Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TR 33.887
Study on Security aspects for support for
5G Wireless and Wireline Convergence (5WWC)
Phase 2
3GPP‑Page
fToC
↓
Partial Content
→
V18.0.1 (Wzip)
2023/06 40 p.
Rapporteur:
Mr. Khare, Saurabh
Nokia Germany
full Table of Contents for
TR 33.887
Word version: 18.0.1
each clause number in
'red'
refers to the equivalent title in the Partial Content
1
Scope
p. 7
2
References
p. 7
3
Definitions of terms, symbols and abbreviations
p. 7
3.1
Terms
p. 7
3.2
Symbols
p. 8
3.3
Abbreviations
p. 8
4
Assumptions
p. 8
5
Key issues
p. 8
5.1
Key issue #1: Authentication of AUN3 device behind RG and supporting EAP
p. 8
5.1.1
Key issue details
p. 8
5.1.2
Threats
p. 9
5.1.3
Potential security requirements
p. 9
5.2
Key issue #2: Security aspect of slice information exposure of N3IWF/TNGF to UE
p. 9
5.2.1
Key issue details
p. 9
5.2.2
Threats
p. 9
5.2.3
Potential security requirements
p. 9
5.3
Key issue #3: Security aspect of slice information exposure of N3IWF/TNGF
p. 9
5.3.1
Key issue details
p. 9
5.3.2
Threats
p. 10
5.3.3
Potential security requirements
p. 10
5.4
Key issue #4: Security aspect of TNAP mobility without full authentication
p. 10
5.4.1
Key issue details
p. 10
5.4.2
Threats
p. 10
5.4.3
Potential security requirements
p. 10
5.5
KI #5: Authentication of UE connecting to RG using NSWO procedure
p. 10
5.5.1
Key issue details
p. 10
5.5.2
Security threats
p. 11
5.5.3
Potential requirements
p. 11
6
Proposed solutions
p. 11
6.0
Mapping of solutions to key issues
p. 11
6.1
Solution #1: EAP_AKA prime based authentication for AUN3 devices
p. 11
6.1.1
Introduction
p. 11
6.1.2
Solution details
p. 12
6.1.2.1
Procedure
p. 12
6.1.2.2
Key derivation
p. 13
6.1.2.2.1
WAGF key for AUN3 device (not supporting NAS)_
p. 13
6.1.2.2.2
KAUN3 key
p. 13
6.1.3
Evaluation
p. 13
6.2
Solution #2: EAP base authentication for AUN3 devices behind RG in PLMN
p. 14
6.2.1
Introduction
p. 14
6.2.2
Solution details
p. 14
6.2.3
Evaluation
p. 15
6.3
Solution #3: EAP base authentication for AUN3 devices behind RG in SNPN
p. 15
6.3.1
Introduction
p. 15
6.3.2
Solution details
p. 16
6.3.3
Evaluation
p. 17
6.4
Solution #4: EAP base authentication for AUN3 devices behind RG in SNPN by AAA server
p. 17
6.4.1
Introduction
p. 17
6.4.2
Solution details
p. 17
6.4.3
Evaluation
p. 18
6.5
Solution #5: TNAP mobility solution with rand
p. 19
6.5.1
Introduction
p. 19
6.5.2
Solution details
p. 19
6.5.2.1
Procedure
p. 19
6.5.2.2
Key derivation
p. 20
6.5.3
Evaluation
p. 20
6.6
Solution #6: TNAP mobility solution with count
p. 21
6.6.1
Introduction
p. 21
6.6.2
Solution details
p. 22
6.6.2.1
Procedure
p. 22
6.6.2.2
Key derivation
p. 23
6.6.3
Evaluation
p. 23
6.7
Solution #7: Using Fast BSS Transition for TNAP mobility
p. 24
6.7.1
Introduction
p. 24
6.7.2
Solution details
p. 24
6.7.2.1
Solution overview
p. 24
6.7.2.2
Details of FT
p. 25
6.7.3
Evaluation
p. 26
6.8
Solution #8: Security Establishment for TNAP Mobility
p. 27
6.8.1
Introduction
p. 27
6.8.2
Solution details
p. 27
6.8.3
Evaluation
p. 29
6.9
Solution #9: AUN3 device supporting 5G Key hierarchy (i.e. N5CW)
p. 29
6.9.1
Introduction
p. 29
6.9.2
Solution details
p. 30
6.9.2.1
Procedure
p. 30
6.9.2.2
Key derivation
p. 31
6.9.2.2.1
WAGF' key for AUN3 device (i.e. N5CW)
p. 31
6.9.2.2.2
KRG key
p. 31
6.9.3
Evaluation
p. 31
6.10
Solution #10: TNAP mobility solution without full authentication
p. 31
6.10.1
Introduction
p. 31
6.10.2
Solution details
p. 32
6.10.3
Evaluation
p. 33
6.11
Solution #11: Security of N3IWF/TNGF reallocation
p. 33
6.11.1
Introduction
p. 33
6.11.2
Solution details
p. 34
6.11.3
Evaluation
p. 35
6.12
Solution #12: Authentication of UE connecting to RG by NSWO
p. 35
6.12.1
Introduction
p. 35
6.12.2
Solution details
p. 35
6.12.3
Evaluation
p. 35
6.13
Solution #13: TNAP mobility using modified ERP
p. 35
6.13.1
Introduction
p. 35
6.13.2
Solution details
p. 36
6.13.3
Evaluation
p. 38
7
Conclusions
p. 39
7.1
Key issue #1: Authentication of AUN3 device behind RG and supporting EAP
p. 39
7.2
Key issue #2: Security aspect of slice information exposure of N3IWF/TNGF to UE
p. 39
7.3
Key issue #3: Security aspect of slice information exposure of N3IWF/TNGF
p. 39
7.4
Key issue #4: Security aspect of TNAP mobility without full authentication
p. 39
7.5
Key issue #5: Authentication of UE connecting to RG using NSWO
p. 39
$
Change history
p. 40