request to the NEF for DO-A data delivery with the AF ID, target device information (AIoT Device Permanent IDs or Filtering Information) and target address (i.e., notification endpoint of the AF). For AFs in trusted domain, the AF can send Subscribe Request to the AIOTF directly without involving the NEF. 2. The NEF discovers the AIOTF by providing target device information to the NRF or based on local configuration. The NEF sends the Subscribe Request to the AIOTF for DO-A data delivery with the AF ID, target device information and target address (i.e., notification endpoint of the NEF). 3. The AIOTF authorizes the AF request to check whether the AF is allowed to subscribe to DO-A delivery, based on the AF authorization data stored in the ADM. 4. If authorized, the AIOTF updates AIoT Device Profile data with the target address for the target devices. If the target device information from the AF is Filtering Information, the AIOTF needs to update the AIoT device profile data for each device in the group. Alternatively, the AIOTF may send the Filtering Information to the ADM and the ADM is responsible for the updating for each device in the group. The target address is the notification endpoint of the NEF or the notification endpoint of the AF, depends on which NF sends the Subscribe Request. 65. The AIOTF sends Subscribe Response towards the NEF indicating the result of the subscribe. In case of failure, failure cause is included. In case of succeed, subscription correlation ID is included. 76. The NEF sends Subscribe Response to the AF indicating the result of the subscribe. In case of failure, failure cause is included. In case of succeed, subscription correlation ID is included. 6.X10.2.2 DO-A Data Delivery Figure 6.X10.2.2-1 DO-A Data Delivery Figure 6.X10.2.2-1 depicts how DO-A data are delivered from the AIoT device towards the AF: 1. The AIoT Device sends AIoT NAS DO-A Delivery Request to the AIOTF with the Device ID and DO-A data. For topology 1, the AIoT NAS message is delivered via the RAN reader inside NG-RAN node. The NG-RAN node delivers the NAS message to the AIOTF directly or via the AMF. For topology 2, the AIoT NAS message is delivered via the UE reader. The UE reader delivers the message to the NG-RAN node, and the NG-RAN node delivers the NAS message to the AIOTF via the AMF. NOTE  1: The details of AIoT Device ID and the security protection of the NAS DO-A Delivery Request/Response are to be addressed by SA3. NOTE  2: The NG-RAN and the AMF are assumed to route the AIoT NAS DO-A Delivery Request to the AIOTF which holds the AIoT device contexts in the Registration Procedure. Editor’s Note: If the request is routed to a new AIOTF, how the new AIOTF fetches the AIoT device contexts from the old AIOTF is FFS. 2. The AIOTF authenticates the AIoT device and sends the NAS DO-A Delivery Response to the AIoT Device. The result is included in the response message. In case of failure, the failure cause is included. NOTE  3: The authentication is to be addressed by SA3. 3. The AIOTF gets the target address(es) of the AIoT device from the AIoT Device Profile data. For each target address, step 4 to step 7 are executed individually. 4. The AIOTF sends Notify message to the NEF with the AIoT Device Permanent ID and DO-A data, if the target address is the notification endpoint of the NEF. If the target address is the notification endpoint of the AF, the AIOTF sends Notify Request to the AF directly without involving the NEF. 5. The NEF sends Notify message to the AF with the AIoT Device Permanent ID and DO-A data. 6.X10.3 Impacts on Services, Entities and Interfaces The following NFs are impacted:: - AIOTF: - AIoT NAS layer support for DO-A Data Delivery. - Notify DO-A data to the target address(es) obtained from AIoT Device Profile Data in ADM. - Support subscribe request towards the DO-A data delivery. - Perform AF authorization for the subscribe request. If authorized, the AIOTF update the AIoT Device Profile data to include the target address provided in the subscribe request. - ADM: - Enhance AF authorization data for the subscribe request towards DO-A data delivery. - Enhance AIoT Device Profile data for the target address(es). - NEF: - Support subscribe request towards the DO-A data delivery. - Notify DO-A data to the AF. - NRF: - Support domain information or AIoT Device Permanent ID ranges in the NF Profile of the AIOTF. - Support AIOTF discovery based on target device information. - AIoT Device: - AIoT NAS layer support for DO-A Data Delivery. 6.X11 Solution #X11: DO-A device registration and uplink data transmission 6.X11.0 High-level Solution Principles The solution is based on the following general principles: - The DO-A capable AIoT Device performs the active registration procedure towards the AIOTF. - The NG-RAN selects the AIOTF based on the stored AIOTF information, or AIOTF information contained in the AIoT Device ID, or local configuration. - ADM is enhanced with the allowed/subscribed AF information, which is used by the AIOTF to determine the target AF for the uplink data transmission from DO-A capable device. - AIOTF can retrieve the AIoT Device context from the last serving AIOTF that further includes the service-related information. It addresses the KI#2. 6.X11.1 Description This solution mainly focuses on the DO-A capable device and includes two crucial parts: device-initiated registration procedure and the uplink DO-A data transmission from the Device to the AF. Some of the key procedures are listed below: 1) DO-A capable AIoT Device actively sends the device registration request to the network, that includes the Device ID, security parameters, registration type. - Registration type: Similar to UE, AIoT Device can indicate to the network about its registration type, e.g., periodic registration, initial registration, mobility registration. Alternatively, the AIOTF or the NG-RAN/RAN reader can determine the registration type for the AIoT device based on the locally stored device context. 2) The AIOTF selection at the NG-RAN can be based on different options: - NG-RAN selects the AIOTF based on OAM local configuration. - NG-RAN selects the AIOTF based on locally stored AIOTF information, e.g., from the past procedures as device context. - NG-RAN selects the AIOTF based on the Device ID, e.g., AIOTF ID included in the temporary Device ID. 3) The Routing from AIOTF to the AF can be based on two different options: - AIOTF checks the information in the ADM that further includes the subscribed/allowed AF information (e.g., AF ID). - AIoT Device sends the AF ID to the AIOTF. 4) Context management of the AIoT Device among AIOTF and ADM: - AIOTF stores the device registration information that contains registration area and registration status, and may also store it at ADM. - AIOTF retrieves the device context from the last serving AIOTF, that including the security parameters, device last serving reader, and service-related information (a.k.a., service context). The service context includes the requested AF ID, transaction ID, target area information, and other service specific information, e.g., assistance information for inventory and command. The service context can be used by the AIOTF to autonomously initiate the service towards the AIoT Device if it just moves within its serving area, without further receiving the service request from the AF. 6.X11.2 Procedures Figure 6.X11.2-1. DO-A Device registration and Uplink data transmission Step 0: AIoT Device obtains radio resource for D2R message. Editor's note: How AIoT Device obtains radio resource for D2R message is FFS and is to be decided by RAN WGs. Step 1: AIoT Device sends a D2R message to NG-RAN with device registration request, that includes the Device ID, registration type (e.g., periodic registration, mobility registration, initial registration), and security parameters. Editor’s Note: The details of the AIoT Device ID that is used in the registration request is FFS. The trigger for the AIoT Device performing registration towards the network can be e.g., when device has data pending to report, or when periodic registration is needed (either triggered by device or by the Reader or AIOTF performing periodic inventory), or when mobility registration condition is met (e.g., based on the registration area). Editor's note: The details for triggering the mobility registration of AIoT Device is FFS. Step 2: NG-RAN selects the AIOTF based on local configuration by OAM, or by checking the AIOTF information contained in the Device ID (e.g., temporary ID), or based on the locally stored AIOTF information from the past procedures associated with the AIoT Device, e.g., device context that contains the serving AIOTF information. Editor’s Note: Whether the NG-RAN has the device context that contains the AIOTF information is FFS. NOTE: The temporary ID design needs to be addressed by the SA3. Step 3: NG-RAN sends the registration request to the selected AIOTF, either directly, or via the AMF. If via the AMF, the AIOTF ID is also included. Step 4: Optionally, The AIOTF can retrieve the device context from the last serving AIOTF based on the last serving AIOTF information contained in the Temporary Device ID, or received from ADM. The retrieved device context can contain the security parameters, last serving reader information of the Device, service-related information (a.k.a., service context). The service context can include the AF ID (that sent the service request for the device before device moves to the serving area of the current AIOTF), transaction ID, target area information and other service specific information, e.g., assistance information for inventory and command. Step 5: AIOTF performs the verification of the AIoT Devices, checks whether the data transmission from the device is allowed, and stores/updates the device profile information in the ADM, e.g., updating the serving AIOTF information for the AIoT Device. The AIOTF will store the device registration information either locally, or at the ADM, that includes the registration status (registered), and the device registration area. Editor’s Note: Details of authentication procedures will be determined by SA3. Step 6: The ADM informs the old/last serving AIOTF (AIOTF2 in the Figure) with device ID that it is no longer the serving AIOTF for the AIoT Device and the device context can be released if any. Step 7: AIOTF sends the device registration response message to the NG-RAN and AIoT Device, either directly, or indirectly (via AMF). It contains the Device ID (can be a new temporary ID), registration accept/reject (with a cause and skip all the following messages), registration area for the device., and the correlation ID. The correlation ID is used to identify the later-on data transmission from the Device. Step 8: After receiving the registration response (that may include the data transmission accept indication), AIoT Device sends the DO-A message to the NG-RAN/RAN reader, that includes the Device ID, correlation ID, DO-A data, expected D2R message size (sent to RAN reader /NG-RAN for assistance of radio resource allocation), AF ID (optional), where the DO-A data is encrypted in the AIOT NAS message between the AIoT Device and AIOTF. NOTE: The expected D2R message is sent from AIoT Device to the NG-RAN/RAN reader and can happen before the transmission of actual DO-A data, and depends on RAN2 discussion. Editor’s Note: Whether the AF ID can be provided by the AIoT Device to the network is FFS. Step 9: After selecting the AIOTF (as described in Step 2), NG-RAN sends the DO-A message that contains the Device ID, reader ID, DO-A data, , target AF information (optional) and AIOTF ID (if AMF in between). Step 10: If no AF ID is explicitly sent by the AIoT Device, AIOTF can check the subscribed/allowed AF information from the ADM using Device ID as the key. It is assumed that the ADM is enhanced with the allowed/subscribed AF information, meaning it can receive the data from the DO-A capable device. The allowed/subscribed AF information is pre-configured in the ADM based on the SLA between the MNO and the 3rd party AF. Step 11: AIOTF sends the DO-A data, Device ID and AF information to the NEF. Editor’s Note: The determination of NEF for routing the DO-A data from AIOTF to the AF is FFS. Step 12: The NEF forwards the AIoT Device ID, DO-A Data to the AF based on the AF information sent by the AIOTF. 6.X11.3 Impacts on Services, Entities and Interfaces AIOTF: - Determine the target AF for sending the DO-A data from AIoT Device to the AF - Support registration management of the AIoT Device - Interaction with last serving AIOTF for Device context retrieval NG-RAN: - Determine the target AIOTF to forward the uplink message from AIoT Device ADM: - Store the subscribed/allowed AF information for the AIoT Device data report AIoT Device: - - Performs the active registration procedure towards the network - - Sends the DO-A data to the AF via the network 6.X12 Solution #X12: Enable DO-A traffic with MICO like mechanism 6.X12.1 Description 6.x12.1.1 High-level solution principles This solution applies to topology 1. AIoT device can support inventory and command. In order to help the DO-A capable AIoT device with limited energy storage capability to save power, a DOO (device originated only) mode and DOO mode related Active Time is used. The AF may request the network to configure a DO-A capable AIoT device to use the DOO mode and DOO mode related Active Time using enhanced command procedure with a new Command Type: Configure. During the enhanced command procedure, the device could be configured to use the DOO mode and a DOO mode related Active Time value that is used to indicate the duration during which the device can send uplink AIoT traffic and receive the downlink AIoT traffic. During the enhanced command procedure the AIoTF ID and the AF routing information are sent from the AIoTF to the device to route the DO-A NAS message and DO-A data. A timer corresponding to the DOO mode related Active Time value is started or restarted by the AIoT device when the uplink AIoT traffic is sent out from the device. After the timer expires the DOO mode is activated in the device. The DOO mode is deactivated when there is DO-A data to be sent out from the device. A counterpart timer is used in AIoTF. NOTE : The AIoT devices configured with DOO mode are assumed not applicable for Inventory service from AF perspective. Editor’s note: Timer for the DOO mode related Active Time duration in this solution is FFS. 6.x12.1.2 Definition AF routing information: used to select NEF, for example AF ID, FQDN or IP address of the AF. DO-A data: AIoT data related to the DO-A traffic. DO-A NAS message: an AIOT NAS message that is sent from the AIoT device and includes the AIoT device ID and DO-A data. DOO (Device Originated Only) mode: An AIoT device that has activated the DOO mode does not need to receive downlink AIoT traffic. DOO mode related Active Time: An AIoT device that is in DOO mode related Active Time duration is able to receive downlink AIoT traffic and send uplink AIoT traffic. NOTE : The feasibility of using timer in AIoT device depends on the RAN WG. downlink AIoT traffic: includes paging message related to the inventory procedure, and NAS Command Request message. uplink AIoT traffic: includes AIOT NAS message that responds to the paging message related to the inventory procedure, NAS Command Response message, and DO-A NAS message. 6.X12.2 Procedures 6.X12.2.1 enhanced command procedure to configure AIoT device Figure 6.X12.2.1: enhanced command procedure to configure AIoT device 0. The AIoT device supports inventory and command procedure. 1. The AF sends the Nnef_AIoT_Command message to NEF as specified in the step 1 of clause 6.2.3 TS 23.369 with the following additional clarification: The Nnef_AIoT_Command message additionally includes: a DO-A service indicator, a DOO mode indication, and a DOO mode related Active time value. The DO-A service indicator is used to indicate that the AIoT device related with the device ID can initiate DO-A service. The DOO mode indication indicates the AF's preference for DOO mode for the AIoT device. The DOO mode related Active time value indicates how long the DOO mode related Active Time duration is. The Command Type is set to Configure to request to negotiate and configure the DOO information (i.e. the DOO mode and the DOO mode related Active time value) for the AIoT device. The NEF selects the AIOTF(s) as described in TS 23.369 [3]. The AIOoTF authorize the AF, selects the AIoT reader(s), and response to the AF as described in TS 23.369 [3]. The AIOoTF store the DO-A service indicator in the ADM, determine and store the DOO mode indication, the DOO mode related Active time value in the AIoT device profile related with device ID in the ADM based on the request from the AF, local configuration, and the policy of the network. 2. Step 7 of Command procedure specified in clause 6.2.3 in TS 23.369 [3]. 3. Step 8 of clause 6.2.3 Command Procedure in TS 23.369 [3] with the following additional clarification: If the inventory reports include the device ID that corresponds to the device ID received by the AIOoTF in step 1, the AIOoTF sends Command Request message to the corresponding reader and the Command Request message additionally includes a DO-A service indication that is used to assist NG-RAN to provide DO-A service network resource information to the AIoT device; The NAS Command Request includes a DOO mode indication, a DOO mode related Active time value, the AF routing information, and the AIOoTF ID. 4. Step 9 of clause 6.2.3 Command Procedure in TS 23.369 [3] with the following additional clarification: If the DO-A service indication is received in step 3, the AIoT Reader provides DO-A network resource information to the device in the AS R2D message. 5. After receiving the AS R2D message and the NAS Command Request in step 4: The device stores DOO mode indication, the DOO mode related Active time value, the AIOoTF ID, and the AF routing information, and the DO-A network resource information; and The AIoT device shall set a timer corresponding to the DOO mode related Active Time value received. 6. Step 10 of clause 6.2.3 Command Procedure in TS 23.369 [3] with the following clarification: After the NAS Command Response is sent out, the AIoT device shall start the timer corresponding to the DOO mode related Active Time value if the the DOO mode related Active Time value is not zero and the device stores DOO mode indication. If the Time value is zero and the device stores DOO mode indication the AIoT device activate DOO mode immediately. When the timer expires (i.e. reaches the DOO mode related Active Time value) the AIoT device activates DOO mode and is not available for receiving downlink AIoT traffic. 7. Step 11~13 of Command procedure in clause 6.2.3 in TS 23.369 [3] with the following clarification: After the NAS Command Response is received, the AIOoTF shall start the timer corresponding to the DOO mode related Active Time value if the the DOO mode related Active Time value is not zero and the device is indicated the DOO mode indication. If the Time value is zero and the device stores DOO mode indication the AIoOTF can deduce that AIoT device has activated DOO mode. When the timer expires the AIoOTF can deduce that the AIoT device has activated DOO mode and is not available for receiving downlink AIoT traffic. Editor’s note: The impact of the DOO mode to the AS layer in AIoT device is FFS. 6.X12.2.2 DO-A procedure Figure 6.12X.2.2-1: DO-A Procedure 0. The AIoT device capable of DO-A is configured with DOO mode indication, stores a DOO mode related Active time value, AIOoTF ID, and AF routing information, and the DO-A network resource information using the device configuration procedure. It is assumed that the AIoT device has activated DOO mode. 1. When there is DO-A data needed to be sent to the network, the AIoT device deactivate the DOO mode and sends AS D2R message (AIoOTF ID, DO-A NAS message) to the NG-RAN based on the stored DO-A network resource information. The AIoOTF ID is used by NG-RAN to select AIOoTF. DO-A NAS message includes AF routing information, device ID, and DO-A data. After the DO-A NAS message is sent out: - if the device stores DOO mode indication and if the stored DOO mode related Active Time value is not zero, the AIoT device shall start the timer corresponding to the DOO mode related Active Time value; - if the device stores DOO mode indication and if the stored Time value is zero, the AIoT device shall activate the DOO mode immediately. 2. NG-RAN selects the AIoOTF based on the AIoOTF ID received in step 1. 3. NG-RAN forward the DO-A NAS message to the selected AIoOTF together with the reader ID and RAN AIoT Device NGAP ID. 4. The AIOTF authenticates the device corresponding to the device ID carried in the DO-A NAS message. If the device is authenticated successfully: - The AIoOTF shall start the timer corresponding to the DOO mode related Active Time value if the DOO mode related Active Time value is not zero and the device is indicated to use DOO mode; and - The AIoOTF selects the NEF based on the AF routing information carried in the DO-A NAS message. If the device failed the authentication, the DO-A NAS message is discarded by the AIoTF. 5. The AIoOTF send the DO-A data, the device ID, and AF routing information received in step 3 to the NEF. And NEF forward the DO-A data and device ID to the AF based on the AF routing information. 6. After receiving the DO-A data the AF may subsequently request AIoT service (e.g. Nnef_AIoT_Inventory, Nnef_AIoT_Command) for the corresponding device. The AIoT service request is sent to the AIoOTF. 7. If the device ID related timer corresponding to the DOO mode related Active Time value is running, the AIoOTF determines the device could receive the DL AIoT traffic and proceed with the AIoT service. If the device ID related timer expires or is not running and the device has been indicated to use the DOO mode, the AIoOTF considers the device has activated the DOO mode and is not able to receive downlink AIoT traffic and may reject the AIoT service, and then the step 8~9 is skipped. 8. The DL AIoT traffic is transferred to the device as described in the inventory and command procedure. 9. When the timer expires (i.e. reaches the DOO mode related Active Time value) the AIoT device activates DOO mode. 6.X12.3 Impacts on Services, Entities and Interfaces AIoT Device: - support device configuration procedure; - supports DO-A procedure; - supports timer; NG-RAN(including AIoT Reader): - support device configuration procedure; - supports DO-A procedure; AIOTF: - support device configuration procedure; - supports DO-A procedure; ADM: - support AIoT Device profile including: DO-A service indicator, DOO mode indication, the DOO mode related Active time value Editor’s note: Other impacts (e.g. impacts on NEF, etc.) is FFS. 6.X13 Solution #X13: Network Triggered Initial Registration 6.X13.0 High-level solution principles The key technical principles proposed in this solution are summarized below: - Network triggers the AIoT Device to perform initial Register using Inventory procedure to trigger un-registered devices to register. NOTE: Registration due to mobility or periodic registration is assumed to be autonomously done (using the DO-A procedure) by the AIoT Device after the AIoT Device has performed initial registration. - Reuse of Rel-19 Inventory and Command procedure to support registration of an AIoT Device as specified in TS  23.369  [3]. A Registration Indicator is included in the Inventory Request and paging message. - Reuse of Rel-19 security solution for authentication and command protection as specified in TS  33.369  [11xx]. 6.X13.1 Description This solution proposes to reuse the Inventory procedure and command procedure to support Device registration to the network. This allows re-use of rel-19 security procedures i.e., authentication, privacy protection and command protection. Key Procedures: - AF invokes a new network service to register AIoT Device(s). The AF may include e.g. External Target Area information to aid the network to select AIOTF and where perform Inventory to trigger initial registration for specific AIoT Devices. - The AIOTF can trigger the initial registration without an AF service invocation. In this case the AIOTF determines the periodicity and selection of NG-RAN(s) based on AIOTF implementation. The AIOTF will not include the AIoT Identification Information in the Inventory Request message to trigger all AIoT Devices that are not registered.to respond. - A Registration indication is included in the Inventory Request to restrict the responses to only from AIoT Devices that are not registered to the network. - The AIOTF uses the Inventory procedure to trigger the AIoT Device to check if it is registered to the network. The PLMN ID or NID must be provided in the paging message (see the procedure below for more details). - Un-registered AIoT Device(s) includes an indication to register in the Inventory Response message. As specified in rel-19 the Inventory Response message includes protected information that the network uses to derive the AIoT Device Permanent Identifier and to authenticate the AIoT Device. - The AIOTF sends a Command (based on rel-19 functionality) with a Registration Accept message. This message includes the necessary information for the device to enable DO-A transmission. The details of the parameters and information will be identified in solutions for the DO-A transmission and security aspects specified by SA3 for DO-A transmissions. 6.X13.2 Procedure Figure 6.x13.2-1: Procedure for network triggered registration. 0. The AIoT device profile per AIoT Device is provisioned in the ADM. 1. The AF invokes Nnef_AIoT_Registration Request in service operation request to the NEF. The Request includes same parameters as Nnef_Inventory Request as specified in TS  23.369 [3]. 2. The NEF may further authorize the AF request, selects AIOTF and invokes the Naiotf_AIoT_Registration service operation towards each of the selected AIOTF(s). The Request includes same parameters as Naiotf_Inventory Request as specified in TS  23.369 [3]. 3. The AIOTF receives the Naiotf_AIoT_Registration request and checks the parameters included in the request. The AIOTF may perform authorization of the AF as specified in clause 5.6 in TS 23.369 [3]. The AIOTF prepares the Inventory Request to be sent to the NG-RAN. The AIoT Identification Information to be included in the paging message includes the PLMN ID or NID i.e., the Filtering Information includes the PLMN ID or NID part. Editor's note: It is FFS whether and how to provide PLMN ID or NID when single AIoT Device is paged with a Temporary ID. 4. AIOTF sends the AIoT Registration Service Response to the NEF containing the accept or reject result for the AIoT service operation request based on step 3. 5. NEF sends the AIoT service operation response to the AF, containing the accept or reject result for the AIoT service operation request as specified in clause  8.3 in TS  23.369  [3]. 6. Same as step 7 in the Inventory procedure specified in TS  23.369  [3] with the additional Registration Indicator included in the Inventory Request. If triggered by an AF the Inventory Request includes the AIoT Identification Information corresponding to the AF request. This step can be performed by the AIOTF without receiving the service request from an AF, in this case the AIOTF determine the periodicity and selection of NG-RAN(s) based on AIOTF implementation. If AIOTF triggers the initial registration, then the Inventory Request will not include the AIoT Identification Information to trigger all AIoT Devices that are not registered. 7. Same as step 9 in the Inventory procedure specified in TS  23.369  [3] with the additional Registration Indicator included in the paging message. 8. The AIoT Device determines whether it matches the AIoT Identification Information as specified in step 9 of the Inventory procedure specified in TS  23.369  [3]. The AIoT Device checks the PLMN ID or NID and whether the AIoT Device is registered or not. In case the AIoT Device is not registered, the AIoT Device includes a Registration Request Indication in the AIOT NAS message. The AIOT NAS message also includes the parameters as specified in step 9 of the Inventory procedure specified in TS  23.369  [3]. 9. Same as step 10 in the Inventory procedure specified in TS  23.369  [3]. 10. Same as step 11 in the Inventory procedure specified in TS  23.369  [3]. 11. For each successful Registration Request received, the AIOTF prepares a NAS Registration Accept message and includes the NAS Registration Accept message in the Command Request message. The rest of this step is as specified in step 8 in Command procedure specified in TS  23.369  [3]. NOTE X 1: Detailed list of parameters to be included in the NAS Registration Accept message will be determined in coordination with SA3 to support DO-A message transmissions. 12. Same as specified in step 9 in Command procedure specified in TS  23.369  [3]. 13. Same as specified in step 10 in Command procedure specified in TS  23.369  [3]. The Command Response includes the NAS Registration Complete message. 14. Same as specified in step 11 in Command procedure specified in TS  23.369  [3]. The Command Response includes the NAS Registration Complete message. 15. The AIOTF updates the AIoT Device Context and the AIoT device profile in the ADM that the AIoT device is registered with the network. 16. The AIOTF reports the result of the Naiotf_AIoT_Registration request to the NEF by sending the Naiotf_AIoT_Registration Notify message (a list of AIoT Device(s) response information (AIoT Device ID(s), Registration status and optionally location of each AIoT Device), AF ID, [Last Report Indication]). If multiple AIOTFs are involved in the procedure, the NEF may receive Naiotf_AIoT_Registration Notify messages from multiple AIOTFs. NOTE Y 2: The above parameters are the same as included in the Naiotf_AIoT_Inventory Notify message. NOTE 3 Y: In case multiple AFs are included in the AIoT Device Profile, then all AFs will be notified about the initial registration event. 17. The NEF informs the AF of the result of the Nnef_AIoT_Registration request by sending the Nnef_AIoT_Registration Notify message (a list of AIoT Device(s) response information (AIoT Device ID(s), Registration status and optionally location of each AIoT Device), AF ID, [Last Report Indication]). 6.X13.3 Impacts on Services, Entities and Interfaces NEF: - Support new Nnef_AIoT_Registration service. AIoT Device: - Support Registration procedure including: 1. Verify whether it is registered in the specific network, 2. Receive Registration Accept message and 3. Use the parameters included in the accept message and respond with a Register Complete message. AIOTF: - Support Registration service procedure: 1. Invocation of the service by the NEF/AF 2. Receiving in the NAS Inventory Response and indication that the AIoT Device requests to register in the network. 3. Configure the AIoT Device with parameters included in the Registration Accept message. ADM: - Maintain the AIoT Device Profiles with registration status information. NG-RAN: - None AIoT Reader: - None 6.X14 Solution #X14: DO-A capable AIoT Device Registration Procedure 6.X14.0 High-level solution Principles DO-A capable AIoT devices possess the capability to transmit MO signalling and data. Furthermore, the AIoT device actively registers with the core network to notify it of its presence autonomously. 6.X14.1 Description This solution addresses KI#2, specifically concerning the method by which the DO-A capable AIoT device can autonomously notify the network of its presence for Topology 1. In this solution, it is assumed: - The AIoT device actively initiates the registration process with the network. The registration types include: A. initial registration. B. mobility registration update. C. Periodic registration. - ADM stores the DO-A capable AIoT device profile information. - AIOTF handles NAS termination and device authentication for DO-A capable AIoT devices and manages registration and mobility for AIoT Devices. 6.X14.2 Procedures Figure 6.X14.2.1: DO-A capable AIoT Device Registration Procedure 0. The DO-A capable AIoT Device’s subscription data is provisioned in the ADM Editor’s Note: The subscription data of a DO-A capable AIoT device is FFS. 1. The DO-A capable AIoT Device meets the following trigger conditions, then it will send a NAS Registration Request to the core network. The AIoT Device performs an Initial Registration if it is not registered with the network. The AIoT Device performs Mobility Registration if it has moved outside of its AIoT Registration Area. The AIoT Device performs periodic registration if it has registered on the network and remains in its AIoT Registration Area beyond the designated time period. Editor’s Note: The details of the AIoT Registration Area need to align with the RAN WG 2. AIoT Device sends a message to NG-RAN, including a NAS Registration Request (Registration Type, Temporary ID, device information, security parameters). Registration can be initial registration, mobility registration, or periodic registration. Then, NG-RAN sends the Registration Request to the selected AMF. 3. The gNB discovers the serving AIOTF. Editor’s Note: The details of how the gNB discover the serving AIOTF are FFS. 4. The gNB forwards the registration request to the serving AIOTF by either direct connection or indirect connection via the AMF. 5. [Conditional] The serving AIOTF determines the old AIOTF using the temporary ID and retrieves the AIoT Device context from the old AIOTF. 6. The AIOTF performs the Authentication/Security procedure and stores the security context. Editor’s Note: Details of authentication/security procedures will be determined by the SA3 WG. 7. The AIOTF responds the Registration Accept to the AIoT device , including a new temporary ID assigned by the serving AIOTF, AIOT Registration Area, and periodical registration timer. 8. The AIoT device responds to the AIOTF with Registration Complete via NG RAN and AMF. 9. The AMF forwards the Registration complete to the AIOTF. 10. The AIOTF notifies the ADM of the registration complete status about the AIoT device. 11. The ADM stores the serving AIOTF for the AIoT device. 12. [Conditional] If the ADM discovers that the serving AIOTF has changed, then it needs to initiate the context release procedure to the old AIOTF to delete the context in it. 6.X14.3 Impacts on Services, Entities and Interfaces AIOTF: - Support Registration and Mobility Management. NG-RAN: - Supports the AIOTF selection and transferring NAS messages to and from the AIoT Device. AIoT Device: - Support performing the registration procedure. ADM: - Support new interface with AIOTF. 6.X15 Solution #6.X15: Support reliable time-base Data Collection of DO-A AIoT sensor device with network trigger 6.X15.0 High-level solution Principles This solution addresses KI #2 to support DO-A sensor data collection with network assistance, with the following key principles: 1. The AF starts the time-based (e.g. periodic or at certain time) data collection service from the DO-A sensor device(s) by sending the AIoT command request to NEF, with the assumption that all the DO-A sensor device(s) for this operation have been registered with the 5G network before the service starts( e.g. DO-A sensor device can autonomously register to the network without the trigger from network) NOTE 1: How the DO-A sensor device registers to the network is not covered in this solution and other DO-A device registration solutions can be applied. 2. The data collection pattern of the AIoT sensor device(s) (e.g. periodic and aperiodic time-based data collection) is configured and aware by the AF. The AF provides the data collection pattern information to the AIoTF, which also provides the information to the NG-RAN / AIoT reader(s) to coordinate the data collection. 3. The AIoOTF provides the assistance information to the AIoT reader(s) or the NG-RAN to assist time-based (e.g. periodic or aperiodic) data collection (e.g. pre-allocate resource and send triggers for the DO-A sensor device(s)). The assistance information includes periodic data collection information (e.g. start or end time of data collection, interval between periodic data collection, or certain point of time when the data collection is needed, so on). 4. For periodic data collection, the AF and the AIoOTF use single command procedure as defined in TS 23.369 to start the time-based data collection operation from DO-A AIoT device(s), without sending read command for every periodical data collection cycle. The AIoT reader periodically trigger and allocated radio resource for the data collection of the AIoT sensor device(s), based on the assistance information from the AIoOTF. 5. This solution only focuses on time-based (e.g. periodic or at certain time) data collection of DO-A device(s) and doesn’t prevent DO-A device(s) transmitting data autonomously (e.g. event trigger transmission). NOTE  12: The trigger and resource allocation mechanisms of AIoT reader are determined by RAN WGs and the coordination with RAN WGs is needed. NOTE 2 3: Security consideration for periodic data collection operation will be determined by SA3. Editor’s note: How to support DO-A device mobility is FFS. 6.X15.1 Description One of the key DO-A use cases is time-based (e.g. periodic ) data collection from AIoT sensor. Considering the nature of DO-A IoT device which is still a low energy and low complex device, keeping accuried and network-sychronized clock for periodic data transmission in the AIoT sensor is challenging. Although DO-A device can autonoumously sending data, a large number of AIoT sensor device sending periodic data at the promiximty time without network coordination can cause serious race condition for the network resource which lead to low effective of data collection. This solution allows AIoT reader, with the time-based data collection assistance information provided by AIoTF, to periodically or at-certain point to preallocate radio resouce and trigger the DO-A AIoT sensor device to send sensor data when the transmission time is come. With this solution, the DO-A sensor device doesn’t need to maintain a timer which is need to be synchronized with network or AF for periodic transmission. 6.X15.2 Procedures Figure 6.15.2- 1 periodic data collection 1. Step 1 to step 6 of Procedure for Command in clause 6.2.3 of TS 23.369 [3] with additional parameters. AF sends AIoT Command Request to NEF. In includes Device(s) Info, Location (External), AF Transaction ID, Command Type Read, Length, Periodic data collection indication, Approximate number of AIoT Devices, and periodic data collection Parameters (periodic data collection start / end time, interval between each data collection cycle). NEF selects AIOTF, and then NEF sends AIoT Command Request to AIOTF. AIOTF checks AF Authorization by retrieving AF Authorization Profile in ADM. AIOTF sends AIoT Command Response to NEF. It includes Status (Success/Failure), Transaction ID. NEF sends AIoT Command Response to AF. It includes Status (Success/Failure), AF Transaction ID. 2. Step 7 to step 10 of Procedure for Inventory in clause 6.2.2 of TS 23.369 [3] 3. AIOTF sends AIoT Command Request to AIoT Reader via NG-RAN. This includes Device ID, (Reader ID), Command Type Read, Correlation ID, Length, and assistance information which includes Periodic data collection indication and periodic data collection Parameters (periodic data collection start / end time, interval between each data collection cycle). AIoT Reader stores Correlation ID with AIoT Device ID as context data as well as the assistance information. 4-5. When the periodic sensor data collection time starts, AIoT Reader sends AIoT Command Request to the AIoT Device. This includes Device ID, (Reader ID), Command Type Read, Correlation ID. NOTE 3: AIoT reader or NG-RAN may allocate radio resource for the D2R command response from the DO-A Device. This is up to RAN WG decision. 6. AIoT Device sends AIoT Command Response to AIoT Reader. This includes Device ID, and the data collected from the AIoT device(s). 7. AIoT Reader sends AIoT Command Response to AIOTF. This includes Device ID, Sensing Result, and Correlation ID. AIoT Reader retrieves Correlation ID with AIoT Device ID from the stored context. 8. AIOTF sends AIoT Command Notify to NEF. This includes Device ID, Sensing Result, and Transaction ID. AIOTF retrieves Transaction ID with Correlation ID from the stored context. 9. NEF sends AIoT Command Notify to AF. This includes Device ID, Sensing Result, and AF Transaction ID. NEF retrieves AF Transaction ID with Transaction ID from the stored context. 10-14. Every Period, AIoT reader sends AIoT command Request to the AIoT Device. Repeat step 5-9. 6.15X.3 Impacts on services, entities and interfaces Impacts on existing entities: AIOTF: - Receives time-based data collection information (e.g. periodic data collection information) from AF AIoOTF: - Add time-based data collection information to the assistance information, such as - - periodic data collection: periodic data collection indication, interval of each data collection cycle, start or end time of the periodic data collection. - - aperiodic data collection: time(s) when the data collection starts AIoT Reader: - - Maintain DO-A device context to conduct data collection procedure at certain point of time based on the assistance information. - Supports periodically start AIoT Command-only read procedure to collect data from AIoT Device(s) with triggering AIoT device(s) to send data. - - For aperiodic data collection, supports triggering AIoT device to send data when the data collection time is up. 6.X16 Solution #X16: AIoT device DOA data detection and collection 6.X16.0 High-level solution Principles This solution addresses the DOA traffic enabling aspects of KI#2. The solution proposes the procedures for the AIoT Readers and the network to detect and collect the AIoT device’s DOA data. The solution assumes that the AIoT device broadcasts a signal (“Data Ready Indication”) when it has DOA data to send. The nearby AIoT Readers that detects the signal may then use enhanced R19 Paging and Command procedures to handshake with the device and collect the DOA data from the device. The solution also describes how the AIoT Reader that has collected DOA data from the device can route the data to the network (i.e. AIOTF) and the AF. The routing of DOA data is based on the AIoT Reader’s local configuration that maps the AIoT identifier information to the AIOTF address. 6.X16.1 Description 6.X16.1.1 Device broadcasted “Data Ready Indication” When a DOA capable device has data to send, it broadcasts a Data Ready Indication (DRI). The purpose of this broadcast information is to probe whether there is an AIoT Reader that is able to receive its DOA data. The radio resource used for the broadcast may be preconfigured in the device. If the broadcast indication is not immediately picked up by any AIoT Reader and the device doesn’t receive response (e.g. Paging) from AIoT Readers, the device may repeat (e.g., periodically) the broadcast for a preconfigured time duration. Editor's note: How the AIoT device broadcasts DRI depends on RAN WGs’ design. An DOA-capable AIoT Reader is preconfigured with the radio resource on which the DRI broadcast may be transmitted and monitors the DRI broadcast from the AIoT devices. If a Reader (e.g., a UE Reader) is not able to monitor this signal all the time, it may monitor the DRI broadcast only in configured time windows or time occasions. The time window/occasion configuration may be based on the DOA data transmission pattern of the target devices or device group. For example, if an AIoT sensor transmits data twice a day, say 5am in the morning and 11pm in the evening, the AIoT Readers assigned to collect the sensor data may be configured to monitor the sensor’s DRI broadcast in a time window around 5am and 11pm. 6.X16.1.32 Enhanced R19 AIoT Paging and Command procedures for collecting DOA data Once the AIoT Reader monitors the DRI broadcast, the Reader may initiate an AIoT Paging procedure to handshake with the device that has data to send and verify the device identifier. The AIoT paging message needs to carry a DOA indication so that only the device(s) that has DOA data to send may respond to the paging. The Reader and the network will also determine the device identifier and verify it during this procedure. After the device identifier is verified, the Reader may initiate a Read Command procedure to collect the data from the device. 6.X16.1.43 Routing of DOA data When the AIoT Reader receives the DOA data from the AIoT device, it needs to forward it to the AIOTF which further forwards it to the AF. The determination of the AIOTF may be based on the Reader’s configuration that maps a part of device identifier to an AIOTF. For UE Readers, this configuration may also reside in the NG-RAN or AMF. 6.X16.2 Procedures Figure 6.X16.2-1: DOA data detection and collection 1. The AIoT Reader monitors DRI broadcast on the preconfigured radio resource. If the Reader is a UE Reader, it may only monitor the DRI broadcast during the configured time windows which match the DOA data transmission pattern of the AIoT devices that the Reader is supposed to serve. 2. The AIoT device has DOA data ready to be sent. The device broadcasts a DRI signal on the preconfigured radio resource. This signal may be picked up by one or multiple Readers that monitor the DRI broadcast. 3. The AIoT Reader that detects the DRI signal may initiate the AIoT Paging towards the device. The Reader includes the DOA Indication in the Paging message, and there is no device identifier information in the Paging message. 4. The AIoT device that has DOA data to send receives the Paging message and sends the Paging Response message to the Reader. The Paging Response message includes the device’s identifier and may include other information, such as the approximate size of the DOA data to be sent. Other AIoT devices that receive the Paging but don’t have DOA data to send should not respond to this Paging. Editor's note: It is FFS how to handle the scenario that multiple AIoT Readers detect the DRI signal and send the AIoT Paging messages simultaneously. NOTE 1: Step 2 – 4 are in the RAN WGs’ scope. 5. The AIoT Reader forwards the device identifier information to a selected AIOTF for the purpose of verifying the device identifier. The AIOTF may work with the ADM to verify the device identifier and return the result to the Reader. If the Reader is a UE Reader, the UE Reader forwards the information via NG-RAN and AIOTF to the AIOTF. Editor's note: It is FFS how to verify the device identifier if it is a temporary identifier and it may need coordination with SA3. 6a/6b. If the device ID is successfully verified, the AIOTF initiates Read Command procedure via the AIoT Reader towards the device to collect the device’s DOA data. 7. The AIoT device sends the DOA data to the Reader in the Command Response message. Step 6 and 7 may repeat multiple times until all of the device’s DOA data is collected. In case that only the designated Reader can handle the device’s DOA data, the device may also include a Reader Token that’s calculated from the preconfigured security credentials and inputs (e.g., designated Reader ID). The purpose of Reader Token is to prevent non-designated Readers from handling the data. If the Reader Token is included in the message, the Reader should calculate its own Reader Token and compare it with the received token. If the tokens match the Reader may continue to handle the data, otherwise, it should discard the data. The use of Reader Token is not related to the data encryption. Editor's note: The use of Reader Token needs coordination with SA3. 8. The Reader selects the AIOTF for the DOA data using the local configuration that maps device identifier information to an AIOTF address. Note that this AIOTF may be different from the one that performs the device identifier verification in Step 5. 9. The Reader forwards the received DOA data to the selected AIOTF which further forwards it to the AF. 6.X16.3 Impacts on Services, Entities and Interfaces Editor's note: This clause captures impacts on existing services, entities and interfaces. The proposed solution has impacts on the following entities: AIoT Device: - Support DRI signal generation and broadcast and related radio resource configuration. - Support new “DOA Indication” in AIoT Paging message. - Support Reader Token generation. AIoT Reader: - Support DRI signal monitoring and related radio resource configuration and time window configuration. - Support Reader initiated Pagin and Command procedure (i.e., without receiving the Inventory/Command request from AIOTF). - Support new “DOA Indication” in AIoT Paging message. - Support AIOTF selection for routing DOA data to AIOTF and related configuration. - Support Reader Token verification. AIOTF: - Support device identifier verification for DOA data. - Support initiation of Command procedure. - Support receiving DOA data from AIoT Readers and forward it to the AF. 6.X17 Solution #X17: Service aspects for DO-A traffic in Ambient IoT networks 6.X17.1 High-level solution principles The solution proposed in this paper is based on the following principles: 1. A new service type “DO-A support” for enabling DO-A traffic for a certain service within the network is introduced. 2. Network can simultaneously support devices that are capable of DO-A and DT traffic at the same time. 3. A-IoT readers present in the network can have varying capabilities. Some of them are able to support both DO-A and DT traffic, others can only support DT traffic. 4. DO-A capable devices can be configured by the network to support both DO-A traffic and DT traffic or only DT traffic at a given time. This solution is applicable for scenarios when the NG-RAN expects an indication from the core network regarding DO-A service. 6.X17.1 Description For supporting DO-A traffic within an Ambient IoT network, an AF should first enable the service for supporting DO-A traffic within the network. This is essential as the AIoT Readers collocated with gNB (topology 1), or UE (topology 2) may need to broadcast certain specific signals for supporting DO-A traffic. These signals are used to typically allocate radio resource e.g., Random Access Channel (RACH) resources for enabling devices to access the network. Enabling DO-A support as a service may help in energy saving in a twofold manner viz., 1). Energy Saving at the reader by reducing D2R signalling to support DO-A whenever DO-A capable devices are not present in the network or are disabled. 2) disabling a specific DO-A service for a device for supporting reduced energy consumption in the device. Once DO-A service is enabled, a DO-A capable device(s) can register with the core network (AIOTF) with the service ID and is authenticated. It can then request for DO-A data transfer whenever it has some data to send. 6.X17.2 Procedures 6.X17.2.1 Configuring the network to support DO-A support as a service Figure 6.17.2.1- 1 illustrates the call flow for enabling DO-A service in a AIoT Network. Figure 6.17.2.1- 1:Procedure for supporting DO-A as a service. The steps involved in the procedure are as follows: 1. The Application Function (AF) invokes Nnef_AIoT_Do-A Support (Service Descriptor, AF ID, [service type], [target area], operation, [priority] [list of device IDs] [offset][duration]) service operation request to the NEF. Service Descriptor is an identifier for every service request that arrives at the AF. It shall be unique within particular AF. The service descriptor that is sent as part of this service operation request shall be the descriptor of the service that needs to be enabled, modified or cancelled. AF ID is the identifier for a given AF. Service type in this request would correspond to “DO-A support”. Operation in this request could either enable or disable. The Priority field indicates the priority of the service request. The list of device IDs is an optional parameter in which the set of devices for which this service can be enabled/disabled is indicated. When not provided, the specified service is enabled for all the devices in the network. Similarly, offset and duration are optional parameters used for enabling/disabling a service at “offset” time interval from the point of receiving the request and “duration” is used to specify the duration of time for which the service remains enabled/disabled. When the duration is not provided, the service continues to stay enabled/disabled until a follow-up service request is issued. NOTE 1ote: In case the AF is considered as a trusted AF, the AF may directly reach the AIOTF using the Naiotf_AIoT_Do-A Support Request (Service Descriptor, AF ID, [service type], [target area], operation, [priority] [list of device IDs] [offset][duration]). 2. The NEF may further authorize the AF request as specified in clause  5.6 of 3GPP TS  23.369 [3]. The NEF determines the Target Area information and selects suitable AIOTF(s) that can support DO-A related traffic. The NEF determines AIOTF instances(s) by providing the NRF Target Area information along with the request for DO-A traffic support, and the NRF returning AIOTF instance(s) that match the Target Area information and ability to support DO-A, or by using local configuration. Once the NEF authorizes the AF request, the NEF creates a Transaction Reference ID for transferring this request to the AIOTF and stores the AF Identifier along with the Transaction Reference ID. 3. The NEF invokes Naiotf_AIoT_Do-A Support request (Transaction ID, AF ID, [service type], [target area], operation, [Approximate number of Do-A AIoT Devices], [Approximate number of AIoT Devices], [priority] [offset][duration]) towards to the selected AIOTF(s). The Approximate number of Do-A AIoT devices is an optional parameter and could be used for resource allocation. 4. AIOTF receives the Naiotf_AIoT_Do-A Support request and checks the parameters included in the request. The AIOTF may perform checks as specified in clause 5.6 of 3GPP TS  23.369 [3]. Also, AIOTF may select a set of NG-RAN nodes and reader(s) within the target area for supporting DO-A traffic. The NG-RAN nodes and readers can be selected based on several criteria such as ability to support DO-A traffic, load on the NG-RAN nodes or readers, number of actively connected devices (both 5G NR UEs and A-IoT devices), available radio resources etc. The selected readers allocate radio resources for supporting DO-A traffic. For example, certain trigger time instants may be allocated to only support DO-A traffic from A-IoT devices. These resources may be broadcasted by the A-IoT readers or can be pre-configured by the network while the device is deployed. In case, the Naiotf_AIoT_Do-A Support request cannot be serviced due to any reason e.g., non-availability of readers supporting Rel-20, not enough resources etc., the AIOTF rejects the AIoT service operation request with an appropriate cause code in Step 5, and step 7 is skipped. NOTE 2ote: The Naiotf_AIoT_Do-A Support is used to provide indication to the network that DO-A traffic may be expected within a certain time period. The necessity of this indication depends on RAN WGs. 5. AIOTF sends Naiotf_AIoT_Do-A Support Response to the NEF containing the accept or reject result for the Naiotf_AIoT_Do-A Support request based on step 4. 6. NEF sends Nnef_AIoT_Do-A Support Response to the AF, containing the accept or reject result for the AIoT service Cancel operation request as specified in clause 8.3 of 3GPP TS  23.369 [3]. If the response was an accept, then DO-A enabled A-IoT devices are able to attempt successful registration with the network. 7. Any device capable of DO-A traffic support can now register with the network. Once registered with the network, it can initiate transmission of DO-A traffic whenever it has some data to transmit. 6.X17.3 Impacts on Services, Entities and Interfaces The following impacts are envisioned on the existing network functions: AIOTF: - For supporting DO-A traffic, AIOTF must support the mechanism to indicate to the Readers to enable any DO-A specific signalling. ADM: - The AIOTF profile data in the ADM must be enhanced to also contain “AIoT Device Traffic Capability” which can identify whether device can support DT only or both DT and DO-A traffic type. When DO-A traffic can be supported by the device, then it also maintains whether DO-A is enabled/disabled for the device for a given service. Similarly, AF Authorization Profile should indicate the support for DO-A for a specific service. AF: - For supporting DO-A, the functionality of AF is enhanced to enable or disable DO-A support for a specific service. 6.X18 Solution #X18: AIoT Device Registration and data transmission Procedure 6.X18.0 High-level solution Principles DO-A capable AIoT Devices have the ability to send MO originating signalling and data. The AIoT Device actively registers to the network to inform the network of its presence autonomously and once the AIoT Device is registered it can actively send data to the network autonomously without triggers from the network. The transferred data is included in AIoT NAS messages. The network is configured with a route for uplink data from the AIOT Device and the route is used when traffic is sent. 6.X18.1 Description This solution addresses KI#2, and includes how to enable the AIoT Device to inform the network of its presence autonomously for Topology 1, how to enable the device to perform DO-A data transmission, and Inventory and Command Procedures. It is assumed that the AIoT Device actively initiates the registration process with the network and the data transmission procedure without any trigger from the network. The registration type can be an Initial Registration or a Mobility Registration Update when it to moves outside of an AIoT Registration Area. When an AIoT Device initially registers a context is created in the network for the AIoT Device and the AIoT Device is provided with an AIoT Registration Area. Editor’s Note: It is FFS whether other registration type need to be supported. AIoT Areas may span multiple Readers (and NG-RAN nodes) and a Reader may belong to multiple AIoT Areas. The granularity of the AIoT Areas and Readers can mean that the AIoT Device has to be provided with and store a large amount of information, or would have to perform Mobility Registration Updates frequently when the AIoT Device moves relatively small distances. While in some cases knowledge that the AIoT Device has moved a small distance is desirable, it is not a universal desire, and may cause significant overhead to AIoT Devices and networks. Therefore, to enable the difference scenarios the network is configured with AIoT Registration Areas. An AIoT Registration Area is provided to the AIoT Device and is: - A Reader list, AIoT tracking area code (TAC), or an AIoT Area List. The AIoT Device performs Mobility Registration Update if it moves outside of the list, TAC or AIoT Area List. - Be hierarchical and be the first part of a TAC or a partial TAC. The AIoT Device performs Mobility Registration Update if the supplied part of the TAC no longer matches the TAC where the AIoT Device is. The hierarchical AIoT Registration Area will reduce the amount of storage required by an AIoT Device. NOTE 1 x: The AIoT Registration Area is specific to Ambient IoT and does not need to be aligned with registration areas used by an AMF for NR. The AIoT tracking area code (TAC) is a different type of area identification from an AIoT Area List. An AIOTF can subscribe to events for AIoT Device mobility, similar to those supported in 5GS for UEs, to be informed when the AIoT Device moves outside of its AIoT Registration Area. According to TS  23.369  [3] and TS  33.369  [11y], the AIOTF is the supports termination point of the AIoT NAS protocol within the network, and supports the authentication of the AIoT Device. For a DO-A capable AIoT Devices the AIOTF remains the NAS termination point, including for device authentication, and additionally supports registration management and mobility management. NOTE 2 x: The Temporary ID used in the procedures for AIoT Device identification and AIOTF selection will need alignment with SA3. 6.x18.2 Procedures 6.X18.2.1 Registration Procedure The Registration procedure is used by an AIoT Device for Initial Registration or a Mobility Registration Update when it to moves outside of an AIoT Registration Area provided to it. Figure 6.X15.2.1-1: Registration Procedure 1. The AIoT Device sends a D2R message to NG-RAN, including D2R parameters and a NAS Registration Request (Registration Type, device information, security parameters). The D2R parameters contains, e.g., a Temporary ID (if available), the selected PLMN ID and allows NG-RAN to route the request to the appropriate AIOTF. NOTE  1: The details of the D2R parameters need to be coordinated with RAN WG. The Registration Type indicates if the AIoT Device is performing an Initial Registration or a Mobility Registration Update. The AIoT Device performs an Initial Registration if it is not registered with the network and performs a Mobility Registration if it has moved outside of its AIoT Registration Area. 2. NG-RAN selects an AIOTF based on the D2R parameters or local configuration and to send the NAS message received from the AIoT Device to. If Indirect Connectivity is used between NG-RAN and the AIOTF, NG-RAN sends the selected AIOTF ID to AMF which can then route the message to the selected AIOTF. 3. NG-RAN sends the Registration Request NAS Message, Temporary ID and selected PLMN ID from the D2R message, and Reader information to the selected AIOTF. If the Temporary ID indicates another AIOTF assigned it, the selected AIOTF fetches the AIoT Device context from that AIOTF. 4. [Conditional] The new AIOTF may determine an old AIOTF using the Temporary ID, and retrieves the AIoT Device context from the old AIOTF. 5. The AIOTF determines the ADM for the AIoT Device based on the AIoT Device’s permanent ID. 6. The AIOTF performs authentication and security procedures, and stores the security context. NOTE  2: Details of authentication and security procedures will be determined by SA3 WG. 7. The AIOTF registers itself with ADM as serving AIOTF for the AIoT Device and may retrieve the subscription data for the AIoT Device. 8. [Conditional] The ADM informs the old AIOTF using Nadm_SDM_unsubscribe that it is no longer the serving AIOTF for the AIoT Device. 9. The AIOTF sends the Registration Accept to the AIoT Device, which may include a new Temporary ID and AIoT Registration Area. NOTE  3: This solution does not provide any power consumption parameters, but if they are defined by other solutions, it is expected they can be supplied to the AIoT Device in this procedure, if required. 6.x18.2.2 Configuration of MO data routing The procedure to configure the routing of uplink traffic from an AIoT Device is show in figure 6.18x.2.2-1. Figure 6.X18.2.2-1: DO-A Target AF information configuration Procedure 1. The AF sends an Nnef_DOAconfiguration_Create Request message (AIoT Device information, AF Identifier, validity time) to the NEF. The validity time is used to indicate the how long network maintains the DO-A configuration information. This subscribes the AF to notifications of received data, as described in clause  6.18x.2.3. 2. The NEF selects an ADM based on the AIoT Device information received in step 1. 3. The NEF sends a Nadm_DOAConfiguration_Create Request message (AIoT Device information, AF Identifier, validity time) to the ADM. 4. The ADM validates the request from the NEF and stores the AF information for devices’ DO-A data transmission, i.e., AF Identifier and validity time. 5. The ADM sends the Nadm_DOAConfiguration_Create Response message to NEF to confirm the route has been stored. 6. The NEF sends Nnef_DOAconfiguration_Create Response to the AF to acknowledge acceptance of the Nnef_DOAconfiguration_Create Request. 6.x18.2.3 DO-A traffic routing The procedure uses the routing information stored in the ADM to route DO-A traffic from an AIoT Device and is shown in figure 6.18x.2.3-1. Figure 6.X18.2.23-1: DO-A Data Transmission Procedure 1. The AIoT Device sends D2R message to NG-RAN, including Temporary ID and AIoT UL NAS message (Temporary ID, DO-A Data). 2. Based on the Temporary ID, NG-RAN selects an AIOTF, and forwards the AIoT UL NAS message and the RAN AIoT Device NGAP ID to the selected AIOTF. If Indirect Connectivity is used between NG-RAN and the AIOTF, NG-RAN sends the selected AIOTF ID to AMF so it can route the messages to the AIOTF. The AIoT Device may provide NG-RAN with an indication that follow on NAS message(s) to or from the AIoT Device or AIOTF are expected. When NG-RAN receives a follow-on indication, it can ensure that subsequent messages can be sent from the AIoT Device. 3. The AIOTF obtains the target AF information for the AIoT Device through subscribing to the ADM. 4. The AIOTF forwards the AIoT Device ID, DO-A Data and the target AF information an NEF. The NEF does not have to be the same NEF that that AF used to provide the routing information to the network. 5. The NEF forwards the AIoT Device ID, DO-A Data to the AF based on the target AF information. 6.X18.2.4 Inventory Procedures The Inventory Procedure as specified in TS  23.369  [3], clause  6.2.2 is performed with following differences: - In step 2, if the information about the target AIoT Device(s) has been provided, the NEF determines the corresponding serving AIOTFs by querying the ADM for the serving AIOTF based on the AIoT Device ID, and uses that AIOTF to perform the Inventory Procedure. - In step 11, the AIOTF may find the serving AIOTF based on the Temporary ID, and retrieve the AIoT Device ID from the serving AIOTF. The AIoT Device context is not transferred, therefore a new Temporary ID does not need to be provided to the AIoT Device. NOTE: Power consumption parameters might need to be provided to NG-RAN when performing the Inventory Procedure, and details are expected to described other solutions. 6.X18.2.5 Command Procedures The Command Procedure as specified in TS  23.369  [3], clause  6.2.3 is performed with following differences: - In step 2, if the information about the target AIoT Device(s) has been provided, the NEF determines the corresponding serving AIOTFs by querying the ADM for the serving AIOTF based on the AIoT Device ID, and uses that AIOTF to perform inventory procedure. - In step 7, the AIOTF may find the serving AIOTF based on routing information, e.g., from within the temporary ID, and fetch AIoT Device contexts from the serving AIOTFs. It also registers/updates itself in the ADM as new Serving AIOTF. If the serving AIOTF has changed, a new Temporary ID, needs be generated and provided to the AIoT Device so when it performs DO-A procedure the new AIOTF can be selected by NG-RAN. - In step 8, the new Temporary ID, is provided to the AIoT Device along with the NAS Command Request message. NOTE: Power consumption parameters might need to be provided to NG-RAN when performing the Command Procedure, and details are expected to described other solutions. 6.X18.3 Impacts on Services, Entities and Interfaces AIOTF: - Support Registration and Mobility Management. - Support DO-A data routing, including retrieval of AF Identifier from ADM - Register AIOTF ID into ADM as serving AIOTF of the AIoT Device NG-RAN: - Supports AIOTF selection and transferring NAS messages to and from the AIoT Device. AIoT Device: - Support performing registration procedure. ADM: - Support storage of AIOTF ID as serving AIOoTF for AIoT Device. - Support storage of AF Identifier for AIoT Device 6.X19 Solution #x19: AF activates/deactivates the DO-A traffic to the AIoT device 6.x19.0 High-level solution Principles This solution addresses KI #2. It includes DO-A parameters configuration for DO-A traffic, the procedure of the AF initiates or stops the AIoT device reporting the DO-A data (e.g., sensing data) via the Activation/Deactivation Command. 6.x19.1 Description This solution is applicable to both the Direct Connectivity and the Indirect Connectivity architectures as defined in TS 23.369 [3]. The principles of this solution are as follows: - The AIoT device registration: For an Ambient IoT devices of type 2b/c supporting DO-A traffic, the registration-like procedure should be performed before the DO-A traffic configuration and sending DO-A data. - The DO-A configuration of the DO-A traffic: The AF sends the configuration parameters of DO-A traffic to the AIoT device via AIoT Command. - The DO-A data reporting method: DO-A data (e.g., sensing data) reporting method of the AIoT device includes periodical reporting (i.e. reporting with the specific period) and non-periodical reporting (i.e. event-triggered DO-A traffic, reporting when meets configured event. ). - The DO-A traffic is initiated or stopped by the AF request: The AF initiates or stops the device reporting the DO-A data via the Activation/Deactivation Command separately. NOTE: The Activation/Deactivation Command is only used to initiate or stop the DO-A traffic and is different from Enable/Permanent Disable Command. 6.x19.2 Procedures The procedure is shown in Figure 6.x19.2-1. It includes the AIoT Service Request from AF to configure the parameters of the DO-A traffic, Activation/Deactivation Command request from AF to initiate or stop the DO-A traffic. Figure 6.x19.2-1: Procedure for DO-A traffic configuration and AF initiates/stops DO-A traffic 0. The AIoT devices should perform the registration-like procedure to indicate the support of DO-A communication. Optionally, the AIOTF could indicate the presence of the AIoT device to corresponding AF. Editor’s note: The AIOTF could know the presence of the device via registration-like procedure initiated by the AIoT device or the AF. The details of the device registration-like procedure are FFS. 1. Step 1 to Step 6 of Command Procedure in clause 6.2.3 of TS 23.369 with additional DO-A configuration parameters. The AF sends Nnef_AIoT_Command Request message to the NEF to configure the AIoT device for DO-A traffic. Nnef_AIoT_Command Request (Command type, the offset where to write DO-A Configuration Parameters, DO-A Configuration Parameters, [the offset where to store the DO-A data (e.g., sensing data) in the AIoT device], [the length of the DO-A data sent by the AIoT device] ). Excepting the above parameters for DO-A traffic, the Nnef_AIoT_Command Request also includes other necessary parameters specified in clause  6.2.3 of TS  23.369 [3]. The DO-A Configuration Parameters includes DO-A Period for reporting DO-A traffic if it is periodical DO-A traffic, DO-A Event (e.g., temperature threshold for the temperature sensor device) for reporting DO-A traffic if it is event-triggered DO-A traffic. Editor’s note: The DO-A Configuration Parameters should be visible to the CN. It is FFS the AF sends the DO-A Configuration Parameters to the AIoT device via Write Command or the new Command (e,g., DO-A Configure Command type). NOTE  1: The offset where to store the DO-A data in the AIoT device and the length of the DO-A data sent by the AIoT device are optional IEs and could also be pre-configured in the AIoT device. NOTE  2: There could be multiple sets of DO-A Configuration Parameters (e.g., Set A: DO-A Period=60s, Set B: DO-A Period=3600s). The NEF selects the AIOTF and sends the Naiotf_AIoT_Command Request message to the selected AIOTF. The AIOTF checks the AF request and device capability to perform configuring the AIoT device for DO-A traffic. 2. This step is the procedure for Inventory in clause 6.2.2 of TS 23.369. It could be optionally performed if a NGAP connection for the AIoT device between the AIOTF and the NG-RAN exists (e.g., if the NGAP connection is established in AIoT device registration-like procedure.). 3. The AIOTF sends AIoT Command request to the NG-RAN. The AIOTF will encapsulate the DO-A Configuration Parameters in an AIOT NAS PDU. Some DO-A configuration parameters may be visible to the NG-RAN to assist resource scheduling in RAN (e.g., If the length of the DO-A data could be visible to the NG-RAN, the NG-RAN may allocate the AIoT DO-A radio resource to the AIoT device efficiently.) and the AIOTF will list them in NGAP message IE (e.g., the length of the DO-A data, DO-A Period). Editor’s note: Whether visible parameters are needed and what visible parameters are needed depend on RAN WGs. 4. The NG-RAN sends AIoT Command request to the AIoT reader over the RRC connection, if the AIoT reader is a UE reader. If the AIoT reader is the RAN reader, how the NG-RAN sends AIoT Command request to the AIoT reader is up to implementation. 5. The AIoT reader sends AIoT Command request to the AIoT Device. When the AIoT device receives DO-A Configuration Parameters, it sets the parameters to the device. 6. The AIoT device sends AIoT Command response to the AIoT reader to indicate DO-A Configuration Parameters are set successfully in the AIoT device. 7. The AIoT reader sends AIoT Command response to the NG-RAN over RRC connection, if the AIoT reader is a UE reader. If the AIoT reader is the RAN reader, how the AIoT reader sends AIoT Command response to the NG-RAN is up to implementation. 8. The NG-RAN sends AIoT Command response to the AIOTF to indicate the successful configuration in the AIoT Device. After this step, the NG-RAN could keep the connection as a long-term connection with the AIOTF until the terminate of the DO-A traffic. 9. The AIOTF reports the result of the AIoT Command request to the NEF. 10. The NEF informs the AF the result of the AIoT Command request. The DO-A traffic configuration procedure is complete. Additionally, the AF can initiate or stop the AIoT device DO-A traffic via the Activation/Deactivation Command request in step 11 ~ step 23. 11. The AF sends Nnef_AIoT_Command Request message (Activation/Deactivation Command type, DO-A configuration set info, target AIoT device info) to the AIoT device via the NEF to initiate or stop the configured DO-A traffic. DO-A configuration set selection info is the optional IE and this information is only presented if there are multiple sets of DO-A Configuration Parameters. Excepting the above parameters, the Nnef_AIoT_Command Request also includes other necessary parameters specified in clause  6.2.3 of TS  23.369 [3]. 12. The NEF selects the AIOTF and sends the Naiotf_AIoT_Command Request message (Activation/Deactivation Command type, target AIoT device info) to the selected AIOTF. 13. The AIOTF checks the AF Authorization and device capability to perform DO-A traffic. 14. The AIOTF sends the Naiotf_AIoT_Command Response message (accept or reject, cause) to the NEF. 15. The NEF sends the Nnef_AIoT_Command Response message (accept or reject, cause) to the AF. If the response was a reject the procedure stops here. 16. The AIOTF sends AIoT Command request, including correlation ID and AIOT NAS PDU (the activation/deactivation indication), to the NG-RAN. NOTE  3: After step 8, the NG-RAN keeps the connection as a long-term connection with the AIOTF so that the inventory procedure is not presented. Editor’s note: Whether the activation/deactivation indication is useful and visible to the NG-RAN is FFS. 17. The NG-RAN sends AIoT Command request, including AIOT NAS PDU (the activation/deactivation indication), to the AIoT reader over the RRC connection, if the AIoT reader is a UE reader. If the AIoT reader is the RAN reader, how the NG-RAN sends AIoT Command request to the AIoT reader is up to implementation. 18. The AIoT reader sends AIoT Command request, including AIOT NAS PDU (the activation/deactivation indication), to the AIoT Device. 19. The AIoT Device sends AIoT Command response, including AIOT NAS PDU (the activation/deactivation result), to the AIoT reader to indicate DO-A traffic is initiated successfully or stopped successfully. NOTE  4: After sending the AIoT Command response, if the command type in step 13 is Activation, for the periodical DO-A traffic the AIoT device begins to calculate the sending timing according to the configured DO-A period. Editor’s note: How the AIoT Device supports timer is FFS. 20. The AIoT reader sends AIoT Command response, including AIOT NAS PDU (the activation/deactivation result), to the NG-RAN over the RRC connection, if the AIoT reader is a UE reader. If the AIoT reader is the RAN reader, how the AIoT reader sends AIoT Command response to the NG-RAN is up to implementation. 21. The NG-RAN sends AIoT Command response, including AIOT NAS PDU (the activation/deactivation result), to the AIOTF. 22. The AIOTF sends AIoT Command response to the NEF to indicate the result of activation/deactivation command. 23. The NEF sends AIoT Command response to the AF to indicate the result of activation/deactivation command. After the activation procedure, the AIoT device generates the DO-A Data and send DO-A data with the AIoT device ID (e.g., AIoT device temporary ID) according to DO-A Configuration Parameters. Editor’s note: The details procedure of the routing of the AIoT device DO-A data is FFS. Editor’s note: It is FFS for whether there is response from the CN to the AIoT device. After the deactivation procedure, the AIoT device stops to send the DO-A data until the AF sends activation command request. 6.x19.3 Impacts on services, entities and interfaces Impacts on existing entities: AIOTF: - Receives DO-A Configuration Parameters for DO-A data reporting from AF. - Performs Inventory procedure and sends AIoT Command Request with DO-A Configuration Parameters to the AIoT device. - Receives DO-A traffic Activation/Deactivation Command request from AF and sends activation/deactivation indication to the AIoT device via AIOT NAS message. - Receives DO-A data (e.g., sensing data) from AIoT device(s) through AIoT reader(s) and delivers it to the AF through the NEF or not. ADM: - Supports the AIoT device profile, including DO-A Capability. NG-RAN: - Supports DO-A procedure for AIoT Device(s). - Supports to keep the connection as long-term connection with the AIOTF after the DO-A traffic configuration procedure. AIoT reader: - Supports DO-A procedure for AIoT Device(s). AIoT Device: - Supports DO-A procedure for DO-A data report. - Supports to set DO-A Configuration Parameters and behave according to DO-A Configuration Parameters. - Supports timer. 6.X Solution #X: <Solution Title> 6.X.0 High-level solution Principles Editor's note: Where possible similar/overlapping solution proposals should be documented as a single solution in the TR. Documentation of more than one solution from the same company for the same KI is allowed but it shouldn't be expected that all of them will be documented in the TR. 6.X.1 Description Editor's note: This clause will describe the solution principles and architecture assumptions for corresponding key issue(s). Further (sub-)clause(s) may be added to capture details. 6.X.2 Procedures Editor's note: This clause will describe the high-level procedures and information flows for the solution. 6.X.3 Impacts on Services, Entities and Interfaces Editor's note: This clause captures impacts on existing services, entities and interfaces.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.5 Solution #5: DO-A procedure with configured routing information
223bf418b59ea1d3b400a69f37607082
23.700-30
6.5.0 High-level solution Principles
This solution aims to resolve KI#2 to support DO-A Capable AIoT Devices, the following principles are followed in this solution: - This solution has reused the architecture defined in clause 4.2.2 of TS 23.369 [3]. This solution is applied to both direct connectivity and indirect connectivity for Topology 1. - The AIoT Device is not required to perform the registration procedure first before sending the DO-A data. - AIoT Device sends the DO-A routing information along with the DO-A message for AIOTF to find the proper AF. - AF subscribes to the DO-A Data notify by sending a Subscribe Request to the AIOTF (optionally via the NEF). - AIOTF derives the corresponding AF according to the routing information in the NAS DO-A Data Transfer Request message and the context generated in DO-A data subscribe procedure.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.5.1 Description
This solution resolves KI#2 for support of DO-A Capable AIoT Devices. This solution has the following assumptions: 1) AIoT Device is pre-configured or configured by the network with DO-A routing information. 2) AIoT Device sends the DO-A routing information along with the DO-A message for AIOTF to find the proper AF. 3) The NG-RAN selects the correlated AIOTF according to AIOTF information in the temp ID if a temp ID is included in the D2R AS message. 4) AF subscribes to the DO-A Data notify by sending a Subscribe Request to the AIOTF (optionally via the NEF). AIOTF updates AIoT DO-A Profile in ADM with the associated AF subscription. 5) AIOTF receiving the DO-A data can query the ADM to find the DO-A data associated AIOTF(s) and forward the received DO-A data to the associated AIOTF(s). 6) AIOTF derives the corresponding AF according to the routing information in the NAS DO-A Data Transfer Request message and the associated (AF) Transaction ID used in DO-A data subscribe procedure.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.5.2 Procedures
223bf418b59ea1d3b400a69f37607082
23.700-30
6.5.2.1 DO-A data subscribe procedure
Figure 6.5.2-1: Figure for DO-A data subscribe procedure 1. The AF sends the DO-A data subscribe request to NEF with AF ID and target AIoT device information to subscribe for the notification of the DoA data. 2. NEF performs AIOTF selection based on the target AIoT device information. 3. The NEF sends the DO-A data subscribe request to the selected AIOTF with a Transaction ID. 4. The AIOTF authorizes the AF request to check whether the AF is allowed to subscribe to DO-A delivery, based on the AF authorization data stored in the ADM. 5. If authorization succeeded, the AIOTF updates AIoT DO-A Profile in ADM with the associated AF subscription. 6. If the AIOT device is not pre-configured, the AIOTF allocates the routing information for the DO-A data transfer and configure the AIOT device via e.g. AIoT Command procedure defined in clause 6.2.2 of TS 23.369 [3]. In this step, the AIOTF may also allocate a Temp ID to AIoT Device for NAS DOA Data Transfer. 7. AIOTF sends response to the NEF with a Transaction ID for the DO-A data subscribe request. 8. NEF sends response to AF with AF Transaction ID for the DO-A data subscribe request.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.5.2.2 DO-A data transfer procedure
Figure 6.5.2-2: Procedure for DO-A procedure with configured routing information 0. DoA routing information (e.g. AF ID or AIOTF allocated DO-A association ID) at the AIoT device side or configured by the network as defined in clause 6.5.2.1. Security information for DO-A traffic may also be pre-configured or configured along with the DoA routing information. Editor's note: DO-A traffic security mechanism will be determined by SA WG3. 1. The AIoT Device decides to trigger a DO-A message (e.g. detecting DO-A trigger broadcast signal, etc.). Editor's note: DO-A trigger broadcast signal is further defined in RAN WGs. 2. The AIoT Device sends the AS D2R message (Temp ID, NAS DOA Data Transfer Request message (DO-A data, AIoT device ID, routing information)) to the NG-RAN. AIoT device ID may be a permanent Device ID or Temp Device ID. The temp ID is also provided in the AS D2R message if the AIOTF has allocated a Temp ID to AIoT Device during or after the Command procedure, or during the previous DO-A Data Transfer procedure. 3. The NG-RAN allocates an NGAP ID for the AIoT device and forwards the NAS DO-A Data Transfer Request message in Initial DO-A message to the AIOTF. If a temp ID is included AS D2R message, the NG-RAN can select the AIOTF according to the temp ID. If the temp ID is not included in AS D2R message or the AIOTF derived from the AIOTF in the temp ID can not be selected, the NG-RAN can select an AIOTF which can serve the AIoT Device. The selected AIOTF can query the ADM to find the DO-A data associated AIOTF(s) and forward the received DO-A data to the associated AIOTF(s) Editor's note: Whether and how temp ID can be used to find the AIOTF is FFS. 4. Upon receiving the Initial DO-A Message, the AIOTF performs a device check with device profile data retrieved from the ADM to validate the AIoT device. Editor's note: Details for device check for DO-A Data Transfer procedure will be determined by SA WG3. 5. After the successful device check, the AIOTF derives the corresponding AF according to the routing information in the NAS DO-A Data Transfer Request message and the associated Transaction ID received in step 3 of clause 6.5.2.1. The AIOTF sends the Naiotf_AIoT_Data Transfer message including the DO-A data and AIoT Device ID to the NEF. 6. The NEF invokes the AIoT_Data Transfer service to forward the DO-A data to the AF according to the AF Transaction ID and AF ID used in DO-A data subscribe procedure. 7. The AF sends the AIoT_Data Transfer_Response to NEF with AIoT device ID and the response to the DoA data, which may include further data or acknowledgments related to the DO-A Data Transfer process. 8. The NEF invokes AIoT_Data Transfer_Response to AIOTF. The message includes the DO-A data response and related AIoT device ID. 9. The AIOTF allocates an NGAP ID for the AIoT device and sends DL NAS message to NG-RAN with the DO-A data response. In this step, the AIOTF may also allocate a Temp ID to AIoT Device NAS DOA Data Transfer Response message. Editor's note: Whether inventory procedure for the DL NAS messages transfer is needed is FFS. 10. The NG-RAN sends the AS R2D message to the AIoT device including the NAS message.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.5.3 Impacts on services, entities and interfaces
The solution has impacts on the following entities: AIoT Device: - Support to initiate DO-A message transfer procedure and send routing information along with the DO-A data. AIOTF: - Support to route the DO-A message to proper NEF/AF according to the routing information. NG-RAN: - Support to select the AIOTF based on the temp ID if provided by the AIoT device. - Support to establish NGAP connection with AIOTF for DO-A message transfer.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.6 Solution #6: Support Reporting operator triggered by events without registration for DO-A capable AIoT Devices
223bf418b59ea1d3b400a69f37607082
23.700-30
6.6.0 High-level Solution Principles
This solution addresses Key Issue #2 "Support of DO-A Capable AIoT Devices". AIoT device sends report message when triggered by events, includes pending data, power on, device specific events (e.g. temperature higher than a threshold). The information for the device specific events can be provisioned by AF via Command operation, e.g. writing the threshold to the AIoT device.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.6.1 Description
This solution is applicable to both the Direct Connectivity and the Indirect Connectivity architectures as defined of TS 23.369 [3]. For a DO-A capable AIoT Device, the device is triggered by events to report its presence and/or send data to the network. The principles of this solution are as follows: - No registration-like procedure needed for the DO-A capable AIoT Device. - The AIOTF for routing the DO-A report and the AIOTF for inventory and command operations can be different. - The events triggered DO-A report includes target AF and may include data from the AIoT Device.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.6.2 Procedures
Figure 6.6.2-1 describes the Reporting procedure from DO-A capable AIoT Device. Figure 6.6.2-1: DO-A device reporting procedure 0. The AIoT device is pre-configured with target AF information, e.g. FQDN, by the owner of the AIoT device for routing the information in the Report Request. Allowed AF(s) may be pre-configured in the AIoT device profile data in ADM. The information for device specific events may be provisioned by the AF using the Command operation, e.g. write a sharehold related to a device specific event to the AIoT device. NOTE 1: The allowed AF(s) in the ADM can be changed via OAM. The target AF information may be configured by the owner of the device via Inventory and Command operator. 1. The AF subscribes to the NEF with the AF information and optional the service area. The NEF selects AIOTF(s), e.g. based on pre-configuration or the service area and subscribes to the selected AIOTF(s). NOTE 2: It is assumed all the AIOTFs serving the service area and/or serving the AF are subscribed by the NEF. 2. The AIoT device is triggered by events, e.g. pending data, power on, or device specific events. 3. The AIoT device sends D2R message including AIoT NAS Report Request (Device ID, target AF, [data]) to the RAN Reader. In case there are pending data in the AIoT device, the data is included in the AIoT NAS Report Request message. Editor's note: How the AIoT device sends the D2R message to the RAN Reader is FFS. Editor's note: Whether the solution is applicable for UE Reader case is FFS. NOTE 3: Security aspects related to the Device ID and the data protection are to be defined by SA WG3. 4. The NG-RAN selects an AIOTF, e.g. based on local policy or pre-configuration. 5. The NG-RAN sends a N2 request message (indirect) or AIOT2 request message (direct) including the Reader ID and the AIOT NAS Report Request message towards the selected AIOTF. 6. The AIOTF requests authorization data from ADM. 7. The AIOTF authorizes the Report Request from the device, e.g. based on whether the target AF is in the allowed AF(s) per the device, per the group of the device, or per the network, whether the device is allowed to initiate Report Request, whether the location is allowed to send the report per the device, etc. If the authorization of report from the AIoT device is successful, goes to step 8, otherwise goes to step 9 with proper cause value. 8. The AIOTF maps the Reader ID into location information and sends a Notify (Device ID, location info, [data]) message towards the AF via the NEF based on the target AF. The NEF forwards the Notify message towards the AF. 9. The AIOTF responds to the RAN Reader. The AIOTF may update the last known reader information in the AIoT device profile data in the ADM. 10. The RAN Reader sends R2D message to the AIoT Device.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.6.3 Impacts on Services, Entities and Interfaces
Editor's note: This clause captures impacts on existing services, entities and interfaces. AIoT Device: - Support initiate Report Request procedure triggered by events. NG-RAN: - Support AIOTF selection. AIOTF: - Support Report Request authorization. - Support sending Device ID, location information and optional data to target AF indicated in the Report Request. NEF: - Support managing AF sessions for AIOT service between AFs and AIOTFs. ADM: - Support providing authorization data to AIOTF when requested.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.7 Solution #7: DO-A procedure for DO-A Capable AIoT Devices
223bf418b59ea1d3b400a69f37607082
23.700-30
6.7.0 High-level solution Principles
This solution is for Key Issue #2, corresponding to bullet 3: How an AIoT Device sends data to the AIOTF autonomously. It includes DO-A procedure to send data to the AIOTF, get network resource/assistance information to initial DO-A procedure and DO-A policy information which describe when will perform the DO-A procedure.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.7.1 Description
This solution is for Key Issue #2, corresponding to bullet 3: How an AIoT Device sends data to the AIOTF autonomously. This solution is to support for an DO-A Capable AIoT Device autonomously originated DO-A procedure to send data to the AIOTF and support for routing the received data by AIOTF to AF. The main points are as following: - The DO-A Capable AIoT Devices support autonomously originating DO-A procedure to send data to the AIOTF. - The DO-A Capable AIoT Device has pre-configurated network resource/assistance information(e.g. frequency, Qos, Resource Expiration Date, etc) for autonomously originating DO-A procedure; or support to receive the network resource information/assistance information (e.g. frequency, QoS, Resource Expiration Date, etc) from the network for autonomously originating DO-A procedure, using by AIoT write commands or new AIoT service, or network system information, etc. NOTE 1: How to get and the details of the network resource/assistance information for autonomously originating DO-A procedure will be coordinated with RAN WG2. - When the DO-A Capable AIoT Device will autonomously originate DO-A procedure to send data, is based on the DO-A policy information. The DO-A policy information may be received from network or AF via the network, which send by AF using AIoT write commands or some new AIoT service. Or the DO-A policy information can be pre-configurated in the AIoT device or UICC if have. - The DO-A policy information may include: - Target information: identify where and which AF the DOA data sends/routes to by AIoT device, for example AF identify, etc. - Service policy: describe when and how the AIoT device autonomously originated to send DOA data, such as: 9:00 am every day, when the timer expired, the upper layer initials, etc. NOTE 2: The details of DO-A policy are coordinated between the operator and AF vender, which is out of 3GPP scope. - The DO-A Capable AIoT Device supports to autonomously originating procedure to send data to the AIOTF and support for routing the received data by AIOTF. The procedure may include: security data, target information and the data information. The security data is used for the network authentication AIoT device; and the target information is used to identify where and which AF the DOA data sends/routes to, for example AF identify, etc; the data information is the real data which the AIoT device wants to send for AF.
223bf418b59ea1d3b400a69f37607082
23.700-30
6.7.2 Procedures
The following figure presents a DO-A procedure for DO-A Capable AIoT Devices for Topology 1 and Topology 2. Figure 6.7.2-1: DO-A procedure for DO-A Capable AIoT Devices 0-a. DO-A Capable AIoT Devices may be pre-configured with network resource/assistance information(e.g. frequency, QoS, Resource Expiration Date, etc) for autonomously originating DO-A procedure. 0-b. DO-A Capable AIoT Devices may be pre-configured with DO-A policy information for autonomously originating DO-A procedure. NOTE 1: How information is configured into AIoT device is out of scope of 3GPP. NOTE 2: How to get and the details of the network resource/assistance information for autonomously originating DO-A procedure will be coordinated with RAN WG2. 1. AF sends like DO-A service request to NEF via AIoT write command or new AIoT Service, it may include following parameters: AIoT devices ID, AF ID, DO-A policy information, etc. - DO-A policy information may include: - Target information: identify where and which AF the DOA data sends/routes to by AIoT device, for example AF identify, etc. - Service policy: describe when and how the AIoT device autonomously originated to send DOA data, such as: 9:00 am every day, when the timer expired, the upper layer initials, etc. NOTE 3: The details of DO-A policy are coordinated between the operator and AF vender, which is out of 3GPP. 2. AIOTF/NEF receives the DO-A service request from AF and will check the authorization of AF and the authorization of DO-A Capable of AIoT devices based on the subscription in ADM. If it is allowed, the network function(e.g. AIOTF or RAN/UE reader) will send the network resource information/assistance information(e.g. frequency, QoS, Resource Expiration Date, etc) for DO-A Capable of AIoT devices autonomously originating DO-A procedure. DO-A Capable of AIoT devices receives these network resource information/assistance information. 3. AIOTF/NEF sends the DO-A policy information from AF to DO-A Capable of AIoT devices. DO-A Capable of AIoT devices receives these DO-A policy information. 4. DO-A Capable of AIoT devices store these receiving network resource and/or DO-A policy information for DO-A procedure from network. 5. When DO-A policy information is applied, for example: the timers from the DO-A policy information expired, the DO-A Capable of AIoT device performs the DO-A procedure. 6. The DO-A Capable of AIoT device sends DO-A data to network/AF via RAN/UE Reader, using the storing or pre-configured network resource. The procedure may include: security data, target information and the data information. The security data is used for the network authentication AIoT device; and the target information is used to identify where and which AF the DOA data sends/routes to, for example AF identify, etc; the data information is the real data which the AIoT device wants to send for AF. 7. RAN/UE Reader routes the DO-A Data from AIoT device to AF via AIOTF based on the target information provided by AIoT device or other solutions. Editor's note: How the RAN/UE Reader routes the DO-A Data to AF will be coordinated with solutions for KI 2 bullet of "Support for routing the data received by AIOTF from an AIoT Device to an AF", or be FFS.