tech-invite   World Map
3GPP     Specs     Glossaries     UICC       T+       IETF     RFCs     Groups     SIP     ABNFs       Search     Home
 


 

Here        Top        Up        Prev        Next
part:    1     2     3

 

 

7   Control Plane Security
7.1   MAC, RLC and RRC layer security
7.2   SAE/LTE AKA
7.3   Security set-up procedure
7.4   Key handling   Word-p. 51
7.4.1   UMTS AKA      Up
7.4.2   Serving Network Authentication for LTE
7.4.3   Key derivation   Word-p. 55
7.4.4   Key management aspects for LTE/UMTS interworking
7.4.5   Void
7.4.6   Key identities in LTE/SAE   Word-p. 57      Up
7.4.7   Hierarchy of user-related keys in SAE/LTE   Word-p. 59
7.4.8   Use of AMF for SAE binding   Word-p. 66
7.4.9   Key handling on active to idle and idle to active transitions in SAE   Word-p. 68
7.4.10   Key handling on mobility within an SAE/LTE network and between two different SAE/LTE networks   Word-p. 69
7.4.11   K_eNB refresh at state transitions
7.4.12   Key handling on idle mode mobility   Word-p. 70
7.4.13   Key handling on active mode mobility   Word-p. 75
7.4.14   Security algorithm negotiation and Security mode command in SAE/LTE networks   Word-p. 88      Up
7.4.15   Key-change-on-the-fly   Word-p. 97
7.4.16   Independence of keys at different eNodeBs   Word-p. 99
7.5   START value transfer
7.6   Security algorithms
7.6.1   Choice of algorithms
7.6.2   Terminal support   Word-p. 101
7.6.3   Network support
7.6.4   Algorithm input
7.6.5   Algorithm IDs in EPS   Word-p. 105
7.6.6   KDF negotiation   Word-p. 106
7.7   Rationale for approach to security handling in inter-RAT mobility procedures      Up
7.8   Track of decision

Up        Top        ToC