Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+
Top   in Index   Prev   Next

TR 33.835 (SA3) ☆ (Rel-16 draft)
Study on Authentication and Key Management
for Applications based on 3GPP Credential in 5G

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V0.3.0 (Wzip)  2019/03  63 p.

Rapporteur:  Miss Huang, Xiaoting

The present document specifies key issues, derived requirements and potential solutions to support authentication and key management aspects for applications and 3GPP services based on 3GPP credentials in 5G, including the IoT use case. It analyzes issues and requirements for:
  • providing authentication and key management procedures to applications and 3GPP services in 5G scenarios which allow the UE to securely exchange data with an application server
  • decoupling these procedures from the the transport protocol, in order to allow for the adaption to differernt application layer protocols
The document takes into account new solutions as well as potential adaptations to existing ones such as GBA described in TS 33.220 and BEST described in TS 33.163, in order to support the above mentioned requirements with procedures and protocols defined in SBA.

full Table of Contents for  TR 33.835  Word version:   0.3.0

 

Here   Top

 

1  ScopeWord-p. 8
2  References
3  Definitions and abbreviationsWord-p. 9
4  Scenario
5  Key Issues
6  Candidate Solutions
6.1  Solution #1: Introducing third party key to AKMA
6.2  Solution #2: Access independent architecture solution for AKMAWord-p. 21
6.3  Solution #3: Architecture solution for AKMA with standalone anchor
6.4  Solution #4: Bootstrapping authentication of AKMA
6.5  Solution #5: Transport independent procedure using existing protocols by applying OneM2M protocol binding mechanism
6.6  Solution #6: Transport independent procedure using existing protocols by introducing a protocol transfer gateway
6.7  Solution #7: UE implementation scheme- AKMA framework and application on modem
6.8  Solution #8: UE implementation scheme- AKMA framework on UICC and application on modem
6.9  Solution #9: UE implementation scheme- Application Processor (AP) scheme with AKMA framework on modem
6.10  Solution #10: UE implementation scheme- Application Processor (AP) scheme with AKMA framework on UICCWord-p. 35
6.11  Solution #11: UE implementation scheme- AKMA framework implemented on Secure Element (SE)Up
6.12  Solution #12: UE implementation scheme- AKMA framework implemented on application processor's OS
6.13  Solution #13: AKMA authentication via the control plane
6.14  Solution #14: Key revocation
6.15  Solution #15: Implicit BootstrappingWord-p. 42
6.16  Solution #16: Use of KSEAF as root key for KAKMAWord-p. 46
6.17  Solution #17: Efficient key derivation for end-to-end security
6.18  Solution #18: Key separation for AKMA AFs using CountersWord-p. 53
6.19  Solution #19: Reusing KAUSF for AKMAWord-p. 54
6.20  Solution #20: Key Identification when Implicit Bootstrapping is used
6.21  Solution #21: Combining Implicit bootstrapping solutions for usage of KAUSF or KSEAF as AKMA root key
6.22  Solution #22: Key freshness in AKMA
7  Evaluation and conclusionWord-p. 60
X  Change historyWord-p. 62

Up   Top