tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

 


 

Here        Top        Up        Prev        Next
part:    1     2     3     4     5     6

 

 

5.2   Security area #2: Authentication
5.2.1   Introduction
5.2.2   Security assumptions   Word-p. 175
5.2.3   Key issues   Word-p. 176
5.2.3.1   Key Issue #2.1 Authentication framework
5.2.3.2   Key Issue #2.2: Reducing the impact of secret key leakage   Word-p. 179
5.2.3.3   Key issue #2.3: Authentication identifiers and credentials   Word-p. 180
5.2.3.4   Key issue #2.4: Equipment identifier authentication
5.2.3.5   Key issue #2.5: Non-AKA-based authentication   Word-p. 185
5.2.3.6   Key Issue #2.6: Efficient in energy consuming and reduced signalling for resource constraint environment
5.2.3.7   Key Issue #2.7: Reduced signalling overload for massive number of UEs activating at the same time
5.2.3.8   Key Issue #2.8: Authentication of the user
5.2.3.9   Key issue #2.9: Security for service provider connection   Word-p. 188
5.2.3.10   Key issue #2.10: Secondary authentication for network slice access by 3rd party service   Word-p. 190
5.2.3.11   Key issue #2.11: Increasing home control in roaming situations
5.2.3.y   Key issue #2.y: <key issue name>   Word-p. 192
5.2.4   Solutions
5.2.4.1   Solution #2.1: Updating the long term secret key, in such a way that the new key is less exposed to potential attack than the original one was
5.2.4.2   Solution #2.2: Including a key exchange protocol into the derivation of the radio interface session keys   Word-p. 194
5.2.4.3   Solution #2.3: Device reporting on local user authentication   Word-p. 195
5.2.4.4   Solution #2.4: Authenticating a new user for a device using a known device   Word-p. 196
5.2.4.5   Solution #2.5: Timed attach for UEs
5.2.4.6   Solution #2.6: Binding a serving network public key into the derivation of the radio interface session keys
5.2.4.7   Solution #2.7: Authentication framework   Word-p. 200
5.2.4.8   Solution #2.8: Authentication Framework based on EAP   Word-p. 206
5.2.4.9   Solution #2.9: EAP authentication framework
5.2.4.10   Solution #2.10: Equipment Identifier Authentication using the Device Certificate   Word-p. 222
5.2.4.11   Solution #2.11: Blocking the UE which repeats authentication in a short period   Word-p. 226
5.2.4.12   Solution #2.12: Mutual Authentication and Security Agreement   Word-p. 228
5.2.4.12.1   Introduction
5.2.4.12.2   Solution Details
5.2.4.12.3   MASA support 4G USIM   Word-p. 235
5.2.4.12.4   MASA NG-UE Security Capabilities Negotiation   Word-p. 239
5.2.4.12.5   MASA Handling Out of Sequence Scenario   Word-p. 242
5.2.4.12.6   Solution Evaluation
5.2.4.13   Solution #2.13: AKA-based authentication for service provider connectivity   Word-p. 250      Up
5.2.4.14   Solution #2.14: Solution for non-AKA Authentication   Word-p. 252
5.2.4.15   Solution #2.15: Aggregate Authentication for massive IoT
5.2.4.16   Solution #2.16: Mutual Authentication between Remote UE and Network over A Relay based on ID-based Credentials
5.2.4.17   Solution #2.17: Equipment identifier Authentication using the device certificate and IMEI binding      Up
5.2.4.18   Solution #2.18: Equipment identifier Authentication using the device public key and IMEI binding
5.2.4.19   Solution #2.19: Alternative EAP architecture for 3GPP access
5.2.4.20   Solution #2.20: -   Word-p. 268
5.2.4.21   Solution #2.21: Linking update location with authentication confirmation
5.2.4.22   Solution #2.22: EPS AKA with UE authentication confirmation
5.2.4.23   Solution #2.23: Equipment Identifier Authentication using Identity-based Authentication   Word-p. 272
5.2.4.24   Solution #2.24: Combining solutions 2.2 and 10.2
5.2.4.25   Solution #2.25: Authentication Procedure for un-trusted non-3GPP access      Up
5.2.4.26   Solution #2.26: EAP based secondary authentication by an external DN-AAA server
5.2.4.27   Solution #2.27: EAP-based solution for secondary authentication, authorization and UP protection
5.2.4.28   Solution # 2.28: secondary authentication and authorization using SM NAS signalling   Word-p. 279
5.2.4.29   Solution #2.29: Equipment identifier authentication using EAP
5.2.4.30   Solution #2.30: EAP based secondary authentication by an external DN-AAA server
5.2.4.z   Solution #2.z: <solution name>
5.2.5   Conclusions

Up        Top        ToC