Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.739  Word version:  18.1.0

Top   Top   Up   Prev   None
1…   5…

 

5  Key issuesp. 12

5.1  Generalp. 12

5.2  Key issues related with 5G System Enhancements for Edge Computingp. 12

5.3  Key issues related with enhanced architecture for enabling Edge Applicationsp. 13

6  Proposed solutionsp. 17

6.0  Mapping of Solutions to Key Issuesp. 17

6.1  Solution #1: Authentication and authorization between EEC hosted in the roaming UE and ECSp. 18

6.2  Solution #2: Authentication and authorization between EEC hosted in the roaming UE and EESp. 20

6.3  Solution #3: Authentication mechanism selection between EEC and ECSp. 22

6.4  Solution #4: Authentication mechanism selection between EEC and EESp. 24

6.5  Solution #5: 5GC-based authentication mechanism selection between EEC and ECS/EESp. 25

6.6  Solution #6: ECS/EES authentication method information provisioningp. 27

6.7  Solution #7: Negotiation procedure for the Authentication and Authorizationp. 28

6.8  Solution #8: Authentication mechanisms selected by ECS/EESp. 29

6.9  Solution #9: Authentication mechanism selection procedure between EEC and ECSp. 29

6.10  Solution #10: Authentication mechanism selection procedure between EEC and EESp. 30

6.11  Solution #11: Authentication mechanism selection procedure among EEC, ECS, and EESp. 31

6.12  Solution #12: Authorization for PDU session supporting local traffic routing to access an EHE in the VPLMNp. 33

6.13  Solution #13: A solution for authentication of EEC/UE and GPSI verification by EES/ECSp. 33

6.14  Solution #14: A solution for authentication of UE and GPSI verification by EES/ECSp. 35

6.15  Solution #15: Authentication algorithm selection procedure between EEC and ECSp. 36

6.16  Solution #16: Authentication algorithm selection procedure between EEC and EESp. 38

6.17  Solution #17: Using existing AKMA/GBA negotiation mechanismp. 40

6.18  Solution #18: Authentication and Authorization between V-ECS and H-ECSp. 42

6.19  Solution #19: Authorization of V-ECS in roaming scenariop. 42

6.20  Solution #20: Transport security for the EDGE10 interfacep. 43

6.21  Solution #21: Using local policy on authorization between EESesp. 44

6.23  Solution #23: EAS discovery procedure protectionp. 45

6.24  Solution #24: Public key signature based ECS/EES authenticationp. 46

6.25  Solution #25: Utilizing Token-Based Solutions for EEC authenticationp. 46

6.26  Solution #26: Using authorization token on authorization between EESesp. 47

6.27  Solution #27: Token-based solution for authorization between EESesp. 52

6.28  Solution #28: Usage of randomly generated ticket to verify EEC provided IP addressp. 53

6.29  Solution #29: Authorizing the Service Consumer when Resolving an IP Address to a UE IDp. 55

6.30  Solution #30: Usage of existing public IP address to verify EEC provided IP addressp. 58

6.31  Solution #31: AKMA/GBA based verification of EEC provided IP addressp. 60

6.32  Solution #32: KDF based verification of EEC provided IP addressp. 61

6.33  Solution #33: Verification of EEC provided IP addressp. 62

6.34  Solution #34: Verification of EEC provided IP address using access tokenp. 63

7  Conclusionsp. 64

$  Change historyp. 66


Up   Top