Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.835  Word version:  16.1.0

Top   Top   Up   Prev   None
1…   4…

 

4  Key Issuesp. 12

4.1  Key Issue#1: Security Anchorp. 12

4.2  Key Issue #2: Transport independent procedure definitionp. 14

4.3  Key Issue #3: Mutual authentication between UE and anchor functionp. 15

4.4  Key Issue #4: Authentication frameworkp. 16

4.5  Key Issue #5: User privacyp. 16

4.6  Key Issue #6: Secure communication between UE and application serverp. 17

4.7  Key Issue #7: Protecting subscriber's personal information in control and data trafficp. 17

4.8  Key Issue #8: Protection of AKMA architecture interfacesp. 18

4.9  Key Issue #9: Key separation for AKMA AFsp. 18

4.10  Key Issue #10: Compliance with local rules and regulationsp. 19

4.11  Key Issue #11: Generic battery efficient end-to-end securityp. 19

4.12  Key Issue #12: Key lifetimesp. 19

4.13  Key Issue #13: API for AKMA keys in UEp. 20

4.14  Key Issue #14: Key revocationp. 21

4.15  Key Issue #15: Synchronization of keys when using established keysp. 21

4.16  Key Issue #16: Application key freshness of AKMAp. 22

4.17  Key Issue #17: AKMA pushp. 22

5  Candidate Solutionsp. 23

5.1  Solution #1: Introducing third party key to AKMAp. 23

5.2  Solution #2: Access independent architecture solution for AKMAp. 25

5.3  Solution #3: Architecture solution for AKMA with standalone anchorp. 28

5.4  Solution #4: Bootstrapping authentication of AKMAp. 31

5.5  Solution #5: Transport independent procedure using existing protocols by applying OneM2M protocol binding mechanismp. 35

5.6  Solution #6: Transport independent procedure using existing protocols by introducing a protocol transfer gatewayp. 36

5.7  Solution #7: UE implementation scheme- AKMA framework and application on modemp. 39

5.8  Solution #8: UE implementation scheme- AKMA framework on UICC and application on modemp. 40

5.9  Solution #9: UE implementation scheme- Application Processor (AP) scheme with AKMA framework on modemp. 40

5.10  Solution #10: UE implementation scheme- Application Processor (AP) scheme with AKMA framework on UICCp. 41

5.11  Solution #11: UE implementation scheme- AKMA framework implemented on Secure Element (SE)p. 42

5.12  Solution #12: UE implementation scheme- AKMA framework implemented on application processor's OSp. 42

5.13  Solution #13: AKMA authentication via the control planep. 43

5.14  Solution #14: Key revocationp. 48

5.15  Solution #15: Implicit bootstrappingp. 49

5.16  Solution #16: Use of KSEAF as root key for KAKMAp. 54

5.17  Solution #17: Efficient key derivation for end-to-end securityp. 58

5.18  Solution #18: Key separation for AKMA AFs using countersp. 65

5.19  Solution #19: Reusing KAUSF for AKMAp. 67

5.20  Solution #20: Key identification when implicit bootstrapping is usedp. 68

5.21  Solution #21: Combining implicit bootstrapping solutions for usage of KAUSF or KSEAF as AKMA root keyp. 70

5.22  Solution #22: Key freshness in AKMAp. 72

5.23  Solution #23: Implicit bootstrapping using NEF as the AKMA Anchor Functionsp. 74

5.24  Solution #24: AKMA pushp. 76

5.25  Solution #25: Key lifetimesp. 79

6  Evaluation and conclusionp. 81

$  Change historyp. 83


Up   Top