Figure 4.1-1 | Fundamental Network Model for AKMA |
Figure 4.1-2 | AKMA Architecture in reference point representation for (a) internal AFs of HPLMN and (b) external AFs |
Figure 4.7.1-1 | Environment and reference points of AP when AP is internal |
Figure 4.7.1-2 | Environment and reference points of AP when AP is external |
Figure 4.7.3-1 | Environment and reference points of AP for TLS tunnels when AP is internal |
Figure 4.7.3-2 | Environment and reference points of AP for TLS tunnels when AP is external |
Figure 5.1-1 | AKMA Key Hierarchy |
Figure 6.1-1 | Deriving KAKMA after primary authentication |
Figure 6.2-1 | KAF generation from KAKMA |
Figure 6.3-1 | AKMA Application Key request via NEF |
Figure 6.5-1 | Initiation of AKMA |
Figure 6.6.1-1 | AAnF AKMA context removal procedure |
Figure 6.8.1-1 | AAnF notification to AF about AKMA service disable |
Table 7.1.1-1 | List of AAnF Services |
Table 7.3.1-1 | List of NEF Services |
Figure D.3.4-1 | OSCORE key refresh |