Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.402
Word version: 18.1.0
1…
4…
9…
9
Security for IP based mobility signalling
10
Security interworking between 3GPP access networks and non-3GPP access networks
11
Network Domain Security
12
UE-ANDSF communication security
13
Security aspects of emergency call handling
14
Temporary identity management
A
Key derivation functions
B
Tunnelling of UE Services over restrictive access networks
C
List of 3GPP-vendor specific EAP-methods
D
Security Aspects of DNS and ICMP
D.1
General
$
Change History
9
Security for IP based mobility signalling
p. 42
9.1
General
p. 42
9.2
Host based Mobility
p. 42
9.2.1
MIPv4
p. 42
9.2.1.1
General
p. 42
9.2.1.2
Bootstrapping of MIPv4 FACoA parameters
p. 42
9.2.1.2.1
Procedures
p. 42
9.2.1.2.2
MIPv4 Key Derivation
p. 43
9.2.1.2.3
Key Usage
p. 45
9.2.1.2.4
Key Distribution for MIPv4
p. 45
9.2.2
DS-MIPv6
p. 45
9.2.2.1
General
p. 45
9.2.2.2
Bootstrapping of DSMIPv6 parameters
p. 46
9.2.2.2.1
Full Authentication and authorization
p. 46
9.2.2.2.2
Fast re-authentication and authorization
p. 48
9.2.2.3
Security Profiles
p. 50
9.2.2.4
Enhanced Security Support
|R10|
p. 50
9.3
Network based Mobility
p. 50
9.3.1
Proxy Mobile IP
p. 50
9.3.1.1
Introduction
p. 50
9.3.1.2
PMIP security requirements
p. 51
9.3.1.3
PMIP security mechanisms
p. 51
10
Security interworking between 3GPP access networks and non-3GPP access networks
p. 52
10.1
General
p. 52
10.2
CDMA2000 Access Network
p. 52
10.2.1
Idle Mode Mobility
p. 52
10.2.1.1
E-UTRAN to HRPD Interworking
p. 52
10.2.1.2
HRPD to E-UTRAN Interworking
p. 52
10.2.2
Active mode mobility
p. 52
10.2.2.1
E-UTRAN to HRPD Interworking
p. 52
10.2.2.2
HRPD to E-UTRAN Interworking
p. 52
11
Network Domain Security
p. 53
12
UE-ANDSF communication security
p. 53
12.1
UE-ANDSF communication security requirements
p. 53
12.2
UE-ANDSF communication security solution
p. 53
13
Security aspects of emergency call handling
|R9|
p. 54
13.1
General
p. 54
13.2
Requirements for emergency call handling
p. 54
13.3
Unauthenticated emergency calls over untrusted WLAN
|R14|
p. 55
13.4
Unauthenticated emergency calls over trusted WLAN
|R14|
p. 57
14
Temporary identity management
|R13|
p. 61
14.1
Temporary identity generation
p. 61
14.2
Key management
p. 62
14.3
Impact on permanent user identities
p. 63
14.4
Acknowledged limitations
p. 63
14.5
UE behaviour on receiving requests to send the IMSI-based user identity
p. 63
A
(Normative) Key derivation functions
p. 65
A.1
KDF interface and input parameter construction
p. 65
A.2
Function for the derivation of CK', IK' from CK, IK
p. 65
A.3
Function for the derivation of WLCP key from EMSK
|R12|
p. 65
A.4
Function for the derivation of MSK key for unauthenticated emergency sessions over WLAN
|R14|
p. 66
B
(Normative) Tunnelling of UE Services over restrictive access networks
|R12|
p. 67
B.1
Overview
p. 67
B.2
Service and media reachability for users over restrictive firewalls - untrusted non 3GPP access
p. 67
C
List of 3GPP-vendor specific EAP-methods
|R14|
p. 69
D
Security Aspects of DNS and ICMP
|R18|
p. 70
D.1
General
p. 70
$
Change History
p. 71