Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.759
Word version: 19.0.0
1…
5…
5
Key issues
6
Solutions
7
Conclusions
$
Change history
5
Key issues
p. 8
5.1
Key Issue #1: security enhancements to NEF services in support of multiple USSs
p. 8
5.1.1
Key issue details
p. 8
5.1.2
Threats
p. 8
5.1.3
Potential security requirements
p. 8
6
Solutions
p. 9
6.0
Mapping of solutions to key issues
p. 9
6.1
Solution #1: UAV Authentication and Authorization for Multiple USS
p. 9
6.1.1
Introduction
p. 9
6.1.2
Solution details
p. 9
6.1.3
Evaluation
p. 10
6.2
Solution # 2: UUAA supporting multiple USS
p. 10
6.2.1
Introduction
p. 10
6.2.2
Solution details
p. 10
6.2.3
Evaluation
p. 11
6.3
Solution # 3: Pairing authorization supporting multiple USS
p. 11
6.3.1
Introduction
p. 11
6.3.2
Solution details
p. 11
6.3.3
Evaluation
p. 12
6.4
Solution # 4: revocation supporting multiple USS
p. 12
6.4.1
Introduction
p. 12
6.4.2
Solution details
p. 12
6.4.3
Evaluation
p. 12
6.5
Solution #5: UUAA and authorization of target USS for the multiple USS case
p. 13
6.5.1
Introduction
p. 13
6.5.2
Solution details
p. 13
6.5.2.1
Identification of USS-level changeover need
p. 13
6.5.2.2
Enhancement for UUAA
p. 13
6.5.2.3
Enhancement for authorization of target USS to use exposure services for the UAV
p. 13
6.5.3
Evaluation
p. 14
6.6
Solution #6: UUAA and authorization of target USS using token for the multiple USS case
p. 14
6.6.1
Introduction
p. 14
6.6.2
Solution details
p. 14
6.6.2.1
Identification of USS-level changeover need
p. 14
6.6.2.2
Enhancement for UUAA
p. 14
6.6.2.3
Enhancement for authorization of target USS to use exposure services for the UAV
p. 14
6.6.3
Evaluation
p. 15
6.7
Solution #7: UUAA for USS changeover
p. 15
6.7.1
Introduction
p. 15
6.7.2
Solution details
p. 15
6.7.3
Evaluation
p. 16
6.8
Solution #8: UAV triggered UUAA for USS changeover
p. 16
6.8.1
Introduction
p. 16
6.8.2
Solution details
p. 16
6.8.3
Evaluation
p. 16
6.9
Solution #9: Serving USS triggered UUAA for target USS
p. 16
6.9.1
Introduction
p. 16
6.9.2
Solution details
p. 16
6.9.3
Evaluation
p. 17
7
Conclusions
p. 17
7.1
Conclusion on KI #1
p. 17
$
Change history
p. 18