tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search



Here          Top          Up          Prev          Next
part:    1     2     3     4     5     6



5.2   Security area #2: Authentication   Word-p. 140
5.2.1   Introduction
5.2.2   Security assumptions   Word-p. 143
5.2.3   Key issues   Word-p. 144   Key Issue #2.1 Authentication framework      Up   Key Issue #2.2: Reducing the impact of secret key leakage   Word-p. 146   Key issue #2.3: Authentication identifiers and credentials   Key issue #2.4: Equipment identifier authentication   Key issue #2.5: Non-AKA-based authentication   Key Issue #2.6: Efficient in energy consuming and reduced signalling for resource constraint environment      Up   Key Issue #2.7: Reduced signalling overload for massive number of UEs activating at the same time   Key Issue #2.8: Authentication of the user   Key issue #2.9: Security for service provider connection   Key issue #2.10: Secondary authentication for network slice access by 3rd party service   Word-p. 157   Key issue #2.11: Increasing home control in roaming situations      Up
5.2.3.y   Key issue #2.y: <key issue name>   Word-p. 159
5.2.4   Solutions   Solution #2.1: Updating the long term secret key, in such a way that the new key is less exposed to potential attack than the original one was   Solution #2.2: Including a key exchange protocol into the derivation of the radio interface session keys   Solution #2.3: Device reporting on local user authentication   Word-p. 162   Solution #2.4: Authenticating a new user for a device using a known device   Word-p. 163   Solution #2.5: Timed attach for UEs   Solution #2.6: Binding a serving network public key into the derivation of the radio interface session keys      Up   Solution #2.7: Authentication framework   Word-p. 167   Solution #2.8: Authentication Framework based on EAP   Word-p. 173   Solution #2.9: EAP authentication framework      Up   Solution #2.10: Equipment Identifier Authentication using the Device Certificate   Word-p. 189   Solution #2.11: Blocking the UE which repeats authentication in a short period   Word-p. 193   Solution #2.12: Mutual Authentication and Security Agreement   Word-p. 195   Introduction   Solution Details   MASA support 4G USIM   Word-p. 200   MASA NG-UE Security Capabilities Negotiation   Word-p. 204   Solution Evaluation   Word-p. 207      Up   Introduction   Word-p. 214   Solution details   Evalution   Word-p. 216   Solution #2.14: Solution for non-AKA Authentication   Solution #2.15: Aggregate Authentication for massive IoT   Solution #2.16: Mutual Authentication between Remote UE and Network over A Relay based on ID-based Credentials      Up   Solution #2.17: Equipment identifier Authentication using the device certificate and IMEI binding   Solution #2.18: Equipment identifier Authentication using the device public key and IMEI binding   Solution #2.19: Alternative EAP architecture for 3GPP access   Void   Solution #2.21: Linking update location with authentication confirmation   Word-p. 232   Solution #2.22: EPS AKA with UE authentication confirmation   Solution #2.23: Equipment Identifier Authentication using Identity-based Authentication   Word-p. 236   Solution #2.24: Combining solutions 2.2 and 10.2   Solution #2.25: Authentication Procedure for un-trusted non-3GPP access   Solution #2.26: EAP based secondary authentication by an external DN-AAA server   Solution #2.27: EAP-based solution for secondary authentication, authorization and UP protection   Solution # 2.28: secondary authentication and authorization using SM NAS signalling   Word-p. 243   Solution #2.29: Equipment identifier authentication using EAP      Up   Solution #2.30: EAP based secondary authentication by an external DN-AAA server
5.2.4.z   Solution #2.z: <solution name>
5.2.5   Conclusions

Up          Top          ToC