Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+
Top   in Index   Prev   Next

TR 33.807 (SA3)
Study on the Security
of the Wireless and Wireline Convergence
for the 5G System Architecture

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V16.0.1 (Wzip)2019/09  31 p.

Rapporteur:  Mr. Li, He

To support Wireless and Wireline Convergence for the 5G system, two new network entities, 5G-RG and FN-RG, are introduced in the architecture. 5G-RG acts as a 5G UE in order to access 5GC reusing security procedure defined in TS 33.501. The scenario of UE behind 5G-RG accesses to the 5GC is also captured in the present document. The security of FN-RG accessing to 5GC is studied in the present document. The scenario of UE behind FN-RG accesses to the 5GC is also captured in the present document. For trusted non-3GPP access, the unified authentication framework is reused. Any potential security enhancements in addition to the security procedures defined in TS 33.501 are captured in the present document.

full Table of Contents for  TR 33.807  Word version:   16.0.0

 

Here   Top

 

1  ScopeWord-p. 7
2  References
3  Definitions and abbreviationsWord-p. 8
4  Security aspects of the 5WWC features in the 5G System
5  Key issues
5.1  Key Issue #1: security of 5G-RG
5.2  Key Issue #2: FN-RG authentication and authorization
5.3  Key Issue #3: Transport security for the interfaces between W-5GAN and 5GC
5.4  Key Issue #4: Security for the interface between 5G-RG and W-5GANWord-p. 10
5.5  Key Issue #5: Registration and NAS transport for trusted non-3GPP access
5.6  Key Issue #6: Access to 5GC from WLAN UEs that do not support NAS
5.7  Key Issue #7: Authentication of 5G capable UE behind a RG
5.8  Key Issue #8: User plane data handling for 5G capable UE behind a RG
5.9  Key Issue #9: User plane security for 5G-RG or FN-RG to 5GCUp
5.10  Key Issue #10: NAS termination in Trusted WLAN Interworking Function (TWIF)
5.11  Key Issue #11: NAS termination for FN-RG
5.12  Key Issue #12: Protection of Line Id
5.13  Key Issue 13: Mobility between TNAPs within the Trusted Non-3GPP Access Network (TNAN)Word-p. 14
5.14  Key Issue #14: Mobility between TNGFs within the Trusted Non-3GPP Access Network (TNAN)
5.15  Key Issue #15: N3GPP Key Separation
5.16  Key Issue #16: Missing SUCI-to-SUPI mapping for the FN-RG
6  SolutionsUp
6.1  Solution #1: Solution for trusted non-3GPP access
6.2  Solution #2: 5GC-capable UEs behind 5G-RG/FN-RG using N3GPP-access solutionsWord-p. 20
6.3  Solution #3: 5G-RG connecting to 5GC via W-5GANWord-p. 21
6.4  Solution #4: FN-RG registration to 5GCWord-p. 22
6.5  Solution #5: 5G-RG connecting to 5GC via NG-RAN (FWA)Up
6.6  Solution #6: Solution for 5GC access from WLAN UEs that do not support NAS
6.7  Solution #7: Key separation for untrusted and trusted accessWord-p. 27
6.8  Solution #8: Transport security for the interfaces between W-5GAN and 5GC
6.9  Solution #9: Solution on Line ID protectionUp
7  Conclusions
A  Change history

Up   Top