Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TR 33.813
Study on security aspects of network slicing enhancement
3GPP‑Page
ETSI‑search
fToC
↓
Partial Content
→
V16.0.0 (Wzip)
2020/06 36 p.
Rapporteur:
Mr. Nair, Suresh
Nokia Germany
full Table of Contents for
TR 33.813
Word version: 16.0.0
each clause number in
'red'
refers to the equivalent title in the Partial Content
1
Scope
p. 8
2
References
p. 8
3
Definitions of terms, symbols and abbreviations
p. 9
3.1
Terms
p. 9
3.2
Symbols
p. 9
3.3
Abbreviations
p. 9
4
Void
p. …
5
Void
p. …
6
Key Issues
p. 9
6.1
Introduction
p. 9
6.2
Key Issue #1 Authentication for access to specific Network Slices
p. 9
6.2.1
Key issue detail
p. 9
6.2.2
Security threats
p. 10
6.2.3
Potential security requirements
p. 10
6.3
Key Issue #2: AMF Key separation
p. 10
6.3.1
Key issue details
p. 10
6.3.2
Security threats
p. 11
6.3.3
Potential security requirements
p. 11
6.4
Key Issue #3: Security features for NSaaS
p. 11
6.4.1
Key issue details
p. 11
6.4.2
Security threats or disadvantages
p. 11
6.4.3
Potential Security requirements
p. 11
6.5
Key Issue #4: Security and privacy aspects related to the solution for Network Slice specific access authentication and authorization
p. 11
6.5.1
Description
p. 11
6.5.2
Security threats
p. 12
6.5.3
Potential security requirements
p. 12
6.6
Key issue #5: Access token handling between Network Slices
p. 12
6.6.1
Key issue detail
p. 12
6.6.2
Security threats
p. 13
6.6.3
Potential security requirements
p. 13
6.7
Key Issue #6: Confidentiality protection of NSSAI and home control
p. 13
6.7.1
Key issue details
p. 13
6.7.2
Security and privacy threats
p. 13
6.7.3
Potential Security requirements
p. 13
6.8
Key Issue #7 Cancellation of rejected S-NSSAIs
p. 13
6.8.1
Key issue detail
p. 13
6.8.2
Security threats
p. 14
6.8.3
Potential security requirements
p. 14
7
Solutions
p. 14
7.1
Solution #1 Slice Specific Authentication and Authorization
p. 14
7.1.1
Introduction
p. 14
7.1.2
Solution details
p. 16
7.1.3
Evaluation
p. 17
7.2
Solution #2 Slice Authentication
p. 17
7.2.1
Introduction
p. 17
7.2.2
Solution details
p. 17
7.2.3
Evaluation
p. 19
7.3
Solution #3 Security features for NSaaS
p. 19
7.3.1
Introduction
p. 19
7.3.2
Solution details
p. 19
7.3.3
Evaluation
p. 19
7.4
Solution #4 Solution for Slice Specific Authentication and Authorization with multiple registrations in the same PLMN
p. 19
7.5
Solution #5 Privacy for Slice Authentication
p. 21
7.5.1
Introduction
p. 21
7.5.2
Solution details
p. 22
7.5.3
Evaluation
p. 23
7.6
Solution #6 Slice Authentication with user ID privacy but network aware
p. 23
7.6.1
Introduction
p. 23
7.6.2
Solution details
p. 23
7.6.3
Evaluation
p. 24
7.7
Solution #7: Solution to protect user ID
p. 25
7.7.1
Introduction
p. 25
7.8
Solution #8 Protecting NSSAI for transmission on the AS layer
p. 25
7.8.1
Introduction
p. 25
7.8.2
Solution details
p. 25
7.8.3
Evaluation
p. 27
7.9
Solution #9: Slice specific authorization
p. 27
7.9.1
Introduction
p. 27
7.9.2
Solution details
p. 28
7.9.3
Evaluation
p. 28
7.12
Solution #12 Privacy protection of NSSAI
p. 32
8
Conclusions
p. 34
8.1
Key issue-solution mapping
p. 34
8.2
General conclusions
p. 35
8.2.1
Conclusions for key issues
p. 35
9
Recommendations
p. 35
$
Change History
p. 36