Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.822
Security aspects for inter-Access Mobility
between non-3GPP and 3GPP Access Networks

V8.0.0 (Wzip)  2008/12  30 p.
Rapporteur:
Dr. Zhang, Dajiang
Microsoft Europe SARL

full Table of Contents for  TR 33.822  Word version:  8.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 6
2References  p. 6
3Definitions, symbols and abbreviations  p. 7
3.1Definitions  p. 7
3.2Symbols  p. 7
3.3Abbreviations  p. 7
4Authentication protocols across access systems  p. 8
4.1UMTS AKA  p. 8
4.2EAP-AKA  p. 8
4.3Others  p. 9
5Establishment of security contexts in the target access system  p. 9
5.1Establishment of security contexts with the support of SAE  p. 9
5.2Establishment of security contexts without the support of SAE  p. 9
6Establishment of IPsec tunnel between UE and PDG across the target non-3GPP access system (if required)  p. 9
6.1The source access system has a UE-PDG tunnel  p. 10
6.2The source access system does not have a UE-PDG tunnel  p. 10
7Security for IP based mobility  p. 10
7.1General requirement  p. 10
7.2Host based Mobility  p. 11
7.2.1Security associations used with Mobile IP  p. 11
7.2.2Security protocols used with Mobile IP  p. 12
7.3Bootstrapping of Mobile IP parameters  p. 13
7.3.1General  p. 13
7.3.2RFC3957 used in conjunction with GBA  p. 13
7.3.3Use GBA to generate MN-HA key  p. 15
7.3.4Use partial GBA to derive MN-HA Keys  p. 16
7.3.5Using IKEv2  p. 17
7.3.6Security bootstrapping for DS MIPv6 using MIP options  p. 18
7.4Network based Mobility  p. 20
7.4.1PMIP  p. 20
7.4.1.1Introduction  p. 20
7.4.1.2Overview of PMIP usage in 3GPP  p. 20
7.4.1.3PMIP trust model  p. 21
7.4.1.4Security measures on the Reference points between the LMA and the MAG that have a trust relation  p. 22
7.4.1.5The need for using strong access authentication with Proxy Mobile IP  p. 23
7.4.1.6No trust relation between LMA and MAG on S2a  p. 23
7.4.1.6.1Security risks  p. 23
7.4.1.6.2Possible measures  p. 24
7.4.2NetLMM  p. 24
8Specific aspects of security for mobility between 3GPP access systems and non-3GPP access systems  p. 25
8.1Security for mobility between pre-SAE 3GPP access systems and non-3GPP access systems  p. 25
8.2Security context transfer between 3GPP and trusted non-3GPP access networks  p. 25
8.3ANDSF Security  p. 26
8.3.1General  p. 26
8.3.2Procedure  p. 26
ARFC 3957  p. 28
$Change history  p. 29

Up   Top