Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.807
Study on the Security
of the Wireless and Wireline Convergence
for the 5G System Architecture

V16.0.1 (Wzip)  2019/09  33 p.
Rapporteur:
Mr. Li, He
HUAWEI TECHNOLOGIES Co. Ltd.

full Table of Contents for  TR 33.807  Word version:  16.0.1

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 8
2References  p. 8
3Definitions of terms, symbols and abbreviations  p. 8
3.1Terms  p. 8
3.2Symbols  p. 9
3.3Abbreviations  p. 9
4Security aspects of the 5WWC features in the 5G System  p. 9
4.1General  p. 9
5Key issues  p. 9
5.1Key Issue #1: security of 5G-RG  p. 9
5.1.1Key issue details  p. 9
5.1.2Security threats  p. 9
5.1.3Potential Security requirements  p. 9
5.2Key Issue #2: FN-RG authentication and authorization  p. 10
5.2.1Key issue details  p. 10
5.2.2Security threats  p. 10
5.2.3Potential security requirements  p. 10
5.3Key Issue #3: Transport security for the interfaces between W-5GAN and 5GC  p. 10
5.3.1Key issue details  p. 10
5.3.2Security threats  p. 10
5.3.3Potential security requirements  p. 10
5.4Key Issue #4: Security for the interface between 5G-RG and W-5GAN  p. 11
5.4.1Key issue details  p. 11
5.4.2Security threats  p. 11
5.4.3Potential security requirements  p. 11
5.5Key Issue #5: Registration and NAS transport for trusted non-3GPP access  p. 11
5.5.1Key Issue Details  p. 11
5.5.2Security threats  p. 11
5.5.3Potential security requirements  p. 11
5.6Key Issue #6: Access to 5GC from WLAN UEs that do not support NAS  p. 11
5.6.1Key Issue Description  p. 11
5.6.2Security threats  p. 12
5.6.3Potential security requirements  p. 12
5.7Key Issue #7: Authentication of 5G capable UE behind a RG  p. 12
5.7.1Key Issue details  p. 12
5.7.2Security Threats  p. 12
5.7.3Potential security requirements  p. 12
5.8Key Issue #8: User plane data handling for 5G capable UE behind a RG  p. 12
5.8.1Key issue details  p. 12
5.8.2Security Threats  p. 12
5.8.3Potential security requirements  p. 13
5.9Key Issue #9: User plane security for 5G-RG or FN-RG to 5GC  p. 13
5.9.1Issue details  p. 13
5.9.2Security Threats  p. 13
5.9.3Potential security requirements  p. 13
5.10Key Issue #10: NAS termination in Trusted WLAN Interworking Function (TWIF)  p. 13
5.10.1Key issue details  p. 13
5.10.2Security threats  p. 14
5.10.3Potential Security requirements  p. 14
5.11Key Issue #11: NAS termination for FN-RG  p. 14
5.11.1Key issue details  p. 14
5.11.2Security threats  p. 14
5.11.3Potential Security requirements  p. 14
5.12Key Issue #12: Protection of Line Id  p. 14
5.12.1Key Issue details  p. 14
5.12.2Security Threats  p. 15
5.12.3Potential security requirements  p. 15
5.13Key Issue 13: Mobility between TNAPs within the Trusted Non-3GPP Access Network (TNAN)  p. 15
5.13.1Key issue details  p. 15
5.13.2Security threats  p. 15
5.13.3Potential Architecture requirements  p. 15
5.14Key Issue #14: Mobility between TNGFs within the Trusted Non-3GPP Access Network (TNAN)  p. 15
5.14.1Key issue details  p. 15
5.14.2Security threats  p. 16
5.14.3Potential security requirements  p. 16
5.15Key Issue #15: N3GPP Key Separation  p. 16
5.15.1Key issue details  p. 16
5.15.2Security threats  p. 17
5.15.3Potential security requirements  p. 17
5.16Key Issue #16: Missing SUCI-to-SUPI mapping for the FN-RG  p. 17
5.16.1Key issue details  p. 17
5.16.2Security threats  p. 17
5.16.3Potential architectural requirements  p. 17
6Solutions  p. 17
6.1Solution #1: Solution for trusted non-3GPP access  p. 17
6.1.1Definitions  p. 17
6.1.2Abbreviations  p. 17
6.1.3Introduction  p. 18
6.1.4Solution details  p. 18
6.1.5Evaluation  p. 20
6.2Solution #2: 5GC-capable UEs behind 5G-RG/FN-RG using N3GPP-access solutions  p. 21
6.2.1Introduction  p. 21
6.2.2Solution details  p. 21
6.2.3Evaluation  p. 21
6.2.3.1Key issue #7  p. 21
6.2.3.2Key issue #8  p. 21
6.3Solution #3: 5G-RG connecting to 5GC via W-5GAN  p. 22
6.3.1Introduction  p. 22
6.3.2Solution details  p. 22
6.3.3Evaluation  p. 22
6.4Solution #4: FN-RG registration to 5GC  p. 23
6.4.1Introduction  p. 23
6.4.2Solution details  p. 23
6.4.3Evaluation  p. 24
6.5Solution #5: 5G-RG connecting to 5GC via NG-RAN (FWA)  p. 24
6.5.1Introduction  p. 24
6.5.2Solution details  p. 24
6.5.3Evaluation  p. 25
6.6Solution #6: Solution for 5GC access from WLAN UEs that do not support NAS  p. 25
6.6.1Introduction  p. 25
6.6.2Solution details  p. 25
6.6.2.1Definitions  p. 25
6.6.2.2Initial Registration & PDU Session Establishment  p. 25
6.6.3Evaluation  p. 27
6.7Solution #7: Key separation for untrusted and trusted access  p. 28
6.7.1Introduction  p. 28
6.7.2Solution details  p. 28
6.7.2.0General  p. 28
6.7.2.1Keys for trusted access  p. 28
6.7.3Evaluation  p. 29
6.8Solution #8: Transport security for the interfaces between W-5GAN and 5GC  p. 29
6.8.1Introduction  p. 29
6.8.2Solution details  p. 29
6.8.3Evaluation  p. 30
6.9Solution #9: Solution on Line ID protection  p. 30
6.9.1Introduction  p. 30
6.9.2Solution details  p. 30
6.9.3Evaluation  p. 30
7Conclusions  p. 30
7.1Conclusion on KI #1  p. 30
7.2Conclusion on KI #2  p. 30
7.3Conclusion on KI #3  p. 31
7.4Conclusion on KI #4  p. 31
7.5Conclusion on KI #5  p. 31
7.6Conclusion on KI #6  p. 31
7.7Conclusion on KI #7  p. 31
7.8Conclusion on KI #10  p. 31
7.9Conclusion on KI #11  p. 31
7.10Conclusion on KI #12  p. 32
7.11Conclusion on KI #14  p. 32
7.12Conclusion on KI#15  p. 32
7.13Conclusion on KI #16  p. 32
$Change History  p. 33

Up   Top