Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.402
Word version: 18.1.0
1…
4…
9…
4
Overview of Security Architecture for non-3GPP Accesses to EPS
5
Security Features Provided by EPS for non-3GPP Accesses
6
Authentication and key agreement procedures
7
Establishment of security contexts in the target access system
8
Establishment of security between UE and ePDG
4
Overview of Security Architecture for non-3GPP Accesses to EPS
p. 10
4.1
General
p. 10
4.2
Trusted non-3GPP Access
p. 11
4.3
Untrusted non-3GPP Access
p. 11
5
Security Features Provided by EPS for non-3GPP Accesses
p. 11
5.1
User-to-Network security
p. 11
5.1.1
User identity and device identity confidentiality
p. 11
5.1.2
Entity authentication
p. 11
5.2
User data and signalling data confidentiality
p. 12
5.3
User data and signalling data integrity
p. 12
6
Authentication and key agreement procedures
p. 12
6.1
General
p. 12
6.2
Authentication and key agreement for trusted access
p. 14
6.3
Fast re-authentication procedure for trusted access
p. 19
6.4
Authentication and key agreement for untrusted access
p. 21
6.5
Authentication and authorization with S2b for Private network access from Untrusted non-3GPP Access networks
|R10|
p. 21
6.5.1
General
p. 21
6.5.2
Authentication and authorization for the Private network access (the External AAA Server performs PAP procedure)
p. 22
6.5.3
Authentication and authorization for the private network access (the external AAA server performs CHAP procedure)
p. 24
6.6
Re-authentication based on ERP
|R14|
p. 26
6.6.1
Introduction
p. 26
6.6.2
ERP bootstrapping
p. 26
6.6.2.1
General
p. 26
6.6.2.2
ERP Implicit bootstrapping
p. 26
6.6.2.3
Void
6.6.3
ERP exchange for re-authentication
p. 28
6.6.4
ERP key derivation
p. 28
7
Establishment of security contexts in the target access system
p. 29
7.1
General assumptions
p. 29
7.2
Establishment of security context for trusted non-3GPP access
p. 29
7.2.1
CDMA-2000 HRPD EPS interworking
p. 29
7.2.1.1
EPS-HRPD architecture
p. 29
7.2.1.2
Network elements
p. 30
7.2.1.2.1
E-UTRAN
p. 30
7.2.1.2.2
MME
p. 30
7.2.1.2.3
Gateway
p. 30
7.2.1.2.3.1
General
p. 30
7.2.1.2.3.2
Serving GW
p. 30
7.2.1.2.3.3
PDN GW
p. 31
7.2.1.2.4
PCRF
p. 31
7.2.1.3
Reference points
p. 31
7.2.1.3.1
List of reference points
p. 31
7.2.1.3.2
Protocol assumptions
p. 31
7.2.1.4
Security of the initial access to EPS via HRPD
p. 31
7.2.1.5
Security of handoff and pre-registration
p. 31
7.2.2
WIMAX EPS Interworking
p. 31
7.2.3
Trusted WLAN Access (TWAN)
|R12|
p. 32
7.2.3.1
General
p. 32
7.2.3.2
Security for WLAN Control Protocol (WLCP)
p. 32
7.2.3.2.1
Authentication and key agreement
p. 32
7.2.3.2.2
Fast re-authentication
p. 32
7.2.3.2.3
Protection of WLCP signalling
p. 32
7.2.3.2.4
DTLS profile
p. 33
7.3
Establishment of security context between UE and untrusted non-3GPP Access
p. 33
8
Establishment of security between UE and ePDG
p. 34
8.1
General
p. 34
8.2
Mechanisms for the set up of UE-initiated IPsec tunnels
p. 34
8.2.1
General
p. 34
8.2.2
Tunnel full authentication and authorization
p. 34
8.2.3
Tunnel fast re-authentication and authorization
p. 37
8.2.4
Security profiles
p. 39
8.2.4.1
Profile of IKEv2
|R13|
p. 39
8.2.4.2
Profile of IPSec ESP
|R13|
p. 40
8.2.4.3
Profile for ePDG certificates
|R13|
p. 40
8.2.5
Handling of IPsec tunnels in mobility events
p. 41
8.2.5.1
General
p. 41
8.2.5.2
Idle mode mobility
p. 41
8.2.5.3
Active mode mobility
p. 41