[{"name":"S3-170075","title":"Discussion on security method of UE transmit data in RRC_INACTIVE state","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"discussion","for":"Discussion","abstract":"This discussion paper is for the security method of UE transmitting data in RRC_INACTIVE state","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":3050,"status":"noted","reservation_date":"2017-01-27 10:34:32","uploaded":"2017-02-01 03:49:06","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":[{"winame":"FS_NR_newRAT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170075.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170104","title":"Handling of SI requests from unauthenticated UEs in NR","source":"BlackBerry UK Limited","contact":"Nicholas Alfano","contact-id":16849,"tdoctype":"discussion","for":"Decision","abstract":"An IDLE mode UE may request one or more SIBs and the network needs to deliver these SIBs. In this contribution the security implications of the SI requests coming from IDLE mode UEs on the downlink radio resource load in the cell are discussed and some so","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":1350,"status":"noted","reservation_date":"2017-01-27 18:43:07","uploaded":"2017-01-27 18:51:02","revisionof":"","revisedto":"","release":"Rel-14","crspec":"","crspecversion":"","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170104.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170106","title":"Handling token and key derivation for data transmitting in RRC_INACTIVE","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"This paper is for the security method of UE transmitting data in RRC_INACTIVE state, which is related to key issue 4.7 \u201cKey handling in RRC inactive state to RRC active state transition\u201d.","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":3060,"status":"noted","reservation_date":"2017-01-28 16:34:45","uploaded":"2017-02-01 03:49:06","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170106.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170113","title":"Discussion LS R2-1700656","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"discussion","for":"Discussion","abstract":"Discussion on Security aspects of RRC-INACTIVE state asked in the LS R2-1700656","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":3380,"status":"noted","reservation_date":"2017-01-28 17:57:38","uploaded":"2017-01-30 14:06:54","revisionof":"","revisedto":"","release":"Rel-14","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170113.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170135","title":"RAN Security: comparison of SIB protection solutions","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"Provides comparison between two SIB protection solutions in the TR.","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2260,"status":"noted","reservation_date":"2017-01-29 21:32:47","uploaded":"2017-01-30 14:06:54","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170135.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170156","title":"pCR to TR 33.899: Fake gNB Detection using Identity Based Signature","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"pCR","for":"Approval","abstract":"This contribution describes solutions for detecting the fake gNB using the Identify based cryptography and solutions.","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2290,"status":"revised","reservation_date":"2017-01-30 08:32:04","uploaded":"2017-01-30 08:39:02","revisionof":"","revisedto":"S3-170462","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170156.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170167","title":"pCR to TR 33.899_Merger of Key Issues #4.3 and #4.8","source":"NEC EUROPE LTD, Ericsson","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes to merge Key Issue #4.3 Security aspects of dual connectivity and Key Issue #4.8 Security aspects for deployment scenario of option 3","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":750,"status":"revised","reservation_date":"2017-01-30 08:54:02","uploaded":"2017-01-30 13:06:09","revisionof":"","revisedto":"S3-170445","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170167.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170219","title":"New solution - Security of Access Stratum (AS) keys on Xn handover","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2300,"status":"approved","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170219.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170220","title":"New solution- UE-assisted false base station detection","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2310,"status":"revised","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"S3-170463","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170220.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170221","title":"New KI - Security aspects of N2 handover","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":1560,"status":"approved","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170221.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170222","title":"New KI - Security aspects of sidehaul interfaces","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":1670,"status":"approved","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170222.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170223","title":"New KI - Flexibility to retain or to change AS security keys","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2190,"status":"revised","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"S3-170447","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170223.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170224","title":"New KI - Changing AS security keys on-the-fly","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2200,"status":"revised","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"S3-170448","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170224.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170225","title":"New KI - Dealing with radio jamming","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2210,"status":"revised","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"S3-170449","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170225.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170226","title":"New KI - Privacy aspects of RAN level subscription identifiers","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2220,"status":"revised","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"S3-170450","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170226.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170227","title":"New KI - Security aspects of Xn handover","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2230,"status":"revised","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"S3-170451","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170227.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170228","title":"New KI - Security algorithm negotiation between UE and RAN","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2240,"status":"approved","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170228.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170229","title":"Updating KI - #4.4 Security aspects of intra-NR mobility","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":1040,"status":"approved","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170229.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170230","title":"New solution - Security of sidehaul interface","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2340,"status":"approved","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170230.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170231","title":"New KI \u2013 Supporting integrity protection of UP in\/between gNB and UE","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2250,"status":"approved","reservation_date":"2017-01-30 11:46:07","uploaded":"2017-01-30 14:47:36","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170231.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170234","title":"Resolving Editor\u2019s Notes in Key issue #4.2: Security requirements on gNB","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":1060,"status":"approved","reservation_date":"2017-01-30 12:00:11","uploaded":"2017-01-30 14:34:18","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170234.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170247","title":"Key Derivation Mechanism in RRC inactive connected state to RRC connected state transition","source":"China Mobile Com. Corporation","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2470,"status":"noted","reservation_date":"2017-01-30 12:18:51","uploaded":"2017-01-30 12:56:25","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170247.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170300","title":"Option 3\/3a\/3x security aspects and conclusions","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":3000,"status":"approved","reservation_date":"2017-01-30 14:03:31","uploaded":"2017-01-30 14:40:15","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170300.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170305","title":"Clarification on the UTC-Based Time Counter","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2270,"status":"approved","reservation_date":"2017-01-30 14:12:56","uploaded":"2017-01-30 14:28:47","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170305.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170306","title":"Overhead Reduction using the other SI","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2280,"status":"revised","reservation_date":"2017-01-30 14:14:56","uploaded":"2017-01-30 14:28:47","revisionof":"","revisedto":"S3-170461","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170306.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170308","title":"RAN security area introduction","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":1130,"status":"revised","reservation_date":"2017-01-30 14:20:29","uploaded":"2017-01-30 14:57:31","revisionof":"","revisedto":"S3-170446","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170308.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170445","title":"pCR to TR 33.899_Merger of Key Issues #4.3 and #4.8","source":"NEC EUROPE LTD, Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":751,"status":"approved","reservation_date":"2017-02-09 09:31:13","uploaded":"2017-02-09 09:31:13","revisionof":"S3-170167","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170445.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170446","title":"RAN security area introduction","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":1131,"status":"approved","reservation_date":"2017-02-09 08:39:11","uploaded":"2017-02-09 08:39:11","revisionof":"S3-170308","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170446.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170447","title":"New KI - Flexibility to retain or to change AS security keys","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2191,"status":"approved","reservation_date":"2017-02-09 11:08:37","uploaded":"2017-02-09 11:08:37","revisionof":"S3-170223","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170447.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170448","title":"New KI - Changing AS security keys on-the-fly","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2201,"status":"approved","reservation_date":"2017-02-09 11:08:37","uploaded":"2017-02-09 11:08:37","revisionof":"S3-170224","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170448.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170449","title":"New KI - Dealing with radio jamming","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2211,"status":"approved","reservation_date":"2017-02-09 11:08:37","uploaded":"2017-02-09 11:08:37","revisionof":"S3-170225","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170449.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170450","title":"New KI - Privacy aspects of RAN level subscription identifiers","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2221,"status":"approved","reservation_date":"2017-02-13 15:45:14","uploaded":"2017-02-13 15:45:14","revisionof":"S3-170226","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170450.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170451","title":"New KI - Security aspects of Xn handover","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2231,"status":"approved","reservation_date":"2017-02-09 14:37:05","uploaded":"2017-02-09 14:37:05","revisionof":"S3-170227","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170451.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170461","title":"Overhead Reduction using the other SI","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2281,"status":"approved","reservation_date":"2017-02-10 15:20:47","uploaded":"2017-02-10 15:20:47","revisionof":"S3-170306","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170461.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170462","title":"pCR to TR 33.899: Fake gNB Detection using Identity Based Signature","source":"Intel Corporation (UK) Ltd","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2291,"status":"approved","reservation_date":"2017-02-10 11:40:15","uploaded":"2017-02-10 11:40:15","revisionof":"S3-170156","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170462.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170463","title":"New solution- UE-assisted false base station detection","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2311,"status":"approved","reservation_date":"2017-02-10 11:40:15","uploaded":"2017-02-10 11:40:15","revisionof":"S3-170220","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170463.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170464","title":"Key Derivation Mechanism in RRC inactive connected state to RRC connected state transition","source":"China Mobile Com. Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":50,"ainumber":"8.4.4","ainame":"RAN security","tdoc_agenda_sort_order":2471,"status":"withdrawn","reservation_date":"2017-02-14 16:24:11","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]