| 6.0 | Mapping of solutions to key issues p. 18
|
| 6.1 | Solution #1: Ambient IoT device disabling mechanism p. 19
|
| 6.2 | Solution #2:PCF based Service Authorization and Provisioning to UE p. 20
|
| 6.3 | Solution #3: Authorization of Intermediate UE for AIoT services p. 21
|
| 6.4 | Solution #4: Protection for inventory and command procedure p. 23
| 6.4.1 | Introduction p. 23
|
| 6.4.2 | Solution details p. 23
| 6.4.2.1 | Protection for inventory-only procedure p. 23
|
| 6.4.2.2 | Protection for inventory and command procedure p. 24
|
| 6.4.2.3 | Auth_token and XAuth_token derivation function p. 25
|
|
| 6.4.3 | Evaluation p. 25
|
|
| 6.5 | Solution #5: Disabling and Enabling AIoT Device p. 25
|
| 6.6 | Solution #6: AIoT device authentication p. 27
|
| 6.7 | Solution #7: Lightweight AIoT Authentication solution p. 29
|
| 6.8 | Solution #8: Mutual authentication for AIoT system p. 32
|
| 6.9 | Solution #9: Device authentication and data communication security p. 34
| 6.9.1 | Introduction p. 34
|
| 6.9.2 | Solution details p. 34
|
| 6.9.3 | Evaluation p. 36
|
| 6.10.1 | Introduction p. 37
|
| 6.10.2 | Solution details p. 37
| 6.10.2.1 | UE reader case p. 37
| 6.10.2.1.1 | Alternative 1 - UE reader granularity p. 37
|
| 6.10.2.1.2 | Alternative 2 - AIoT device granularity p. 39
|
|
| 6.10.2.2 | RAN reader case p. 40
|
| 6.10.2.3 | Example of usage of authentication method and protocol p. 42
|
|
| 6.10.3 | Evaluation p. 42
|
|
| 6.11 | Solution #11: Authentication and ID Privacy of AIoT devices with USIM on AIoT AS Layer p. 43
|
| 6.12 | Solution #12: Authentication and ID Privacy of AIoT devices with USIM on AIoT Layer p. 45
|
| 6.13 | Solution #13: Authentication and ID privacy of AIoT devices without USIM p. 48
|
| 6.14 | Solution #14: Information protection during AIoT service communication p. 60
| 6.14.1 | Introduction p. 60
|
| 6.14.2 | Solution details p. 61
| 6.14.2.1 | Inventory Service information protection p. 61
|
| 6.14.2.2 | Command Service information protection p. 61
|
|
| 6.14.3 | Evaluation p. 62
|
|
| 6.15 | Solution #15: End-to-end security protection of command procedure p. 63
|
| 6.16 | Solution #16: Disabling operation procedure for Ambient IoT services p. 65
|
| 6.17 | Solution #17: Disabling operation procedure for AIoT services p. 66
| 6.17.1 | Introduction p. 66
|
| 6.17.2 | Solution details p. 66
| 6.17.2.1 | Disable an AIoT device temporarily or permanently p. 66
|
| 6.17.2.2 | Enable a temporarily disabled AIoT device p. 68
|
|
| 6.17.3 | Evaluation p. 69
|
|
| 6.18 | Solution #18: Authorization procedure for AF-based intermediate node selection p. 69
|
| 6.19 | Solution #19: Authorization of AIoT capable UE in topology 2 p. 70
|
| 6.20 | Solution #20: Lightweight AIOT ID privacy based on hashes p. 73
|
| 6.21 | Solution #21: Ephemeral AIOT ID security context based on puzzles for privacy p. 76
|
| 6.22 | Solution #22: Solution for protecting AIoT ID by using temporary ID p. 79
|
| 6.23 | Solution #23: AIoT device ID privacy protection using anonymity key p. 81
|
| 6.24 | Solution #24: temporary ID based AIoT device privacy protection p. 83
|
| 6.25 | Solution #25: Use temporary identifier to protect the privacy of AIoT device identifiers. p. 84
|
| 6.26 | Solution #26: Local generated Temporary ID to provide device privacy p. 86
|
| 6.27 | Solution #27: Privacy protection of AIoT device identifier based on a temporary identifier p. 89
|
| 6.28 | Solution #28: Privacy protection on AIoT device IDs p. 91
|
| 6.29 | Solution #29: Providing a network-computed AIoT concealed device identifier (AICI) to an AIoT device p. 93
|
| 6.30 | Solution #30: Privacy protection for inventory operation p. 95
| 6.30.1 | Introduction p. 95
|
| 6.30.2 | Solution details p. 95
| 6.30.2.1 | Inventory procedure with unprotected inventory request parameters p. 95
|
| 6.30.2.2 | Inventory procedure with protected inventory request parameters p. 96
|
|
| 6.30.3 | Evaluation p. 97
|
|
| 6.31 | Solution #31: Ambient IoT ID privacy p. 98
|
| 6.32 | Solution #32: Authentication Using L1 Parameter p. 99
|
| 6.33 | Solution #33: L1 Security Key Generation p. 101
|
| 6.34 | Solution #34: PHY key based protecting AIoT device identifiers p. 103
|
| 6.35 | Solution #35: Configurable device/network authentication, data confidentiality, integrity and id privacy protection p. 105
|
| 6.36 | Void p. …
|
| 6.37 | Solution #37: Mutual Authentication Using AEAD for Inventory and Command case p. 107
|
| 6.38 | Solution #38: Authentication and privacy of AIoT device p. 109
|
| 6.39 | Solution #39: reuse of existing authentication frameworks p. 111
|
| 6.40 | Solution #40: Communication security for reading all information from AIoT device p. 112
|
| 6.41 | Solution #41: Disabling protection for AIoT device p. 113
| 6.41.1 | Introduction p. 113
|
| 6.41.2 | Solution details p. 113
| 6.41.2.1 | Disable an AIoT device permanently or temporarily p. 113
|
| 6.41.2.2 | Enable a temporarily disabled AIoT device p. 115
|
|
|
| 6.42 | Solution #42: Combined authentication and data protection for Ambient IoT services p. 116
|
| 6.43 | Solution #43: Authentication between AIoT Device and 5GC p. 119
|
| 6.45 | Solution #45: Temp ID based privacy protection for Ambient IoT device identifier p. 124
|
| 6.46 | Solution #46: AIoT command message security protection procedure p. 127
|
| 6.47 | Solution #47: A key provisioning for network layer security p. 129
|
| 6.48 | Solution #48: temporary ID based AIoT device privacy protection p. 131
|