Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.854  Word version:  17.1.0

Top   Top   Up   Prev   Next
1…   5…   6…   6.1…   6.2…   6.3…   6.4…   6.5…   6.6…   6.7…   6.8…   6.9…   6.10…   6.11…   6.12…   6.13…   6.14…   6.15…   6.16…   7…

 

6  Proposed solutionsp. 15

6.0  Mapping of solutions to key issuesp. 15

Solutions KI#1 KI#2 KI#3 KI#4 KI#5 KI#6 KI#7
#1: UAS authentication and authorizationx
#2: UAS authentication and authorization using User Planex
#3: UAV authentication and authorization by USS/UTM with AMF as authenticatorx
#4: UAV authentication and authorization using EAP-based PDU secondary authenticationx
#5: UAV authentication and authorization using API-based PDU secondary authenticationxxxx
#6: Obtaining UAV location information from the PLMNx
#7: UAS authentication, authorization and security aspectsxx
#8: Using 5G location result for location information verificationx
#9: UAS enabled authenticationx
#10: Authentication and authorization of UAVsx
#11: UAV and UAVC pairing authorization through bound IDsx
#12: UAV location privacy protectionxxx
#13: Authorization of UAV/UAVC when connected to EPSxx
#14: Authorization of UAV/UAVC pairing when connected to 5GSx
#15: UAV and UAV-C Pairing Authorization and Security Aspectsxx
#16: Preventing malicious revocation from unauthorized UTM/USSx
Up

Up   Top   ToC