Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.745  Word version:  19.0.0

Top   Top   Up   Prev   None
1…   5…

 

5  Key issuesp. 9

5.1  Key Issue #1: Security of 5G NR Femto Ownershipp. 9

5.2  Key issue #2: Authentication aspect of 5G NR Femto connecting to the operator network.p. 10

5.3  Key Issue #3: Support of 5G Femto location securityp. 10

5.4  Key Issue #4: UE access controlp. 11

5.5  Key Issue #5: Protection of backhaul link between 5G NR Femto and 5GCp. 11

5.6  Key Issue #6: Hosting Party authenticationp. 12

5.7  Key Issue #7: Direct link between 5G NR Femtosp. 12

5.8  Key Issue #8: 5G NR Femto management system accessible on the public internetp. 13

5.9  Key issue #9: 5GS Core network topology hiding from 5G NR Femto deploymentsp. 13

6  Solutionsp. 14

6.0  Mapping of solutions to key issuesp. 14

6.1  Solution #1: Reusing existing mechanism for Ownership Securityp. 14

6.2  Solution #2: IKEv2 EAP-AKA-based authenticationp. 14

6.3  Solution #3: Solution to secure backhaul of 5G NR Femtop. 16

6.4  Solution #4: UE access control using CAG verificationp. 17

6.5  Solution #5: Security of 5G NR Femto Ownershipp. 20

6.6  Solution #6: Multi-factor authentication based femto owner/manager authenticationp. 21

6.7  Solution #7: Support of 5G NR Femto location securityp. 23

6.8  Solution #8: Security solution for backhaul link between 5G NR Femto and 5GCp. 25

6.9  Solution #9: Hosting party authentication using EAP-AKA'p. 26

6.10  Solution #10: Verify and authorise direct connections between 5G NR Femtosp. 27

6.11  Solution #11: Security solution for backhaul link between 5G NR Femto and 5G NRFemto MSp. 29

6.12  Solution #12: Reusing existing location verification security featuresp. 29

6.13  Solution #13: Security solution for UE CAG verificationp. 30

6.14  Solution #14: security between 5G NR Femtosp. 30

6.15  Solution #15: Verify the 5G NR Femto location with Security Gatewayp. 30

7  Conclusionsp. 32

$  Change historyp. 35


Up   Top