Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.807
Word version: 16.0.1
1…
5…
5
Key issues
6
Solutions
7
Conclusions
$
Change History
5
Key issues
p. 9
5.1
Key Issue #1: security of 5G-RG
p. 9
5.1.1
Key issue details
p. 9
5.1.2
Security threats
p. 9
5.1.3
Potential Security requirements
p. 9
5.2
Key Issue #2: FN-RG authentication and authorization
p. 10
5.2.1
Key issue details
p. 10
5.2.2
Security threats
p. 10
5.2.3
Potential security requirements
p. 10
5.3
Key Issue #3: Transport security for the interfaces between W-5GAN and 5GC
p. 10
5.3.1
Key issue details
p. 10
5.3.2
Security threats
p. 10
5.3.3
Potential security requirements
p. 10
5.4
Key Issue #4: Security for the interface between 5G-RG and W-5GAN
p. 11
5.4.1
Key issue details
p. 11
5.4.2
Security threats
p. 11
5.4.3
Potential security requirements
p. 11
5.5
Key Issue #5: Registration and NAS transport for trusted non-3GPP access
p. 11
5.5.1
Key Issue Details
p. 11
5.5.2
Security threats
p. 11
5.5.3
Potential security requirements
p. 11
5.6
Key Issue #6: Access to 5GC from WLAN UEs that do not support NAS
p. 11
5.6.1
Key Issue Description
p. 11
5.6.2
Security threats
p. 12
5.6.3
Potential security requirements
p. 12
5.7
Key Issue #7: Authentication of 5G capable UE behind a RG
p. 12
5.7.1
Key Issue details
p. 12
5.7.2
Security Threats
p. 12
5.7.3
Potential security requirements
p. 12
5.8
Key Issue #8: User plane data handling for 5G capable UE behind a RG
p. 12
5.8.1
Key issue details
p. 12
5.8.2
Security Threats
p. 12
5.8.3
Potential security requirements
p. 13
5.9
Key Issue #9: User plane security for 5G-RG or FN-RG to 5GC
p. 13
5.9.1
Issue details
p. 13
5.9.2
Security Threats
p. 13
5.9.3
Potential security requirements
p. 13
5.10
Key Issue #10: NAS termination in Trusted WLAN Interworking Function (TWIF)
p. 13
5.10.1
Key issue details
p. 13
5.10.2
Security threats
p. 14
5.10.3
Potential Security requirements
p. 14
5.11
Key Issue #11: NAS termination for FN-RG
p. 14
5.11.1
Key issue details
p. 14
5.11.2
Security threats
p. 14
5.11.3
Potential Security requirements
p. 14
5.12
Key Issue #12: Protection of Line Id
p. 14
5.12.1
Key Issue details
p. 14
5.12.2
Security Threats
p. 15
5.12.3
Potential security requirements
p. 15
5.13
Key Issue 13: Mobility between TNAPs within the Trusted Non-3GPP Access Network (TNAN)
p. 15
5.13.1
Key issue details
p. 15
5.13.2
Security threats
p. 15
5.13.3
Potential Architecture requirements
p. 15
5.14
Key Issue #14: Mobility between TNGFs within the Trusted Non-3GPP Access Network (TNAN)
p. 15
5.14.1
Key issue details
p. 15
5.14.2
Security threats
p. 16
5.14.3
Potential security requirements
p. 16
5.15
Key Issue #15: N3GPP Key Separation
p. 16
5.15.1
Key issue details
p. 16
5.15.2
Security threats
p. 17
5.15.3
Potential security requirements
p. 17
5.16
Key Issue #16: Missing SUCI-to-SUPI mapping for the FN-RG
p. 17
5.16.1
Key issue details
p. 17
5.16.2
Security threats
p. 17
5.16.3
Potential architectural requirements
p. 17
6
Solutions
p. 17
6.1
Solution #1: Solution for trusted non-3GPP access
p. 17
6.1.1
Definitions
p. 17
6.1.2
Abbreviations
p. 17
6.1.3
Introduction
p. 18
6.1.4
Solution details
p. 18
6.1.5
Evaluation
p. 20
6.2
Solution #2: 5GC-capable UEs behind 5G-RG/FN-RG using N3GPP-access solutions
p. 21
6.2.1
Introduction
p. 21
6.2.2
Solution details
p. 21
6.2.3
Evaluation
p. 21
6.2.3.1
Key issue #7
p. 21
6.2.3.2
Key issue #8
p. 21
6.3
Solution #3: 5G-RG connecting to 5GC via W-5GAN
p. 22
6.3.1
Introduction
p. 22
6.3.2
Solution details
p. 22
6.3.3
Evaluation
p. 22
6.4
Solution #4: FN-RG registration to 5GC
p. 23
6.4.1
Introduction
p. 23
6.4.2
Solution details
p. 23
6.4.3
Evaluation
p. 24
6.5
Solution #5: 5G-RG connecting to 5GC via NG-RAN (FWA)
p. 24
6.5.1
Introduction
p. 24
6.5.2
Solution details
p. 24
6.5.3
Evaluation
p. 25
6.6
Solution #6: Solution for 5GC access from WLAN UEs that do not support NAS
p. 25
6.6.1
Introduction
p. 25
6.6.2
Solution details
p. 25
6.6.2.1
Definitions
p. 25
6.6.2.2
Initial Registration & PDU Session Establishment
p. 25
6.6.3
Evaluation
p. 27
6.7
Solution #7: Key separation for untrusted and trusted access
p. 28
6.7.1
Introduction
p. 28
6.7.2
Solution details
p. 28
6.7.2.0
General
p. 28
6.7.2.1
Keys for trusted access
p. 28
6.7.3
Evaluation
p. 29
6.8
Solution #8: Transport security for the interfaces between W-5GAN and 5GC
p. 29
6.8.1
Introduction
p. 29
6.8.2
Solution details
p. 29
6.8.3
Evaluation
p. 30
6.9
Solution #9: Solution on Line ID protection
p. 30
6.9.1
Introduction
p. 30
6.9.2
Solution details
p. 30
6.9.3
Evaluation
p. 30
7
Conclusions
p. 30
7.1
Conclusion on KI #1
p. 30
7.2
Conclusion on KI #2
p. 30
7.3
Conclusion on KI #3
p. 31
7.4
Conclusion on KI #4
p. 31
7.5
Conclusion on KI #5
p. 31
7.6
Conclusion on KI #6
p. 31
7.7
Conclusion on KI #7
p. 31
7.8
Conclusion on KI #10
p. 31
7.9
Conclusion on KI #11
p. 31
7.10
Conclusion on KI #12
p. 32
7.11
Conclusion on KI #14
p. 32
7.12
Conclusion on KI#15
p. 32
7.13
Conclusion on KI #16
p. 32
$
Change History
p. 33