Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TR 33.807
Study on the Security
of the Wireless and Wireline Convergence
for the 5G System Architecture
3GPP‑Page
fToC
↓
Partial Content
→
V16.0.1 (Wzip)
2019/09 33 p.
Rapporteur:
Mr. Li, He
HUAWEI TECHNOLOGIES Co. Ltd.
full Table of Contents for
TR 33.807
Word version: 16.0.1
each clause number in
'red'
refers to the equivalent title in the Partial Content
1
Scope
p. 8
2
References
p. 8
3
Definitions of terms, symbols and abbreviations
p. 8
3.1
Terms
p. 8
3.2
Symbols
p. 9
3.3
Abbreviations
p. 9
4
Security aspects of the 5WWC features in the 5G System
p. 9
4.1
General
p. 9
5
Key issues
p. 9
5.1
Key Issue #1: security of 5G-RG
p. 9
5.1.1
Key issue details
p. 9
5.1.2
Security threats
p. 9
5.1.3
Potential Security requirements
p. 9
5.2
Key Issue #2: FN-RG authentication and authorization
p. 10
5.2.1
Key issue details
p. 10
5.2.2
Security threats
p. 10
5.2.3
Potential security requirements
p. 10
5.3
Key Issue #3: Transport security for the interfaces between W-5GAN and 5GC
p. 10
5.3.1
Key issue details
p. 10
5.3.2
Security threats
p. 10
5.3.3
Potential security requirements
p. 10
5.4
Key Issue #4: Security for the interface between 5G-RG and W-5GAN
p. 11
5.4.1
Key issue details
p. 11
5.4.2
Security threats
p. 11
5.4.3
Potential security requirements
p. 11
5.5
Key Issue #5: Registration and NAS transport for trusted non-3GPP access
p. 11
5.5.1
Key Issue Details
p. 11
5.5.2
Security threats
p. 11
5.5.3
Potential security requirements
p. 11
5.6
Key Issue #6: Access to 5GC from WLAN UEs that do not support NAS
p. 11
5.6.1
Key Issue Description
p. 11
5.6.2
Security threats
p. 12
5.6.3
Potential security requirements
p. 12
5.7
Key Issue #7: Authentication of 5G capable UE behind a RG
p. 12
5.7.1
Key Issue details
p. 12
5.7.2
Security Threats
p. 12
5.7.3
Potential security requirements
p. 12
5.8
Key Issue #8: User plane data handling for 5G capable UE behind a RG
p. 12
5.8.1
Key issue details
p. 12
5.8.2
Security Threats
p. 12
5.8.3
Potential security requirements
p. 13
5.9
Key Issue #9: User plane security for 5G-RG or FN-RG to 5GC
p. 13
5.9.1
Issue details
p. 13
5.9.2
Security Threats
p. 13
5.9.3
Potential security requirements
p. 13
5.10
Key Issue #10: NAS termination in Trusted WLAN Interworking Function (TWIF)
p. 13
5.10.1
Key issue details
p. 13
5.10.2
Security threats
p. 14
5.10.3
Potential Security requirements
p. 14
5.11
Key Issue #11: NAS termination for FN-RG
p. 14
5.11.1
Key issue details
p. 14
5.11.2
Security threats
p. 14
5.11.3
Potential Security requirements
p. 14
5.12
Key Issue #12: Protection of Line Id
p. 14
5.12.1
Key Issue details
p. 14
5.12.2
Security Threats
p. 15
5.12.3
Potential security requirements
p. 15
5.13
Key Issue 13: Mobility between TNAPs within the Trusted Non-3GPP Access Network (TNAN)
p. 15
5.13.1
Key issue details
p. 15
5.13.2
Security threats
p. 15
5.13.3
Potential Architecture requirements
p. 15
5.14
Key Issue #14: Mobility between TNGFs within the Trusted Non-3GPP Access Network (TNAN)
p. 15
5.14.1
Key issue details
p. 15
5.14.2
Security threats
p. 16
5.14.3
Potential security requirements
p. 16
5.15
Key Issue #15: N3GPP Key Separation
p. 16
5.15.1
Key issue details
p. 16
5.15.2
Security threats
p. 17
5.15.3
Potential security requirements
p. 17
5.16
Key Issue #16: Missing SUCI-to-SUPI mapping for the FN-RG
p. 17
5.16.1
Key issue details
p. 17
5.16.2
Security threats
p. 17
5.16.3
Potential architectural requirements
p. 17
6
Solutions
p. 17
6.1
Solution #1: Solution for trusted non-3GPP access
p. 17
6.1.1
Definitions
p. 17
6.1.2
Abbreviations
p. 17
6.1.3
Introduction
p. 18
6.1.4
Solution details
p. 18
6.1.5
Evaluation
p. 20
6.2
Solution #2: 5GC-capable UEs behind 5G-RG/FN-RG using N3GPP-access solutions
p. 21
6.2.1
Introduction
p. 21
6.2.2
Solution details
p. 21
6.2.3
Evaluation
p. 21
6.2.3.1
Key issue #7
p. 21
6.2.3.2
Key issue #8
p. 21
6.3
Solution #3: 5G-RG connecting to 5GC via W-5GAN
p. 22
6.3.1
Introduction
p. 22
6.3.2
Solution details
p. 22
6.3.3
Evaluation
p. 22
6.4
Solution #4: FN-RG registration to 5GC
p. 23
6.4.1
Introduction
p. 23
6.4.2
Solution details
p. 23
6.4.3
Evaluation
p. 24
6.5
Solution #5: 5G-RG connecting to 5GC via NG-RAN (FWA)
p. 24
6.5.1
Introduction
p. 24
6.5.2
Solution details
p. 24
6.5.3
Evaluation
p. 25
6.6
Solution #6: Solution for 5GC access from WLAN UEs that do not support NAS
p. 25
6.6.1
Introduction
p. 25
6.6.2
Solution details
p. 25
6.6.2.1
Definitions
p. 25
6.6.2.2
Initial Registration & PDU Session Establishment
p. 25
6.6.3
Evaluation
p. 27
6.7
Solution #7: Key separation for untrusted and trusted access
p. 28
6.7.1
Introduction
p. 28
6.7.2
Solution details
p. 28
6.7.2.0
General
p. 28
6.7.2.1
Keys for trusted access
p. 28
6.7.3
Evaluation
p. 29
6.8
Solution #8: Transport security for the interfaces between W-5GAN and 5GC
p. 29
6.8.1
Introduction
p. 29
6.8.2
Solution details
p. 29
6.8.3
Evaluation
p. 30
6.9
Solution #9: Solution on Line ID protection
p. 30
6.9.1
Introduction
p. 30
6.9.2
Solution details
p. 30
6.9.3
Evaluation
p. 30
7
Conclusions
p. 30
7.1
Conclusion on KI #1
p. 30
7.2
Conclusion on KI #2
p. 30
7.3
Conclusion on KI #3
p. 31
7.4
Conclusion on KI #4
p. 31
7.5
Conclusion on KI #5
p. 31
7.6
Conclusion on KI #6
p. 31
7.7
Conclusion on KI #7
p. 31
7.8
Conclusion on KI #10
p. 31
7.9
Conclusion on KI #11
p. 31
7.10
Conclusion on KI #12
p. 32
7.11
Conclusion on KI #14
p. 32
7.12
Conclusion on KI#15
p. 32
7.13
Conclusion on KI #16
p. 32
$
Change History
p. 33