Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.813
Word version: 16.0.0
1…
6…
6
Key Issues
7
Solutions
8
Conclusions
9
Recommendations
$
Change History
6
Key Issues
p. 9
6.1
Introduction
p. 9
6.2
Key Issue #1 Authentication for access to specific Network Slices
p. 9
6.2.1
Key issue detail
p. 9
6.2.2
Security threats
p. 10
6.2.3
Potential security requirements
p. 10
6.3
Key Issue #2: AMF Key separation
p. 10
6.3.1
Key issue details
p. 10
6.3.2
Security threats
p. 11
6.3.3
Potential security requirements
p. 11
6.4
Key Issue #3: Security features for NSaaS
p. 11
6.4.1
Key issue details
p. 11
6.4.2
Security threats or disadvantages
p. 11
6.4.3
Potential Security requirements
p. 11
6.5
Key Issue #4: Security and privacy aspects related to the solution for Network Slice specific access authentication and authorization
p. 11
6.5.1
Description
p. 11
6.5.2
Security threats
p. 12
6.5.3
Potential security requirements
p. 12
6.6
Key issue #5: Access token handling between Network Slices
p. 12
6.6.1
Key issue detail
p. 12
6.6.2
Security threats
p. 13
6.6.3
Potential security requirements
p. 13
6.7
Key Issue #6: Confidentiality protection of NSSAI and home control
p. 13
6.7.1
Key issue details
p. 13
6.7.2
Security and privacy threats
p. 13
6.7.3
Potential Security requirements
p. 13
6.8
Key Issue #7 Cancellation of rejected S-NSSAIs
p. 13
6.8.1
Key issue detail
p. 13
6.8.2
Security threats
p. 14
6.8.3
Potential security requirements
p. 14
7
Solutions
p. 14
7.1
Solution #1 Slice Specific Authentication and Authorization
p. 14
7.1.1
Introduction
p. 14
7.1.2
Solution details
p. 16
7.1.3
Evaluation
p. 17
7.2
Solution #2 Slice Authentication
p. 17
7.2.1
Introduction
p. 17
7.2.2
Solution details
p. 17
7.2.3
Evaluation
p. 19
7.3
Solution #3 Security features for NSaaS
p. 19
7.3.1
Introduction
p. 19
7.3.2
Solution details
p. 19
7.3.3
Evaluation
p. 19
7.4
Solution #4 Solution for Slice Specific Authentication and Authorization with multiple registrations in the same PLMN
p. 19
7.5
Solution #5 Privacy for Slice Authentication
p. 21
7.5.1
Introduction
p. 21
7.5.2
Solution details
p. 22
7.5.3
Evaluation
p. 23
7.6
Solution #6 Slice Authentication with user ID privacy but network aware
p. 23
7.6.1
Introduction
p. 23
7.6.2
Solution details
p. 23
7.6.3
Evaluation
p. 24
7.7
Solution #7: Solution to protect user ID
p. 25
7.7.1
Introduction
p. 25
7.8
Solution #8 Protecting NSSAI for transmission on the AS layer
p. 25
7.8.1
Introduction
p. 25
7.8.2
Solution details
p. 25
7.8.3
Evaluation
p. 27
7.9
Solution #9: Slice specific authorization
p. 27
7.9.1
Introduction
p. 27
7.9.2
Solution details
p. 28
7.9.3
Evaluation
p. 28
7.12
Solution #12 Privacy protection of NSSAI
p. 32
8
Conclusions
p. 34
8.1
Key issue-solution mapping
p. 34
8.2
General conclusions
p. 35
8.2.1
Conclusions for key issues
p. 35
9
Recommendations
p. 35
$
Change History
p. 36