This solution addresses the key issue #1.
This solution assumes each UAV or UAVC is provisioned with a PLMN UE ID (SUPI) and the corresponding credential so that it can be authenticated (primary authentication) by the PLMN as a normal UE. In addition, UAV or UAVC is provisioned with a UAS ID and corresponding credentials to perform UAS authentication and authorization (UAA) with USS/UTM.
The UAA is mandatory for UAA or UAVC and is based on EAP framework, where AMF is taking the role of the transparent Authenticator.
This solution addresses the key issue #1 (the fourth requirement for the fake USS/UTM has not been addressed).
In this solution, each UAV is assumed to be provisioned with UE ID (i.e. SUPI by PLMN) as well as UAS ID (by USS/UTM), together with corresponding credentials for authentication. The UAS authentication and authorization (UAA) with USS/UTM is performed after UAV is authenticated with the network (using UE ID).
This solution supports multiple UAA methods to meet potential different authentication requirements from USS/UTM. EAP framework can be used to carry the UAA messages.
This solution supports revocation triggered by USS/UTM at any time.