Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TR 33.850  Word version:  17.0.0

Top   Top   Up   Prev   None
0…   5…

 

5  Key issuesWord‑p. 8

6  Proposed solutionsWord‑p. 11

6.0  Mapping of solutions to key issuesWord‑p. 11

6.1  Solution #1: Protection of MBS traffic in transport layerWord‑p. 11

6.2  Solution #2: protect MBS traffic in service layerWord‑p. 13

6.3  Solution #3: MBS Traffic ProtectionWord‑p. 16

6.3.1  Solution overviewWord‑p. 16

6.3.2  Solution detailsWord‑p. 17

6.3.3  Solution evaluationWord‑p. 18

6.4  Solution #4: Authentication and authorization for multicast communication serviceWord‑p. 18

6.5  Solution #5: Authorization revocationWord‑p. 20

6.5.1  Solution overviewWord‑p. 20

6.5.2  Solution detailsWord‑p. 20

6.5.3  Solution evaluationWord‑p. 21

6.6  Solution #6: Authentication and authorization for multicast communication service based on AKMAWord‑p. 21

6.6.1  Solution overviewWord‑p. 21

6.6.2  Solution detailsWord‑p. 22

6.6.3  Solution evaluationWord‑p. 22

6.7  Solution # 7: security protection between AF and 5GCWord‑p. 23

6.7.1  Solution overviewWord‑p. 23

6.7.2  Solution detailsWord‑p. 23

6.7.3  Solution evaluationWord‑p. 23

6.8  Solution #8: MBS Traffic ProtectionWord‑p. 23

6.8.1  Solution overviewWord‑p. 23

6.8.2  Solution detailsWord‑p. 23

6.8.3  Solution evaluationWord‑p. 25

6.9  Solution #9: Key update solutionWord‑p. 25

6.10  Solution #10: Secure framework for Key distribution in MBSWord‑p. 35

6.11  Solution #11: Update the keys used to protect the MBS trafficWord‑p. 41

6.11.1  IntroductionWord‑p. 41

6.11.2  Solution detailsWord‑p. 41

6.11.3  EvaluationWord‑p. 42

6.12  Solution #12: Protection of MBS traffic at service layer based on GBAWord‑p. 42

6.12.1  Solution overviewWord‑p. 42

6.12.2  Solution detailsWord‑p. 42

6.12.3  Solution evaluationWord‑p. 44

6.13  Solution #13: Key generation and distribution for MBSWord‑p. 44

6.14  Solution #14: Secure key delivery in service layerWord‑p. 48

6.14.1  Solution overviewWord‑p. 48

6.14.2  Solution detailsWord‑p. 48

6.14.3  Solution evaluationWord‑p. 49

7  ConclusionsWord‑p. 49

$  Change historyWord‑p. 51


Up   Top