Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.738
Study on Security aspects of Enablers for
Network Automation for the 5G System
Phase 3

3GPP‑Page  
V18.1.0 (Wzip)  2023/09  68 p.
Rapporteur:
Mr. Liu, Chang
China Mobile Com. Corporation

full Table of Contents for  TR 33.738  Word version:  18.1.0

Here   Top

 

1  Scopep. 8

The present document studies the security aspects of enablers for network automation for the 5G system based on the outcome of TR 23.700-81. More specifically, the present document will identify security issues and requirements and provide corresponding security solutions related to the following scenarios:
  • Security aspects of potential architecture enhancement: roaming, supporting federated learning, interaction between NWDAF and MDAS/MDAF, etc.
  • Handling of sensitive information inherent to application detection, roaming and location information.
  • KIs from R17 which do not have enough time to proceed, e.g. NWDAF detection related issues.
  • Any further security enhancements which need to be studied based upon the ongoing SA2 eNA Phase 3 work
Up

2  Referencesp. 8

3  Definitions of terms, symbols and abbreviationsp. 8

3.1  Termsp. 8

3.2  Symbolsp. 9

3.3  Abbreviationsp. 9

4  Overviewp. 9

5  Key issuesp. 9

6  Solutionsp. 13

6.0  Mapping Solutions to Key Issuesp. 14

6.1  Solution #1: Authorization of AI/ML model retrievingp. 14

6.2  Solution #2: Authorization and Authentication of ML model transferp. 15

6.3  Solution #3: AI/ML model authorization and retrievalp. 17

6.4  Solution #4: AI/ML model storage and sharing securityp. 20

6.5Void

6.6  Solution #6: Anomalous NF behaviour detection by NWDAFp. 23

6.7  Solution #7: Secured and authorized AI/ML model transfer and retrievalp. 29

6.8  Solution #8: Protection of data and analytics exchange in roaming casep. 32

6.9  Solution #9: Anomalous NF behaviour event related data collection and anomalous NF detectionp. 34

6.10  Solution #10: Authorization of AI/ML model sharing between different vendors and usage of one-time URLsp. 37

6.11  Solution #11: Secured and authorized AI/ML model sharing between different vendorsp. 40

6.12  Solution #12: Secured and authorized AI/ML model sharing between different vendorsp. 43

6.13  Solution #13: Support authorization of AI/ML model sharing By NWDAF containing MTLFp. 45

6.14  Solution #14: Protection of data and analytics exchange in roaming case using Secure Multi-party Computationp. 48

6.15  Solution #15: Authorization of selection of participant NWDAF instances in the FL groupp. 50

6.16  Solution #16: FL GROUP AUTHORIZATION OF NWDAF(S) IN 5GCp. 51

6.17  Solution #17: Authorization of FL Server and FL Client in FL groupp. 54

6.18  Solution #18: Solution for authorization in FLp. 56

6.19  Solution #19: Access control for user plane datap. 58

6.20  Solution #20: Cyber attack detection using an analytics functionp. 60

6.21  Solution #21: Authorization of data and analytics exchange in roaming casep. 63

7  Conclusionsp. 65

$  Change historyp. 68


Up   Top