Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.882
Study on Personal IoT Networks Security aspects

3GPP‑Page  
V18.0.1 (Wzip)  2023/06  26 p.
Rapporteur:
Mr. Xie, Zhenhua
vivo Mobile Communication Co.,

full Table of Contents for  TR 33.882  Word version:  18.0.1

Here   Top

 

1  Scopep. 7

The present document studies how 5G security architecture and procedures can be enhanced to support Personal IoT Network. The aim of the present document is to study the security aspects of Personal IoT Networks for any potential enhancements in alignment with the outcome of SA2 study in TR 23.700-88. The study will look at the following aspects, performing gap analysis where necessary:
  1. Study potential security enhancements for authentications required to secure Personal IoT Networks.
  2. Study the security protection and access control for communications required to secure Personal IoT Networks.
  3. Study the security enhancements for privacy required to secure Personal IoT Networks.
  4. Other security aspects for any potential enhancements in alignment with the outcome of SA2 study in TR 23.700-88.
Up

2  Referencesp. 7

3  Definitions of terms and abbreviationsp. 7

4  Assumptionsp. 8

5  Key issuesp. 8

6  Proposed solutionsp. 9

6.1  Mapping of solutions to key issuesp. 9

6.2  Solution #1: PINE authentication and authorizationp. 10

6.3  Solution #2: PINE authentication by AAA over 5G CPp. 11

6.4  Solution #3: Authentication for PIN elements involving SMFp. 12

6.5  Solution #4: PEGC/PEMC and PINE Authentication and Authorizationp. 14

6.6  Solution #5: EAP-based PINE authenticationp. 17

6.7  Solution #6: Authorization on AF manipulating PINp. 18

6.8  Solution #7: Authentication and Authorization of PINE Elementsp. 19

6.9  Solution #8: AF authorization in PIN scenariosp. 20

6.10  Solution #9: PIN AF authorization for accessing the UDRp. 21

6.11  Solution #10: Local Authentication and Authorization of PINEp. 21

6.12  Solution #11: UDM based AF authorization mechanism for PIN scenariosp. 24

7  Conclusionsp. 25

$  Change historyp. 26


Up   Top