| 5.1 | Solution #1: Introducing third party key to AKMA p. 23
|
| 5.2 | Solution #2: Access independent architecture solution for AKMA p. 25
|
| 5.3 | Solution #3: Architecture solution for AKMA with standalone anchor p. 28
|
| 5.4 | Solution #4: Bootstrapping authentication of AKMA p. 31
| 5.4.1 | Introduction p. 31
|
| 5.4.2 | Solution details p. 31
| 5.4.2.0 | General p. 31
|
| 5.4.2.1 | Potential Authentication procedure for 5G AKA p. 31
|
| 5.4.2.2 | Potential Authentication procedure for EAP-AKA' p. 34
|
|
| 5.4.3 | Evaluation p. 35
|
|
| 5.5 | Solution #5: Transport independent procedure using existing protocols by applying OneM2M protocol binding mechanism p. 35
|
| 5.6 | Solution #6: Transport independent procedure using existing protocols by introducing a protocol transfer gateway p. 36
|
| 5.7 | Solution #7: UE implementation scheme- AKMA framework and application on modem p. 39
|
| 5.8 | Solution #8: UE implementation scheme- AKMA framework on UICC and application on modem p. 40
|
| 5.9 | Solution #9: UE implementation scheme- Application Processor (AP) scheme with AKMA framework on modem p. 40
|
| 5.10 | Solution #10: UE implementation scheme- Application Processor (AP) scheme with AKMA framework on UICC p. 41
|
| 5.11 | Solution #11: UE implementation scheme- AKMA framework implemented on Secure Element (SE) p. 42
|
| 5.12 | Solution #12: UE implementation scheme- AKMA framework implemented on application processor's OS p. 42
|
| 5.13 | Solution #13: AKMA authentication via the control plane p. 43
|
| 5.14 | Solution #14: Key revocation p. 48
|
| 5.15 | Solution #15: Implicit bootstrapping p. 49
|
| 5.16 | Solution #16: Use of KSEAF as root key for KAKMA p. 54
| 5.16.1 | Introduction p. 54
|
| 5.16.2 | Solution details p. 54
| 5.16.2.1 | AKMA Key Repository Service p. 54
| 5.16.2.1.1 | AKMA Key Repository Service Serving Network Architecture Option p. 54
|
| 5.16.2.1.2 | AKMA Key Repository Service Home Network Architecture Option p. 55
|
|
| 5.16.2.2 | AKMA Established Key Use Procedure p. 56
|
|
| 5.16.3 | Evaluation p. 57
|
|
| 5.17 | Solution #17: Efficient key derivation for end-to-end security p. 58
|
| 5.18 | Solution #18: Key separation for AKMA AFs using counters p. 65
|
| 5.19 | Solution #19: Reusing KAUSF for AKMA p. 67
|
| 5.20 | Solution #20: Key identification when implicit bootstrapping is used p. 68
| 5.20.1 | Introduction p. 68
|
| 5.20.2 | Solution details p. 68
| 5.20.2.1 | Option 1 - Key Identifier calculated from the keys p. 68
|
| 5.20.2.2 | Option 2 - Reuse of ngKSI p. 68
|
|
| 5.20.3 | Evaluation p. 69
|
|
| 5.21 | Solution #21: Combining implicit bootstrapping solutions for usage of KAUSF or KSEAF as AKMA root key p. 70
|
| 5.22 | Solution #22: Key freshness in AKMA p. 72
|
| 5.23 | Solution #23: Implicit bootstrapping using NEF as the AKMA Anchor Functions p. 74
|
| 5.24 | Solution #24: AKMA push p. 76
|
| 5.25 | Solution #25: Key lifetimes p. 79
|