tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search



Here        Top        Up        Prev        Next
part:    1     2     3     4     5     6



5.2   Security area #2: Authentication
5.2.1   Introduction
5.2.2   Security assumptions   Word-p. 175
5.2.3   Key issues   Word-p. 176   Key Issue #2.1 Authentication framework   Key Issue #2.2: Reducing the impact of secret key leakage   Word-p. 179   Key issue #2.3: Authentication identifiers and credentials   Word-p. 180   Key issue #2.4: Equipment identifier authentication   Key issue #2.5: Non-AKA-based authentication   Word-p. 185   Key Issue #2.6: Efficient in energy consuming and reduced signalling for resource constraint environment   Key Issue #2.7: Reduced signalling overload for massive number of UEs activating at the same time   Key Issue #2.8: Authentication of the user   Key issue #2.9: Security for service provider connection   Word-p. 188   Key issue #2.10: Secondary authentication for network slice access by 3rd party service   Word-p. 190   Key issue #2.11: Increasing home control in roaming situations
5.2.3.y   Key issue #2.y: <key issue name>   Word-p. 192
5.2.4   Solutions   Solution #2.1: Updating the long term secret key, in such a way that the new key is less exposed to potential attack than the original one was   Solution #2.2: Including a key exchange protocol into the derivation of the radio interface session keys   Word-p. 194   Solution #2.3: Device reporting on local user authentication   Word-p. 195   Solution #2.4: Authenticating a new user for a device using a known device   Word-p. 196   Solution #2.5: Timed attach for UEs   Solution #2.6: Binding a serving network public key into the derivation of the radio interface session keys   Solution #2.7: Authentication framework   Word-p. 200   Solution #2.8: Authentication Framework based on EAP   Word-p. 206   Solution #2.9: EAP authentication framework   Solution #2.10: Equipment Identifier Authentication using the Device Certificate   Word-p. 222   Solution #2.11: Blocking the UE which repeats authentication in a short period   Word-p. 226   Solution #2.12: Mutual Authentication and Security Agreement   Word-p. 228   Introduction   Solution Details   MASA support 4G USIM   Word-p. 235   MASA NG-UE Security Capabilities Negotiation   Word-p. 239   MASA Handling Out of Sequence Scenario   Word-p. 242   Solution Evaluation   Solution #2.13: AKA-based authentication for service provider connectivity   Word-p. 250      Up   Solution #2.14: Solution for non-AKA Authentication   Word-p. 252   Solution #2.15: Aggregate Authentication for massive IoT   Solution #2.16: Mutual Authentication between Remote UE and Network over A Relay based on ID-based Credentials   Solution #2.17: Equipment identifier Authentication using the device certificate and IMEI binding      Up   Solution #2.18: Equipment identifier Authentication using the device public key and IMEI binding   Solution #2.19: Alternative EAP architecture for 3GPP access   Solution #2.20: -   Word-p. 268   Solution #2.21: Linking update location with authentication confirmation   Solution #2.22: EPS AKA with UE authentication confirmation   Solution #2.23: Equipment Identifier Authentication using Identity-based Authentication   Word-p. 272   Solution #2.24: Combining solutions 2.2 and 10.2   Solution #2.25: Authentication Procedure for un-trusted non-3GPP access      Up   Solution #2.26: EAP based secondary authentication by an external DN-AAA server   Solution #2.27: EAP-based solution for secondary authentication, authorization and UP protection   Solution # 2.28: secondary authentication and authorization using SM NAS signalling   Word-p. 279   Solution #2.29: Equipment identifier authentication using EAP   Solution #2.30: EAP based secondary authentication by an external DN-AAA server
5.2.4.z   Solution #2.z: <solution name>
5.2.5   Conclusions

Up        Top        ToC