Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.886
Study on enhanced Security for Network Slicing
Phase 3

V18.1.0 (Wzip)  2023/09  16 p.
Rapporteur:
Dr. Lei, Zander (Zhongding)
HuaWei Technologies Co., Ltd

full Table of Contents for  TR 33.886  Word version:  18.1.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 6
2References  p. 6
3Definitions of terms, symbols and abbreviations  p. 6
3.1Terms  p. 6
3.2Symbols  p. 7
3.3Abbreviations  p. 7
4Key issues  p. 7
4.1Key Issue #1: providing VPLMN slice information to roaming UE  p. 7
4.1.1Key issue details  p. 7
4.1.2Security threats  p. 7
4.1.3Potential security requirements  p. 7
4.2Key Issue #2: temporary slice authorization and slice service area authorization  p. 8
4.2.1Key issue details  p. 8
4.2.2Security threats  p. 8
4.2.3Potential security requirements  p. 8
4.3Key Issue #3: network slice admission control (NSAC)  p. 8
4.3.1Key issue details  p. 8
4.3.2Security threats  p. 9
4.3.3Potential security requirements  p. 9
5Solutions  p. 9
5.1Solution #1: Verification by Primary NSACF  p. 9
5.1.1Introduction  p. 9
5.1.2Solution details  p. 9
5.1.3Evaluation  p. 10
5.2Solution #2: Protect NSAC procedure in multiple NSACFs deployment scenario  p. 10
5.2.1Introduction  p. 10
5.2.2Solution details  p. 11
5.2.3Evaluation  p. 12
5.3Solution #3: Home control mechanism for hierarchical NSAC architecture  p. 13
5.3.1Introduction  p. 13
5.3.2Solution details  p. 13
5.3.3Evaluation  p. 14
6Conclusions  p. 15
6.1Conclusions to Key Issue #1  p. 15
6.2Conclusions to Key Issue #2  p. 15
6.3Conclusions to Key Issue #3  p. 15
$Change history  p. 16

Up   Top