2009/12 99 p.
ThiS TR identifies special security threats of H(e)NB and study the countermeasures to these threats.
The study should include, but not be limited to, threat analysis of H(e)NB, mutual authentication and security protection between H(e)NB and rest of network, maintenance of the security context between H(e)NB and rest of network, security requirements on the H(e)NB, provisioning of security credentials on the H(e)NB, security solution for verifying the location of the H(e)NB etc.
With regard to security protection between the H(e)NB and the rest of the network, bandwidth efficiency should be
taken into consideration.
full Table of Contents for TR 33.820 Word version: 8.3.0