MSCCK

MBMS Sub-Channel Control Key

Security
Introduced in Rel-13
A security key used in Multimedia Broadcast Multicast Service (MBMS) to protect sub-channel control information. It ensures the integrity and confidentiality of scheduling and configuration data for broadcast/multicast services, preventing unauthorized access and service disruption.

Description

The MBMS Sub-Channel Control Key (MSCCK) is a cryptographic key defined within the 3GPP security architecture for Multimedia Broadcast Multicast Service (MBMS). Its primary function is to secure the control plane information associated with MBMS sub-channels. An MBMS service can be divided into multiple sub-channels, each potentially carrying different content or quality levels. The control information for these sub-channels, which includes scheduling details, configuration parameters, and service announcements, is transmitted over the air interface and must be protected to ensure service reliability and prevent spoofing or denial-of-service attacks.

The MSCCK is derived within the BM-SC (Broadcast Multicast Service Centre) as part of the MBMS key hierarchy. It is generated from a parent key, the MBMS Service Key (MUK), using a Key Derivation Function (KDF) with specific input parameters that identify the service and the control channel. This derived key is then used to compute integrity protection values (MACs) and, optionally, to encrypt the control messages sent on channels like the MCCH (MBMS Control Channel) or MSCH (MBMS Scheduling Channel). The UE (User Equipment) receiving the MBMS service must also derive the same MSCCK using the MUK it has securely obtained, allowing it to verify the integrity and decrypt the control information.

Architecturally, the MSCCK operates within the MBMS security framework defined in TS 33.246 and related specs. It is a crucial element for enabling secure selective decryption in MBMS. By having separate keys for control and traffic, the network can provide free-to-air control information (protected by MSCCK) while keeping the actual media content encrypted with a different key (the MTK - MBMS Traffic Key). This separation allows for flexible service models, such as enabling users to discover and subscribe to services via protected control channels before purchasing the key for the content itself. The MSCCK's role is therefore foundational for secure service provisioning, efficient key management, and robust protection against attacks targeting the service discovery and configuration mechanisms in broadcast networks.

Purpose & Motivation

The MSCCK was introduced to address specific security vulnerabilities in the MBMS control plane. Early MBMS deployments focused on securing the user plane traffic (the actual video or data stream) with the MTK. However, the control information necessary for a UE to find, subscribe to, and correctly receive an MBMS service was often sent in the clear or with insufficient protection. This created a vector for attacks where malicious actors could inject false scheduling information, causing UEs to tune to incorrect frequencies or time slots, leading to service disruption (denial-of-service) or battery drain.

The creation of the MSCCK was motivated by the need for a holistic security approach for broadcast services. It solves the problem of ensuring the authenticity and integrity of critical service metadata. Without it, an attacker could forge service announcements or modify scheduling parameters, undermining the entire MBMS service model. The MSCCK enables the network to cryptographically bind control information to the legitimate service provider (the BM-SC), ensuring that UEs only act on commands from a trusted source. This is especially important for commercial services, including mobile TV and public safety communications, where reliable and tamper-proof service discovery is essential. Its introduction in Rel-13 as part of enhanced MBMS security (eMBMS) reflects the growing emphasis on robust security for broadcast-based 5G enablers like LTE-based 5G Broadcast.

Key Features

  • Derived from the MBMS User Key (MUK) using a standardized Key Derivation Function (KDF).
  • Protects the integrity and optionally the confidentiality of MBMS sub-channel control messages.
  • Enables secure service discovery and configuration by protecting channels like MCCH and MSCH.
  • Supports separation of control and user plane security (MSCCK vs. MTK) for flexible service models.
  • Essential for preventing spoofing and denial-of-service attacks on the MBMS control plane.
  • Specified within the 3GPP MBMS security architecture in TS 33.246 and related documents.

Evolution Across Releases

Rel-13 Initial

Initially introduced as part of enhanced MBMS (eMBMS) security enhancements. Defined the key hierarchy where MSCCK is derived from the MUK to specifically protect sub-channel related control information (e.g., on MSCH). Established its role in securing scheduling and configuration data for MBMS services.

Defining Specifications

SpecificationTitle
TS 24.380 3GPP TS 24.380
TS 33.179 3GPP TR 33.179
TS 33.180 3GPP TR 33.180
TS 33.880 3GPP TR 33.880