Description
The ProSe Integrity Key (PIK) is a security credential defined within the 3GPP architecture for Proximity Services (ProSe). It is a symmetric key derived as part of the ProSe security key hierarchy. The PIK is specifically generated for use between two ProSe-enabled User Equipments (UEs) engaging in direct one-to-one communication or within a ProSe one-to-many group. Its primary function is to provide integrity protection and data origin authentication for the user plane data transmitted over the PC5 reference point, which is the direct radio interface between devices.
The generation of the PIK is tied to the ProSe key establishment procedure. Typically, it is derived from a higher-level key, such as the ProSe Key (PK), which itself is established through network-assisted procedures or direct derivation from credentials stored on the UE. The exact derivation algorithm is specified in 3GPP security specifications. Once derived and shared between the communicating parties, the PIK is used to compute a Message Authentication Code (MAC) for data packets. The receiving UE recalculates the MAC using its copy of the PIK and compares it with the received MAC to verify the packet's integrity and that it originated from the legitimate peer.
Architecturally, the PIK operates at the access stratum level for the PC5 interface. It is managed by the ProSe function in the network during initial key provisioning but is subsequently used locally by the UEs without continuous network involvement, enabling secure communication even when outside network coverage, which is vital for public safety use cases. The key is associated with a specific ProSe session or group and has a limited lifetime, after which it must be refreshed through a re-keying procedure to maintain security.
The role of the PIK is fundamental to the trust model of ProSe. By ensuring that received data has not been altered in transit and originates from an authorized device within the ProSe group, it enables reliable direct communication for critical services. This integrity protection is a prerequisite for many ProSe applications, especially those involving sensitive information or command-and-control functions in public safety and critical communications.
Purpose & Motivation
The PIK was introduced to address the specific security requirements of direct device-to-device (D2D) communication standardized as ProSe in 3GPP Release 13. Traditional cellular security relies on a permanent network infrastructure (e.g., base stations, core network) to manage keys and provide security services. ProSe, however, allows UEs to communicate directly over the PC5 interface, potentially without network coverage. This paradigm shift created a need for a security mechanism that could operate independently of the network while maintaining robust protection.
Previous approaches for ad-hoc communication lacked standardized, cellular-grade security integrated with operator credentials. The purpose of the PIK is to provide a standardized, cryptographically strong method for ensuring message integrity in these direct links. It solves the problems of message tampering and impersonation attacks in D2D scenarios. Without PIK, ProSe communications would be vulnerable to malicious actors injecting false data or masquerading as legitimate users, which is unacceptable for public safety applications like direct communication between first responders during network outages.
Its creation was motivated by the drive to enable commercial and mission-critical proximity-based services on LTE and later 5G NR platforms. The PIK, as part of the broader ProSe security framework, allows operators to offer secure D2D services with confidence, knowing that the integrity of the communication is protected by keys rooted in the operator's security infrastructure, even when the devices are operating in a standalone direct mode.
Key Features
- Provides integrity protection and data origin authentication for PC5 user plane data.
- Derived from the ProSe key hierarchy, ensuring a cryptographically secure link to operator credentials.
- Enables secure direct communication between UEs independent of network coverage.
- Utilized in both one-to-one and one-to-many ProSe communication modes.
- Has a defined lifetime and is subject to renewal via re-keying procedures.
- Specified within the 3GPP security architecture (TS 33.303) for standardization and interoperability.
Evolution Across Releases
Introduced as part of the initial Proximity Services (ProSe) security framework. Defined the PIK for integrity protection of direct communication over the PC5 interface in LTE-based ProSe. Established its derivation from the ProSe Key (PK) and its application for Message Authentication Code (MAC) generation on user plane data.
Defining Specifications
| Specification | Title |
|---|---|
| TS 33.303 | 3GPP TR 33.303 |