[{"name":"S3-151718","title":"Secure storage of the security policy","source":"Microsoft Corporation, Nokia Networks","contact":"Dajiang Zhang","contact-id":33091,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"approved","reservation_date":"2015-08-11 08:02:58","uploaded":"2015-08-11 08:12:02","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151718.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151759","title":"Applying authenticated encryption schemes to CIoT","source":"China Mobile Com. Corporation","contact":"Ivy Guo","contact-id":61044,"tdoctype":"pCR","for":"Decision","abstract":"The pCR specifies the reason why authenticated encryption schemes should be applied to CIoT.","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"postponed","reservation_date":"2015-08-14 07:05:35","uploaded":"2015-08-17 09:57:04","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"0.2.0","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151759.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151763","title":"Comparison of authenticated encryption schemes","source":"China Mobile Com. Corporation","contact":"Ivy Guo","contact-id":61044,"tdoctype":"pCR","for":"Decision","abstract":"The pCR compares three representative authenticated encryption schemes in terms of their feature and performance. It provides the guidance which scheme is well suited to the cellular IOT scenario.","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"postponed","reservation_date":"2015-08-14 07:09:19","uploaded":"2015-08-17 09:57:04","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"0.2.0","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151763.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151765","title":"Preventing unauthorized modification of signalling data","source":"China Mobile Com. Corporation","contact":"Ivy Guo","contact-id":61044,"tdoctype":"pCR","for":"Decision","abstract":"The pCR justifies that integrity protection shall be applied to signaling data in cellular IOT in order to prevent unauthorized modification.","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"postponed","reservation_date":"2015-08-14 07:12:28","uploaded":"2015-08-17 09:57:04","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"0.2.0","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151765.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151768","title":"Preventing unauthorized modification of user data in cellular IOT","source":"China Mobile Com. Corporation","contact":"Ivy Guo","contact-id":61044,"tdoctype":"pCR","for":"Decision","abstract":"The pCR identifies that integrity protection should be applied to user data in cellular IOT in order to prevent unauthorized modification.","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"postponed","reservation_date":"2015-08-14 07:17:05","uploaded":"2015-08-17 09:57:04","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"0.2.0","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151768.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151797","title":"Early security solution for EASE, pCR to TR 33.860","source":"Nokia Networks","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-15 14:28:15","uploaded":"2015-08-17 13:24:36","revisionof":"","revisedto":"S3-152069","release":"Rel-13","crspec":33.86,"crspecversion":"","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151797.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151892","title":"A solution proposal on EASE_IoT algorithms","source":"Ericsson, Huawei","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Decision","abstract":"This contribution proposes that 3G cellular algorithms are re-used in EASE_IoT. It is proposed that SA3 sends LS on how the algorithms should be specified to ETSI SAGE. The algorithms are not new, however, the way of applying them to GPRS context should be discussed in ETSI SAGE.","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-17 11:30:14","uploaded":"2015-08-17 13:06:13","revisionof":"","revisedto":"S3-152071","release":"Rel-13","crspec":33.86,"crspecversion":"","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151892.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151905","title":"[DRAFT] LS on enhanced GPRS security algorithms for Cellular IoT","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"LS out","for":"Decision","abstract":"This is a proposed LS to ETSI SAGE (SA3 is currently studying the possibility to enhance GPRS security in order to support the current GERAN activities related to Cellular system support for ultra low complexity and low throughput Internet of Things (FS_IoT_LC). SA3 is studying security enhancement to the Gb interface with an assumption that the new type of UE need no access to the legacy networks. One of the solution approaches is proposing of adding integrity protection to GPRS. There is also a proposal for specifying a new encryption algorithm with 128 bit key. SA3 would like to request ETSI SAGE feedback related to some topic that are currently discussed in this context. )","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-17 11:46:13","uploaded":"2015-08-17 13:06:13","revisionof":"","revisedto":"S3-152072","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151905.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151909","title":"New Work Item on Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"WID new","for":"Decision","abstract":"This contribution proposes that SA3 starts a new work item on Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT.","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-17 11:55:34","uploaded":"2015-08-17 13:06:13","revisionof":"","revisedto":"S3-151999","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151909.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151953","title":"pCR to TR 33.860: Data efficient rekeying","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"Update radio interface encryption \/ integrity keys frequently with much lower data transmission requirements than full AKA.","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-17 13:31:29","uploaded":"2015-08-17 13:51:18","revisionof":"","revisedto":"S3-152068","release":"Rel-13","crspec":33.86,"crspecversion":"","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151953.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151954","title":"pCR to TR 33.860: Long enough session keys","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":0,"status":"approved","reservation_date":"2015-08-17 13:33:27","uploaded":"2015-08-17 13:51:18","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151954.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151999","title":"New Work Item on Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"WID new","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":19541,"status":"revised","reservation_date":"2015-09-11 15:35:06","uploaded":"2015-09-11 15:34:40","revisionof":"S3-151909","revisedto":"S3-152087","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151999.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152068","title":"pCR to TR 33.860: Data efficient rekeying","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":17651,"status":"approved","reservation_date":"2015-09-11 15:35:19","uploaded":"2015-09-11 15:34:50","revisionof":"S3-151953","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152068.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152069","title":"Early security solution for EASE, pCR to TR 33.860","source":"Nokia Networks","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":17681,"status":"approved","reservation_date":"2015-09-11 15:35:19","uploaded":"2015-09-11 15:34:50","revisionof":"S3-151797","revisedto":"","release":"","crspec":33.86,"crspecversion":"","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152069.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152071","title":"A solution proposal on EASE_IoT algorithms","source":"Ericsson, Huawei","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":19051,"status":"approved","reservation_date":"2015-09-11 15:35:20","uploaded":"2015-09-11 15:34:52","revisionof":"S3-151892","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152071.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152072","title":"LS on enhanced GPRS security algorithms for Cellular IoT (to: ETSI SAGE; cc: -; contact: Ericsson)","source":"SA3","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":19091,"status":"approved","reservation_date":"2015-09-11 15:35:20","uploaded":"2015-09-11 15:34:52","revisionof":"S3-151905","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_EASE_IoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"ETSI SAGE","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152072.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152074","title":"TR 33.860 (status after SA3 #80)","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":207400,"status":"agreed","reservation_date":"2015-09-11 15:36:46","uploaded":"2015-09-11 15:36:22","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152074.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152087","title":"New Work Item on Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"WID new","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.7.1","ainame":"EGPRS access security enhancements with relation to Cellular IoT","tdoc_agenda_sort_order":19542,"status":"agreed","reservation_date":"2015-09-11 15:36:47","uploaded":"2015-09-11 15:36:23","revisionof":"S3-151999","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152087.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]