Tech-
invite
3GPP
space
IETF
RFCs
SIP
index
N
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.220
Word version: 17.4.0
1…
4…
4.4…
4.5…
5…
B…
D…
I…
J…
M…
N…
J
Usage of USS with local policy enforcement in BSF
J.1
General
J.2
Usage scenarios
K
GBA-usage examples
K.1
Example on interoperator GBA setup
K.2
Example on interoperator GBA operation
L
Information on how security threats related to known GSM vulnerabilities are addressed by the 2G GBA solution
L.1
Impersonation of the UE to the BSF during the run of the Ub protocol
L.2
Impersonation of the BSF to the UE during the run of the Ub protocol
L.3
Finding the GBA key Ks during or after the Ub protocol run
L.4
Bidding down attack
...
J
Usage of USS with local policy enforcement in BSF
|R7|
p. 68
J.1
General
p. 68
J.2
Usage scenarios
p. 68
J.2.1
Scenario 1: NAF does not use USSs, BSF does not have local policy for NAF
p. 69
J.2.2
Scenario 2: NAF does not use USSs, BSF does have local policy for NAF
p. 69
J.2.3
Scenario 3: NAF does use USSs, BSF does not have local policy for NAF
p. 69
J.2.4
Scenario 4: NAF does use USSs, BSF does have local policy for NAF
p. 70
K
GBA-usage examples
|R7|
p. 71
K.1
Example on interoperator GBA setup
p. 71
K.2
Example on interoperator GBA operation
p. 73
L
Information on how security threats related to known GSM vulnerabilities are addressed by the 2G GBA solution
|R7|
p. 76
L.1
Impersonation of the UE to the BSF during the run of the Ub protocol
p. 76
L.2
Impersonation of the BSF to the UE during the run of the Ub protocol
p. 76
L.3
Finding the GBA key Ks during or after the Ub protocol run
p. 77
L.4
Bidding down attack
p. 77