Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.819  Word version:  16.1.0

Top   Top   Up   Prev   None
0…   5…

 

5  Key issuesp. 10

5.1  Key Issues related to security for SNPNsp. 10

5.2  Key Issues related to Security aspects on interworking between NPN and PLMNp. 10

5.3  Key Issues related to Security for 5G LAN servicesp. 13

5.4  Key Issues related to Security for TSC and 5GS interactionp. 14

5.5  Key Issues related to authentication on NPNsp. 15

5.6  Key Issues related to security for PNiNPNsp. 17

6  Solutionsp. 19

6.1  Solution #1: Solution for NPN network access via PLMNp. 19

6.2  Solution #2: Security solution for handling UP security policy for a 5GLAN Groupp. 21

6.3  Solution #3: Security solution for mitigation of (D)DoS attack in PNiNPNsp. 22

6.4  Solution #4: Security solution for key derivation in SNPNsp. 24

6.5  Solution #5: Key hierarchy for authentication using non-AKA EAP methods in NPNp. 25

6.6  Solution #6: 5GLAN authenticationp. 25

6.7  Solution #7: SMF handling the UP security policy for a 5GLAN Group based on information from DN AAAp. 26

6.8  Solution #8: TSC securityp. 27

6.9  Solution #9: (D)DoS attack mitigation in PNiNPNsp. 27

6.10  Solution #10: Using NAS security for messages that modify the CAG listp. 28

6.11  Solution #11: DH based solution for CAG ID privacyp. 29

6.12  Solution #12: Hash based solution for CAG ID privacyp. 31

6.13  Solution #13: CAG ID Privacy in PNiNPNs by embedding CAG ID in the SUCIp. 34

6.14  Solution #14: CAG ID privacy by re-use of SUPI protection mechanismp. 36

6.15  Solution #15: CAG ID privacy by indication in RRC layer and providing CAG ID only after NAS security establishmentp. 38

6.16  Solution #16: CAG ID privacy by sending CAG ID only in protected NAS signallingp. 39

6.17  Solution #17: Protection on TSC time synchronisation within UP security policyp. 40

6.18  Solution #18: CAG ID privacy considering RAN optimizationp. 40

6.19  Solution #19: Privacy protected CAG ID Privacy in PNiNPNsp. 41

7  Conclusionsp. 43

A  Deployment options for authentication in SNPNs considering different types of NPN credentialsp. 44

$  Change historyp. 46


Up   Top