Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.863  Word version:  14.2.0

Top   Top   Up   Prev   None
1…   4…

 

4  Background and key objectivesp. 12

5  Key issuesp. 16

6  Candidate solutionsp. 18

6.0  Generalp. 18

6.1  Solution #1: "UE to HPLMN" security solutions based on UMTS/EPS AKA enhancements.p. 18

6.2  Solution #2: "End-to-middle security based on AKA"p. 26

6.3  Solution #3: "Independent VPLMN and e2m security associations"p. 28

6.4  Solution #4: "Security policies"p. 29

6.5  Solution #5: "End-to-end security solution"p. 31

6.6  Solution #6: Bearer protectionp. 32

6.7  Solution #X: "End-to-end" for solutions 1 and 2p. 33

6.8  Solution #8: Complete end to middle solutionp. 34

6.9  Solution #9: Complete end to end solutionp. 51

6.10  Solution #10: "AKA-based session key generation for application protocols"p. 64

6.11  Solution #11: A method for IoT service layer security bootstrapping solutionp. 71

6.12  Solution #12: A method for IoT service layer security bootstrapping solutionp. 76

7  Conclusionsp. 82

A  AKA procedures assessment in very low data throughput environmentp. 87

B  Review of security standardization efforts in other SDOsp. 105

C  Proposed normative changesp. 107

$  Change Historyp. 109


Up   Top