Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.820  Word version:  8.3.0

Top   Top   Up   Prev   None
0…   4…

 

4  System architecturep. 9

5  Threats analysisp. 13

6  Security Requirementsp. 29

7  Common Security mechanisms solutions for H(e)NBp. 36

7.1  H(e)NB Authentication Principlep. 36

7.2  Secure Storage and Executionp. 37

7.3  Comparison of H(e)NB Authentication Methodsp. 39

7.4  Authentication Method Selectionp. 39

7.5  Device Integrity Checkp. 43

7.6  Authentication Implementation Optionsp. 66

7.7  Backhaul Security Mechanismsp. 78

7.8  Location Locking mechanismsp. 79

7.9  Access Control Mechanisms for H(e)NBp. 86

7.10  Security Mechanisms for OAMp. 88

7.11  Clock Synchronization Security Mechanisms for H(e)NBp. 88

7.12  H(e)NB Distress Indicationp. 89

8  Conclusionsp. 91

A  Security mechanisms for OAMp. 93

B  TrE Types and Corresponding Interfacesp. 97

$  Change historyp. 99


Up   Top