Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.220
Word version: 18.3.0
1…
4…
4.4…
4.5…
5…
B…
D…
I…
J…
M…
N…
J
Usage of USS with local policy enforcement in BSF
J.1
General
J.2
Usage scenarios
K
Interoperator GBA-usage examples
K.1
Example on interoperator GBA setup
K.2
Example on interoperator GBA operation
L
Information on how security threats related to known GSM vulnerabilities are addressed by the 2G GBA solution
L.1
Impersonation of the UE to the BSF during the run of the Ub protocol
L.2
Impersonation of the BSF to the UE during the run of the Ub protocol
L.3
Finding the GBA key Ks during or after the Ub protocol run
L.4
Bidding down attack
...
J
Usage of USS with local policy enforcement in BSF
|R7|
p. 68
J.1
General
p. 68
J.2
Usage scenarios
p. 68
J.2.1
Scenario 1: NAF does not use USSs, BSF does not have local policy for NAF
p. 69
J.2.2
Scenario 2: NAF does not use USSs, BSF does have local policy for NAF
p. 69
J.2.3
Scenario 3: NAF does use USSs, BSF does not have local policy for NAF
p. 69
J.2.4
Scenario 4: NAF does use USSs, BSF does have local policy for NAF
p. 70
K
Interoperator GBA-usage examples
|R7|
p. 71
K.1
Example on interoperator GBA setup
p. 71
K.2
Example on interoperator GBA operation
p. 73
L
Information on how security threats related to known GSM vulnerabilities are addressed by the 2G GBA solution
|R7|
p. 76
L.1
Impersonation of the UE to the BSF during the run of the Ub protocol
p. 76
L.2
Impersonation of the BSF to the UE during the run of the Ub protocol
p. 76
L.3
Finding the GBA key Ks during or after the Ub protocol run
p. 77
L.4
Bidding down attack
p. 77