Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.535
Authentication and Key Management for Applications (AKMA)
based on 3GPP credentials in the 5G System (5GS)

V18.7.0 (PDF)2025/03  41 p.
V17.11.0  2024/03  28 p.
V16.2.0  2020/12  22 p.
Rapporteur:
Miss Huang, Xiaoting
China Mobile Com. Corporation

essential Table of Contents for  TS 33.535  Word version:  18.4.0

each title, in the "available" or "not available yet" area, links to the equivalent title in the CONTENT
Here   Top

Up   Top

List of Figures and Tables

Figure 4.1-1Fundamental Network Model for AKMA
Figure 4.1-2AKMA Architecture in reference point representation for (a) internal AFs of HPLMN and (b) external AFs
Figure 4.7.1-1Environment and reference points of AP when AP is internal
Figure 4.7.1-2Environment and reference points of AP when AP is external
Figure 4.7.3-1Environment and reference points of AP for TLS tunnels when AP is internal
Figure 4.7.3-2Environment and reference points of AP for TLS tunnels when AP is external
Figure 5.1-1AKMA Key Hierarchy
Figure 6.1-1Deriving KAKMA after primary authentication
Figure 6.2-1KAF generation from KAKMA
Figure 6.3-1AKMA Application Key request via NEF
Figure 6.5-1Initiation of AKMA
Figure 6.6.1-1AAnF AKMA context removal procedure
Figure 6.8.1-1AAnF notification to AF about AKMA service disable
Table 7.1.1-1List of AAnF Services
Table 7.3.1-1List of NEF Services
Figure D.3.4-1OSCORE key refresh

Top