Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.402
Word version: 17.0.0
1…
4…
9…
9
Security for IP based mobility signalling
10
Security interworking between 3GPP access networks and non-3GPP access networks
11
Network Domain Security
12
UE-ANDSF communication security
13
Security aspects of emergency call handling
14
Temporary identity management
A
Key derivation functions
B
Tunnelling of UE Services over restrictive access networks
C
List of 3GPP-vendor specific EAP-methods
$
Change History
9
Security for IP based mobility signalling
Word‑p. 42
9.1
General
Word‑p. 42
9.2
Host based Mobility
Word‑p. 42
9.2.1
MIPv4
Word‑p. 42
9.2.1.1
General
Word‑p. 42
9.2.1.2
Bootstrapping of MIPv4 FACoA parameters
Word‑p. 42
9.2.1.2.1
Procedures
Word‑p. 42
9.2.1.2.2
MIPv4 Key Derivation
Word‑p. 43
9.2.1.2.3
Key Usage
Word‑p. 45
9.2.1.2.4
Key Distribution for MIPv4
Word‑p. 45
9.2.2
DS-MIPv6
Word‑p. 45
9.2.2.1
General
Word‑p. 45
9.2.2.2
Bootstrapping of DSMIPv6 parameters
Word‑p. 46
9.2.2.2.1
Full Authentication and authorization
Word‑p. 46
9.2.2.2.2
Fast re-authentication and authorization
Word‑p. 48
9.2.2.3
Security Profiles
Word‑p. 50
9.2.2.4
Enhanced Security Support
|R10|
Word‑p. 50
9.3
Network based Mobility
Word‑p. 50
9.3.1
Proxy Mobile IP
Word‑p. 50
9.3.1.1
Introduction
Word‑p. 50
9.3.1.2
PMIP security requirements
Word‑p. 51
9.3.1.3
PMIP security mechanisms
Word‑p. 51
10
Security interworking between 3GPP access networks and non-3GPP access networks
Word‑p. 52
10.1
General
Word‑p. 52
10.2
CDMA2000 Access Network
Word‑p. 52
10.2.1
Idle Mode Mobility
Word‑p. 52
10.2.1.1
E-UTRAN to HRPD Interworking
Word‑p. 52
10.2.1.2
HRPD to E-UTRAN Interworking
Word‑p. 52
10.2.2
Active mode mobility
Word‑p. 52
10.2.2.1
E-UTRAN to HRPD Interworking
Word‑p. 52
10.2.2.2
HRPD to E-UTRAN Interworking
Word‑p. 52
11
Network Domain Security
Word‑p. 53
12
UE-ANDSF communication security
Word‑p. 53
12.1
UE-ANDSF communication security requirements
Word‑p. 53
12.2
UE-ANDSF communication security solution
Word‑p. 53
13
Security aspects of emergency call handling
|R9|
Word‑p. 54
13.1
General
Word‑p. 54
13.2
Requirements for emergency call handling
Word‑p. 54
13.3
Unauthenticated emergency calls over untrusted WLAN
|R14|
Word‑p. 55
13.4
Unauthenticated emergency calls over trusted WLAN
|R14|
Word‑p. 56
14
Temporary identity management
|R13|
Word‑p. 60
14.1
Temporary identity generation
Word‑p. 60
14.2
Key management
Word‑p. 61
14.3
Impact on permanent user identities
Word‑p. 62
14.4
Acknowledged limitations
Word‑p. 62
14.5
UE behaviour on receiving requests to send the IMSI-based user identity
Word‑p. 62
A
(Normative) Key derivation functions
Word‑p. 64
A.1
KDF interface and input parameter construction
Word‑p. 64
A.2
Function for the derivation of CK', IK' from CK, IK
Word‑p. 64
A.3
Function for the derivation of WLCP key from EMSK
|R12|
Word‑p. 64
A.4
Function for the derivation of MSK key for unauthenticated emergency sessions over WLAN
|R14|
Word‑p. 65
B
(Normative) Tunnelling of UE Services over restrictive access networks
|R12|
Word‑p. 66
B.1
Overview
Word‑p. 66
B.2
Service and media reachability for users over restrictive firewalls - untrusted non 3GPP access
Word‑p. 66
C
List of 3GPP-vendor specific EAP-methods
|R14|
Word‑p. 68
$
Change History
Word‑p. 69