Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.745
Study on Security aspects of 5G Next Radio (NR) Femto

V19.1.0 (Wzip)  2025/03  35 p.
Rapporteur:
Miss Liu, Peilin
ZTE Corporation

full Table of Contents for  TR 33.745  Word version:  19.1.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 8
2References  p. 8
3Definitions of terms, symbols and abbreviations  p. 8
3.1Terms  p. 8
3.2Symbols  p. 9
3.3Abbreviations  p. 9
4Security Architecture and Assumptions  p. 9
5Key issues  p. 9
5.1Key Issue #1: Security of 5G NR Femto Ownership  p. 9
5.1.1Key issue details  p. 9
5.1.2Security threats  p. 10
5.1.3Potential security requirements  p. 10
5.2Key issue #2: Authentication aspect of 5G NR Femto connecting to the operator network.  p. 10
5.2.1Key issue details  p. 10
5.2.2Security Threats  p. 10
5.2.3Potential security requirements  p. 10
5.3Key Issue #3: Support of 5G Femto location security  p. 10
5.3.1Key issue details  p. 10
5.3.2Security threats  p. 11
5.3.3Potential security requirements  p. 11
5.4Key Issue #4: UE access control  p. 11
5.4.1Key issue details  p. 11
5.4.2Security threats  p. 11
5.4.3Potential security requirements  p. 11
5.5Key Issue #5: Protection of backhaul link between 5G NR Femto and 5GC  p. 11
5.5.1Key issue details  p. 11
5.5.2Security threats  p. 11
5.5.3Potential security requirements  p. 12
5.6Key Issue #6: Hosting Party authentication  p. 12
5.6.1Key issue details  p. 12
5.6.2Security threats  p. 12
5.6.3Potential security requirements  p. 12
5.7Key Issue #7: Direct link between 5G NR Femtos  p. 12
5.7.1Key issue details  p. 12
5.7.2Security threats  p. 12
5.7.3Potential security requirements  p. 12
5.8Key Issue #8: 5G NR Femto management system accessible on the public internet  p. 13
5.8.1Key issue details  p. 13
5.8.2Security threats  p. 13
5.8.3Potential security requirements  p. 13
5.9Key issue #9: 5GS Core network topology hiding from 5G NR Femto deployments  p. 13
5.9.1Key issue details  p. 13
5.9.2Threats  p. 13
5.9.3Potential security requirements  p. 13
6Solutions  p. 14
6.0Mapping of solutions to key issues  p. 14
6.1Solution #1: Reusing existing mechanism for Ownership Security  p. 14
6.1.1Introduction  p. 14
6.1.2Solution details  p. 14
6.1.3Evaluation  p. 14
6.2Solution #2: IKEv2 EAP-AKA-based authentication  p. 14
6.2.1Introduction  p. 14
6.2.2Solution details  p. 15
6.2.3Evaluation  p. 16
6.3Solution #3: Solution to secure backhaul of 5G NR Femto  p. 16
6.3.1Introduction  p. 16
6.3.2Solution details  p. 16
6.3.3Evaluation  p. 17
6.4Solution #4: UE access control using CAG verification  p. 17
6.4.1Introduction  p. 17
6.4.2Solution details  p. 17
6.4.3Solution Evaluation  p. 19
6.5Solution #5: Security of 5G NR Femto Ownership  p. 20
6.5.1Solution details  p. 20
6.5.2Solution Evaluation  p. 21
6.6Solution #6: Multi-factor authentication based femto owner/manager authentication  p. 21
6.6.1Solution details  p. 21
6.6.2Solution Evaluation  p. 23
6.7Solution #7: Support of 5G NR Femto location security  p. 23
6.7.1Solution details  p. 23
6.7.2Solution Evaluation  p. 25
6.8Solution #8: Security solution for backhaul link between 5G NR Femto and 5GC  p. 25
6.8.1Introduction  p. 25
6.8.2Solution details  p. 25
6.8.3Evaluation  p. 26
6.9Solution #9: Hosting party authentication using EAP-AKA'  p. 26
6.9.1Introduction  p. 26
6.9.2Solution details  p. 26
6.9.3Evaluation  p. 27
6.10Solution #10: Verify and authorise direct connections between 5G NR Femtos  p. 27
6.10.1Introduction  p. 27
6.10.2Solution details  p. 28
6.10.3Evaluation  p. 29
6.11Solution #11: Security solution for backhaul link between 5G NR Femto and 5G NRFemto MS  p. 29
6.11.1Introduction  p. 29
6.11.2Solution details  p. 29
6.11.3Evaluation  p. 29
6.12Solution #12: Reusing existing location verification security features  p. 29
6.12.1Introduction  p. 29
6.12.2Solution details  p. 29
6.12.3Evaluation  p. 29
6.13Solution #13: Security solution for UE CAG verification  p. 30
6.13.1Introduction  p. 30
6.13.2Solution details  p. 30
6.13.3Evaluation  p. 30
6.14Solution #14: security between 5G NR Femtos  p. 30
6.14.1Introduction  p. 30
6.14.2Solution details  p. 30
6.14.3Evaluation  p. 30
6.15Solution #15: Verify the 5G NR Femto location with Security Gateway  p. 30
6.15.1Introduction  p. 30
6.15.2Solution details  p. 30
6.15.3Evaluation  p. 31
7Conclusions  p. 32
7.1Conclusions to Key Issue #1: Security of 5G NR Femto Ownership  p. 32
7.2Conclusions to Key Issue #2: Authentication aspect of 5G NR Femto connecting to the operator network  p. 32
7.3Conclusions to Key Issue #3: Support of 5G Femto location security  p. 32
7.4Conclusions to Key Issue #4: UE access control  p. 33
7.5Conclusions to Key Issue #5: Protection of backhaul link between 5G NR Femto and 5GC  p. 33
7.6Conclusions to Key Issue #6: Hosting Party authentication  p. 33
7.7Conclusions to Key Issue #7: Direct link between 5G NR Femtos  p. 33
7.8Conclusions to Key Issue #8: 5G NR Femto management system accessible on the public internet  p. 33
7.9Conclusions to Key Issue #9: 5GS Core network topology hiding from 5G NR Femto deployments  p. 34
$Change history  p. 35

Up   Top