Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.839  Word version:  17.1.0

Top   Top   None   None   Next
1…   4…   6…

 

1  Scopep. 9

The present document studies the security enhancements on the support for Edge Computing in the 5G Core network define in TR 23.748, and application architecture for enabling Edge Applications defined in TR 23.758 and TS 23.558.
Potential security requirements are provided and possible security enhancements to 5GS and edge application architecture are proposed that meet these security requirements.
Up

2  Referencesp. 9

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
TS 23.558: "Architecture for enabling Edge Applications".
[3]
TR 23.748: "Study on enhancement of support for Edge Computing in the 5G Core network (5GC)".
[4]
TR 23.758: "Study on application architecture for enabling Edge Applications".
[5]
TS 23.502: "Procedure for the 5G System; Stage 2".
[6]
TS 33.535: "Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)".
[7]
TS 33.501: "Security architecture and procedures for 5G System".
[8]
TS 33.220: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)".
[9]
TS 23.222: "Functional architecture and information flows to support Common API Framework for 3GPP Northbound APIs; Stage 2".
[10]  Void.
[11]
TS 33.187: "Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements".
[12]
TS 33.210: "3G security; Network Domain Security (NDS); IP network layer security".
[13]
TS 33.310: "Network Domain Security (NDS); Authentication Framework (AF)".
[14]
TS 23.501: "System Architecture for the 5G System".
[15]
TS 23.003: "Numbering, addressing and identification".
[16]
TS 33.122: "Security aspects of Common API Framework (CAPIF) for 3GPP northbound APIs".
[17]  Void.
[18]
RFC 4279  "Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)".
[19]
RFC 8446:  "The Transport Layer Security (TLS) Protocol Version 1.3".
[20]
TR 33.867: "Study on user consent for 3GPP services".
[21]
RFC 7858:  "Specification for DNS over Transport Layer Security (TLS)".
[22]
RFC 8310:  "Usage Profiles for DNS over TLS and DNS over DTLS".
[23]
TS 33.434: "Security aspects of Service Enabler Architecture Layer (SEAL) for verticals".
[24]
RFC 7616:  "HTTP Digest Access Authentication".
[25]
RFC 5246:  "The Transport Layer Security (TLS) Protocol Version 1.2".
[26]
TS 33.222: "Generic Authentication Architecture (GAA); Access to network application functions using HypertextTransfer Protocol over Transport Layer Security (HTTPS)".
[27]
RFC 2616  (1999): "Hypertext Transfer Protocol (HTTP) - HTTP/1.1".
[28]
GSMA IoT.04: "Common Implementation Guide to Using the SIM as "Root of Trust" to Secure IoT Applications".
[29]
RFC 7515:  "JSON Web Signature (JWS)".
[30]
RFC 7519:  "JSON Web Token (JWT)".
[31]
RFC 7662:  "OAuth 2.0 Token Introspection".
[32]
OpenID Connect 1.0: "OpenID Connect Core 1.0 incorporating errata set 1", http://openid.net/specs/openid-connect-core-1_0.html.
[33]
NIST SP 800-63-3. Digital Identity Guidelines. Available at: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf.
[34]
NIST SP 800-63c. Federation and Assertions. Available at: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63c.pdf.
[35]
TS 23.548: "5G System Enhancements for Edge Computing; Stage 2; (Release 17)".
[36]
RFC 5246:  "The Transport Layer Security (TLS) Protocol Version 1.2"..
[37]
RFC 8446:  "The Transport Layer Security (TLS) Protocol Version 1.3".
Up

3  Definitions of terms, symbols and abbreviationsp. 10

3.1  Termsp. 10

For the purposes of the present document, the terms given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.

3.2  Symbolsp. 11

Void

3.3  Abbreviationsp. 11

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
AC
Application Client
EAS
Edge Application Server
ECS
Edge Configuration Server
EEC
Edge Enabler Client
EES
Edge Enabler Server
FQDN
Fully Qualified Domain Name
LADN
Local Area Data Network
Up

Up   Top   ToC