GMK

Group Management Key

Security
Introduced in Rel-12
A cryptographic key used to secure group communications and management procedures in 3GPP networks. It enables authentication, integrity protection, and confidentiality for group members, forming the basis for secure group services like MCPTT and ProSe.

Description

The Group Management Key (GMK) is a fundamental security credential in 3GPP architectures, specifically designed to protect group-based services. It is a symmetric cryptographic key that is shared among all legitimate members of a group and trusted network entities, such as the Group Management Server (GMS) or ProSe Function. The GMK serves as a root key for deriving other security keys used for various protection functions, including authentication between group members and the network, integrity protection of group management signaling, and encryption of group communication traffic. Its management lifecycle—generation, distribution, storage, and revocation—is critical to the security of services like Mission Critical Push-to-Talk (MCPTT), Proximity Services (ProSe) direct communication, and IoT group messaging.

Architecturally, the GMK is typically generated by a central authority within the network, such as the GMS residing in the home network or a dedicated Key Management Center. For ProSe, the ProSe Function may generate the GMK. The key is then securely distributed to each group member's UE via protected signaling channels, often using individual subscriber keys for over-the-air encryption during distribution. Once stored in the UE's secure environment (e.g., in the Group Management Client), the GMK is used to derive session-specific keys, such as the Group Traffic Key (GTK) for encrypting user plane data or the Group Integrity Key (GIK) for protecting control messages. This key hierarchy ensures that compromise of a derived session key does not expose the root GMK.

The operation of GMK involves several protocols and interfaces. For example, in MCPTT, when a UE joins a group, the GMS authenticates the UE and then provisions the GMK (or a key-encrypting key to deliver the GMK) to the UE's GMC. The specifications detail key derivation functions (KDFs) that use the GMK along with other parameters like group identifiers and sequence numbers to produce fresh keys. The GMK is also periodically updated or rekeyed by the network to maintain forward and backward secrecy, especially when group membership changes. In ProSe scenarios, the GMK may enable direct secure communication between UEs without network infrastructure, using the key for mutual authentication and encryption over the PC5 reference point.

Purpose & Motivation

The GMK was introduced to address the lack of standardized, secure key management for group communications in cellular networks, a gap that became critical with the standardization of Mission Critical Services and ProSe in Release 12. Prior to this, group services either used insecure methods or relied on application-layer security that was not integrated with network authentication, making them vulnerable to eavesdropping, impersonation, and replay attacks. The need for secure, low-latency group communications for public safety and critical infrastructure demanded a network-level security solution.

The creation of the GMK provides a unified cryptographic foundation for group security within the 3GPP framework. It solves the problem of scalable and efficient key distribution for dynamic groups by defining a centralized key management architecture. This allows the network to control group membership cryptographically; only UEs possessing the valid GMK can participate in secure group communications. It addresses limitations of pairwise keying, which would require a separate key for each pair of members and does not scale for large groups.

Historically, security in cellular networks focused primarily on individual subscriber authentication (e.g., using Ki in SIM cards). The GMK extends this paradigm to groups, enabling new service models. Its design was motivated by requirements from public safety organizations for secure push-to-talk and proximity-based communication during emergencies. By integrating with existing 3GPP security frameworks like the Authentication and Key Agreement (AKA), the GMK ensures that group security leverages the robust subscriber authentication already in place, while adding the necessary group-oriented key management to support both network-based and direct device-to-device communication scenarios.

Key Features

  • Serves as a root key for deriving session keys for group traffic and integrity protection
  • Centrally generated and securely distributed by network functions like GMS or ProSe Function
  • Enables authentication and secure communication among group members
  • Supports key update and rekeying procedures for forward/backward secrecy
  • Integrates with 3GPP AKA framework for secure initial distribution
  • Used to secure both control plane signaling and user plane data for group services

Evolution Across Releases

Rel-12 Initial

Introduced as the foundational security key for group communications, primarily for Mission Critical Services and ProSe. The initial architecture defined the GMK's role in key hierarchies, its generation by network functions, and secure distribution to UEs for protecting group management and direct communication.

Defining Specifications

SpecificationTitle
TS 23.784 3GPP TS 23.784
TS 24.380 3GPP TS 24.380
TS 24.581 3GPP TS 24.581
TS 24.582 3GPP TS 24.582
TS 29.380 3GPP TS 29.380
TS 29.582 3GPP TS 29.582
TS 33.179 3GPP TR 33.179
TS 33.180 3GPP TR 33.180
TS 33.303 3GPP TR 33.303
TS 33.879 3GPP TR 33.879
TS 33.880 3GPP TR 33.880
TS 33.938 3GPP TR 33.938