Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.807  Word version:  16.0.1

Top   Top   None   None   Next
1…   5…

 

1  Scopep. 8

The scope of the present document is:
  • Study for security between a 5G-RG and 5GC.
  • Study for security for a 3GPP UE and non 3GPP UE behind a 5G-RG or a FN RG.
  • Study for security for supporting legacy RG. The scope is limited based on the conclusion of the study in TR 23.716.
  • Study for security for trusted non-3GPP access.
  • The privacy issues in the convergence architecture, if any.

2  Referencesp. 8

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
TR 23.716: "Study on the Wireless and Wireline Convergence for the 5G system architecture"
[3]
TS 33.501: "Security architecture and procedures for 5G System".
[4]
IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012) - IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
[5]
RFC 2410:  "The NULL Encryption Algorithm and Its Use With IPsec".
[6]
TS 23.316: "Wireless and wireline convergence access support for the 5G System"
[7]
TS 23.501: "System Architecture for the 5G System".
[8]
TS 23.502: "Procedures for the 5G System (5GS)".
[9]
IEEE 802.11i-2004: "Amendment 6: Medium Access Control (MAC) Security Enhancement".
Up

3  Definitions of terms, symbols and abbreviationsp. 8

3.1  Termsp. 8

For the purposes of the present document, the terms given in TR 21.905, TR 23.716 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.

3.2  Symbolsp. 9

Void.

3.3  Abbreviationsp. 9

For the purposes of the present document, the abbreviations given in TR 21.905, TR 23.716 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.

4  Security aspects of the 5WWC features in the 5G Systemp. 9

4.1  Generalp. 9

To support Wireless and Wireline Convergence for the 5G system, two new network entities, 5G-RG and FN-RG, are introduced in the architecture.
5G-RG acts as a 5G UE in order to access 5GC reusing security procedure defined in TS 33.501. The scenario of UE behind 5G-RG accesses to the 5GC is also captured in the present document.
The security of FN-RG accessing to 5GC is studied in the present document. The scenario of UE behind FN-RG accesses to the 5GC is also captured in the present document.
For trusted non-3GPP access, the unified authentication framework is reused. Any potential security enhancements in addition to the security procedures defined in TS 33.501 are captured in the present document.
Up

Up   Top   ToC