Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.844
Word version: 11.0.0
1…
4…
4
System Architecture
5
Security threats
6
Security Requirements
7
Security Solutions
8
Conclusions
$
Change history
4
System Architecture
p. 5
4.1
Alternative Architecture 1
p. 5
4.2
Alternative Architecture 2
p. 6
4.3
Alternative Architecture 3
p. 6
4.4
Alternative Architecture 4
p. 7
4.5
Alternative Architecture 5
p. 7
4.6
Security Architecture
p. 8
5
Security threats
p. 9
5.1
User Identity Privacy
p. 9
5.2
Eavesdropping
p. 9
5.3
Adversarial content announcement
p. 9
5.4
Content Tampering and Replacement (Trojan Horse)
p. 9
6
Security Requirements
p. 9
6.1
Security requirement for User Identity Privacy
p. 9
6.2
Security requirement for eavesdropping
p. 9
6.3
Security requirement for adversarial content announcement
p. 10
6.4
Security requirement for Content Tampering and Replacement (Trojan Horse)
p. 10
7
Security Solutions
p. 10
7.1
Security protection to prevent eavesdropping
p. 10
7.2
Security solution against adversarial content announcement
p. 12
7.3
Security protection on user identity privacy
p. 12
7.4
Security protection against content tampering and replacement
p. 13
8
Conclusions
p. 15
$
Change history
p. 16