hash
stringlengths
32
32
doc_id
stringlengths
5
12
section
stringlengths
5
1.47k
content
stringlengths
0
6.67M
78aa6a85972743b91dba1779a75243c8
33.778
6 Solutions
78aa6a85972743b91dba1779a75243c8
33.778
6.1 Solution #1: MPQUIC/TLS using PSK derived from KAMF
78aa6a85972743b91dba1779a75243c8
33.778
6.1.1 Introduction
This solution addresses Key issue #1 by enabling a secure UP communication channel between the UE and the UPF. The approach leverages the current KAMF to derive a pre-shared key (UPF_PSK) and a corresponding identifier (UPF_PSK ID). The UPF_PSK/ID is delivered to the UPF and then used for a mutual-authentication and ke...
78aa6a85972743b91dba1779a75243c8
33.778
6.1.2 Solution details
Assumptions and scope: - UE is registered to the 5GS and has established a KAMF with the network. - Distribution path for UPF_PSK/ID: AMF/SMF → UPF over N2/N4. Key derivation and identifiers: - UE and AMF derive UPF_PSK and UPF_PSK ID using current KAMF. - Input parameters for the KDF include at least the PDU S...
78aa6a85972743b91dba1779a75243c8
33.778
6.1.3 Evaluation
This solution depends on the visited network supporting the relevant functionality of this solution. The solution fully addresses Key issue #1 requirement, including derivation, delivery, update and usage of the PSK between UE and UPF used for authentication with MPQUIC/TLS. Impacts: - AMF and UE derive a new UPF_PS...
78aa6a85972743b91dba1779a75243c8
33.778
6.2 Solution #2: PSK derivation bound with MA PDU session
78aa6a85972743b91dba1779a75243c8
33.778
6.2.1 Introduction
According to TS 23.501 [8] clause 5.32.6, for steering functionalities based on MPQUIC that apply the QUIC protocol and its multipath extensions, the MPQUIC functionality(ies) in the UE communicates with the associated MPQUIC Proxy functionality(ies) in the UPF. The MPQUIC functionality in the UE and the associated MPQ...
78aa6a85972743b91dba1779a75243c8
33.778
6.2.2 Solution details
To bound the PSK with a specific MA PDU session, it is proposed to use an identity which can uniquely identify the MA PDU session on both the UE side and network side as an input parameter for PSK derivation. It can be the PDU session ID or IP address of the MA PDU session, given that both the UE and the SMF have the P...
78aa6a85972743b91dba1779a75243c8
33.778
6.2.3 Evaluation
Editor’s Note: This clause is going to capture the pros and cons of the solution, e.g. whether the threats are addressed totally, how the existing 5G system is impacted, whether there is any leftover issues exists, etc.
78aa6a85972743b91dba1779a75243c8
33.778
6.3 Solution #3: PSK delivery during MA PDU session establishment
78aa6a85972743b91dba1779a75243c8
33.778
6.3.1 Introduction
According to TS 23.502 [9] clause 4.22.2, when receiving the UE requested PDU session establishment request with Request Type as "MA PDU Request", the AMF supporting MA PDU sessions selects an SMF supporting MA PDU sessions. It is proposed that: - When selecting an SMF supporting MA PDU, the AMF sends a key to the SMF...
78aa6a85972743b91dba1779a75243c8
33.778
6.3.2 Solution details
The detailed procedure is shown in Figure 6.3.2-1. Figure 6.3.2-1: MPQUIC/TLS Security Establishment during MA PDU session establishment 1. The UE provides Request Type as "MA PDU Request" in UL NAS Transport message and its ATSSS capabilities in PDU Session Establishment Request message. 2. Based on Request Ty...
78aa6a85972743b91dba1779a75243c8
33.778
6.3.3 Evaluation
The solution also addresses the home-routed roaming scenario, while ensuring key separation between serving and home networks. Option 1 requires new procedure and messages initiated by the SMF towards the AUSF for key retrieval. An additional impact on the AUSF is that it is required to store KAUSF and derive PSK fro...
78aa6a85972743b91dba1779a75243c8
33.778
6.4 Solution #4: Using 5G security context to derive authentication pre-shared key for MPQUIC
78aa6a85972743b91dba1779a75243c8
33.778
6.4.1 Introduction
This solution addresses key issue #1 “PSK support for MPQUIC TLS”. This solution proposes to derive authentication pre-shared key from the 5G security context to establish the security of MPQUIC for UE and UPF.
78aa6a85972743b91dba1779a75243c8
33.778
6.4.2 Solution details
78aa6a85972743b91dba1779a75243c8
33.778
6.4.2.1 The procedure for PSK retrieval
Considering UE and network already generated shared security context during the registration procedure, a sub-level shared key can be generated, and be used as a pre-shared key for MPQUIC. AMF derives the KUPF from KAMF during the PDU session establishment procedure as shown in the following procedure (Figure 6.4.2.1)...
78aa6a85972743b91dba1779a75243c8
33.778
6.4.2.2 Key hierarchy
The key hierarchy defined in TS 33.501[2] for this scenario can be extended as follows: Figure 6.4.2.2 Key hierarchy for KUPF retrieval A new key KUPF is derived from KAMF as depicted in Figure 6. 4.2.2.
78aa6a85972743b91dba1779a75243c8
33.778
6.4.2.3 KUPF generation
The KUPF is generated by KAMF using the following input parameters. - FC = 0xXX - P0 = PDU session ID - L0 = length of PDU session ID - P1 = NAS Uplink COUNT value - L1 = length of NAS Uplink COUNT value The input key KEY is KAMF.
78aa6a85972743b91dba1779a75243c8
33.778
6.4.2.4 Key ID generation
The Key ID is generated from the PDU session ID and UE ID (i.e. SUPI) as follows: KID = H(SUPI)|| PDU session ID
78aa6a85972743b91dba1779a75243c8
33.778
6.4.3 Evaluation
This solution proposes a solution of deriving authentication pre-shared key from the 5G security context to establish the security of MPQUIC for UE and UPF. AMF has to derive a key for UPF after SMF determines that MPQUIC functionality will be used and send a request to AMF. UPF has to store the key and the correspon...
78aa6a85972743b91dba1779a75243c8
33.778
6.5 Solution #5: two layer PSK generation method
78aa6a85972743b91dba1779a75243c8
33.778
6.5.1 Introduction
This solution proposes a two layer key generation. The AMF will use KAMF generates a Key KSMF and send the KSMF to the selected SMF. The SMF will further generate KUPF using KSMF, and then deliver the key KUPF to the UPF. Meanwhile, the SMF also generates a key ID, and the Key ID is also sent to the UPF together with t...
78aa6a85972743b91dba1779a75243c8
33.778
6.5.2 Solution details
78aa6a85972743b91dba1779a75243c8
33.778
6.5.2.1 The procedure for PSK retrieval
Figure 6.5.2-1 Procedure to get a PSK between UE and UPF for MPQUIC 1. UE sends PDU Session Establishment Request message to the AMF. The message contains the MAP PDU session information defined in TS 23.502[9] and a PSK capability indication. The PSK capability indication is to indicate that the UE supports to gene...
78aa6a85972743b91dba1779a75243c8
33.778
6.5.2.2 Key hierarchy
Figure 6.9.2-2 Key hierarchy for KUPF retrieval Based on the procedure in clause 6.9.2.1, the AMF generates the KSMF by using the KAMF and deliver it to the SMF, and then the SMF uses the KSMF to generate the KUPF that will be further delivered to the UPF.
78aa6a85972743b91dba1779a75243c8
33.778
6.5.2.3 KSMF generation method
The KSMF is generated by KAMF reusing the method in A.13 of TS 33.501[2] with the following updated: - Set the P0 input parameter DIRECTION to the value 0x02.
78aa6a85972743b91dba1779a75243c8
33.778
6.5.2.4 KUPF generation method
The KUPF is generated by KSMF using the method in A.13 of TS 33.501[2] with the following updated: - Set the input KEY to KSMF. - Set the P0 DIRECTION to 0x01. - Set the COUNT value is set to the value of PDU session ID.
78aa6a85972743b91dba1779a75243c8
33.778
6.5.2.5 Key ID generation method
The Key ID is generated by KSMF using the method in A.3 of TS 33.535[10] with the following updated: - Set the input key KAUSF to KSMF. - Set the P0 = "A-TID" to P0 = "UPF Key ID”. - Set the L0 = length of "A-TID"; (i.e. 0x00 0x05) to L0 = length of " UPF Key ID "; (i.e. 0x00 0x05).
78aa6a85972743b91dba1779a75243c8
33.778
6.5.3 Evaluation
The solution considers the backward compatible issue to let the SMF knows whether the UE is upgraded to support generating PSK. In 3GPP system, all PSKs in the key hierarchy are delivered in one hop only. Thus deliver the PSK to the UPF from SMF is not fully comply with the principle. In case that no new interface is ...
78aa6a85972743b91dba1779a75243c8
33.778
6.6 Solution #6: Key derivation and delivery to UE and UPF
78aa6a85972743b91dba1779a75243c8
33.778
6.6.1 Introduction
The following solutions addresses KI#1 by proposing a mechanism to derive the key inside the 5G core and distribute it to both UE and UPF. Additionally, it proposes a mechanism to initiate re-authentication by deriving and delivering new keys to UE and UPF.
78aa6a85972743b91dba1779a75243c8
33.778
6.6.2 Solution details
78aa6a85972743b91dba1779a75243c8
33.778
6.6.2.1 Key derivation and distribution
1. A Multi-Access PDU session is established and one or more ATSSS rules require the use of MPQUIC. 2. The UPF request SMF the pre-shared secret for the session with the UE. 3. SMF forwards the Key request to AMF. 4. AMF generates the new key by deriving it from KAMF. The following parameters should be use as inp...
78aa6a85972743b91dba1779a75243c8
33.778
6.6.2.2 Re-Keying mechanism
1. MPQUIC connection has been set up through PSK. 2. Based on internal policies, either the UE or 5G core can require to renew the pre-shared secret. This could include 5G security policy for re-authentication, such as in the case of inter-system mobility. 3. AMF generates a new key through the same protocol desc...
78aa6a85972743b91dba1779a75243c8
33.778
6.6.3 Evaluation
The solution completely addresses the problem highlighted by KI#1 both for initial authentication of the connection and for update of the key in case of a compromise. The security is achieved by deriving a new dedicated key for each MPQUIC connection, ensuring that each connection is independently secured, and the comp...
78aa6a85972743b91dba1779a75243c8
33.778
7 Conclusions
Editor’s Note: This clause is going to capture the conclusions of this study. Annex A: Change history Change history Date Meeting TDoc CR Rev Cat Subject/Comment New version 2025.10 SA3#124 S3-253745 The merger of S3-253753,711,712,713,714,715,717,718,415 0.1.0 2025.11 SA3#125 S3-254536 ...
7e61f3f3ff87235057f609e496a8620d
33.785
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. - For a specific reference, subsequent revisions do not apply. -...
7e61f3f3ff87235057f609e496a8620d
33.785
3 Definitions of terms, symbols and abbreviations
7e61f3f3ff87235057f609e496a8620d
33.785
3.1 Terms
For the purposes of the present document, the terms given in TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905 [1]. example: text used to clarify abstract rules by applying them literally.
7e61f3f3ff87235057f609e496a8620d
33.785
3.2 Symbols
For the purposes of the present document, the following symbols apply: <symbol> <Explanation>
7e61f3f3ff87235057f609e496a8620d
33.785
3.3 Abbreviations
For the purposes of the present document, the abbreviations given in TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905 [1]. <ABBREVIATION> <Expansion>
7e61f3f3ff87235057f609e496a8620d
33.785
4 Overview
TR 23.700-04 [2] studies transfer of standardized data over UP for UE data collection to meet requirements for AI/ML for NR air interface operation with UE-side model training, all the architecture assumptions and architecture requirements defined in TR 23.700-04 [2] are also applicable to the present document, and any...
7e61f3f3ff87235057f609e496a8620d
33.785
5 Key issues
Editor’s note: This clause contains all the key issues identified during the study.
7e61f3f3ff87235057f609e496a8620d
33.785
5.1 Key Issue #1: Security of UE connection setup with Data Collection NF
7e61f3f3ff87235057f609e496a8620d
33.785
5.1.1 Key issue details
The architecture requirement in clause 4.2 of TR 23.700-04 [2] is that MNO has full controllability and visibility for standardized data and a UP path is used between the UE and a data collection network function for transferring standardized collected data from the UE using PDU connectivity service provided by a PDU s...
7e61f3f3ff87235057f609e496a8620d
33.785
5.1.2 Security threats
Lack of authentication and authorization may lead to unauthorized access to network services. Lack of confidentiality, integrity protection in collecting UE related data can lead to disclosure and tampering of UE related information. Tampering of UE related data in transit can also impact the quality of training data...
7e61f3f3ff87235057f609e496a8620d
33.785
5.1.3 Potential security requirements
The 5GS should support authentication and authorization between UE and data collection NF before data transmission takes place. Editor’s note: Authentication and authorization between UE and data collection NF is ffs depending on progress on the architecture aspects by SA2. The 5GS should support confidentiality, int...
7e61f3f3ff87235057f609e496a8620d
33.785
5.2 Key Issue #2: Security and Authorization for Exposure of UE Data towards OTT Servers
7e61f3f3ff87235057f609e496a8620d
33.785
5.2.1 Key issue details
As studied in TR 23.700-04 [2], training data for AI/ML-based NR air interface operation with UE-side model training may be transferred via the 5G Core (5GC) and then exposed to external OTT servers. The exposure of such UE-related data outside the 3GPP domain introduces security risks that need to be addressed at the ...
7e61f3f3ff87235057f609e496a8620d
33.785
5.2.2 Security threats
Unauthenticated or impersonating OTT servers could obtain sensitive UE-related data. Without authorization, OTT servers can abuse UE-related data exposure services. Leakage, tampering, or replay of UE-related data at the NEF and OTT/AF interface could compromise integrity, confidentiality. Exposure of UE information...
7e61f3f3ff87235057f609e496a8620d
33.785
5.2.3 Potential security requirements
The 5GS shall support mutual authentication between the NEF and OTT/AF servers handling UE-related data. The 5GS shall support authorization mechanisms for services related to exposure of UE-related data to the OTT server. The 5GS shall support confidentiality, integrity, and replay protection for UE-related data dur...
7e61f3f3ff87235057f609e496a8620d
33.785
6 Solutions
Editor’s Note: This clause contains the proposed solutions addressing the identified key issues.
7e61f3f3ff87235057f609e496a8620d
33.785
6.1 Mapping of solutions to key issues
Editor’s Note: This clause captures mapping between key issues and solutions. Table 6.1-1: Mapping of solutions to key issues Key Issues Solutions #1 #2 #1 X #2 X #3 X #4 X #5 X #6 X #7 X #8 X #9 X #10 X #11 X
7e61f3f3ff87235057f609e496a8620d
33.785
6.2 Solution #1: Security of UE connection setup with Data Collection NF
7e61f3f3ff87235057f609e496a8620d
33.785
6.2.1 Introduction
This solution addresses requirements of key issue #1. For authorization and user consent check between UE and data collection NF, it proposes that the entity who selects UE for data collection is deemed as enforcement point. Especially for user consent check, the existing mechanism can be reused. For authentication ...
7e61f3f3ff87235057f609e496a8620d
33.785
6.2.2 Solution details
Figure 6.2.2-1: Security of UE connection setup with Data Collection NF 1. Data consumer (e.g. UE model training entity server) requests UE data collection to DCF. 2. DCF retrieves UE subscription data from UDM. The subscription data includes: a) User consent data: existing user consent parameters can be reused. ...
7e61f3f3ff87235057f609e496a8620d
33.785
6.2.3 Evaluation
TBA Editor's note: The evaluation is made based on SA2 conclusion.
7e61f3f3ff87235057f609e496a8620d
33.785
6.3 Solution #2: Security for Data Collection using a DCF
7e61f3f3ff87235057f609e496a8620d
33.785
6.3.1 Introduction
This solution addresses Key Issue #1. This solution builds on TR 23.700-04 (for the standardized transfer of standardized data over UP for UE-side data collection) and introduces security enhancements in the 5GS for secure UE connection setup and data transfer with a Data Collection Function (DCF).
7e61f3f3ff87235057f609e496a8620d
33.785
6.3.2 Solution details
Architecture scope and roles - DCF in the MNO domain manages Data Collection Profiles (DCPs) and orchestrates UE data collection and transfer, Security functions 1) Authentication and session protection between UE and DCF - The UE establishes a secure association with the DCF using shared key derived from network ...
7e61f3f3ff87235057f609e496a8620d
33.785
6.3.3 Evaluation
Editor's note: The need for UE authentication is FFS Editor's note: Further evaluation is FFS.
7e61f3f3ff87235057f609e496a8620d
33.785
6.4 Solution #3: Security of connection between UE and Data Collection NF
7e61f3f3ff87235057f609e496a8620d
33.785
6.4.1 Introduction
This solution address KI#1 Security of UE connection setup with Data Collection NF by reusing the existing TLS based mechanism.
7e61f3f3ff87235057f609e496a8620d
33.785
6.4.2 Solution details
The UE establishes the user plane connection to the Data Collection NF, to protect the interface, the TLS based mechanism is supported. AKMA specified in TS 33.535 [x] or GBA specified in TS 33.220[y] could be reused to secure the end-to-end connection between the UE and the Data collection NF. The Data collection NF t...
7e61f3f3ff87235057f609e496a8620d
33.785
6.4.3 Evaluation
TBA.
7e61f3f3ff87235057f609e496a8620d
33.785
6.5 Solution #4: New solution for Security of UE connection setup with Data collection NF
7e61f3f3ff87235057f609e496a8620d
33.785
6.5.1 Introduction
This solution addresses requirements of key issue #1: "Security of UE connection setup with Data collection NF", particularly by hop-by-hop security. For authorization and user consent check between UE and data collection NF, it proposes detailed authorization checks against UE subscription data and operator policies a...
7e61f3f3ff87235057f609e496a8620d
33.785
6.5.2 Solution details
Figure 6.5.2-1: Security of UE connection setup with Data Collection NF 1. The UE model training entity/server sends a request to the DCF to collect UE data for UE side model training. 2. The DCF checks subscription data for UE data collection and transfer from the UDM. 3. After successful authorization and user...
7e61f3f3ff87235057f609e496a8620d
33.785
6.5.3 Evaluation
TBD
7e61f3f3ff87235057f609e496a8620d
33.785
6.6 Solution #5: Secure communication between UE and the data collection function
7e61f3f3ff87235057f609e496a8620d
33.785
6.6.1 Introduction
This solution addresses part of KI#1, i.e. secure communication and mutual authentication between UE and the data collection function. Secure connection is required between the UE and the data collection function, the connection between the UE and the data collection function can be secured by the TLS or NDS/IP and UP...
7e61f3f3ff87235057f609e496a8620d
33.785
6.6.2 Solution details
For connection between UE and the data collection function located in home network, the TLS connection between the UE and the data collection function can be used for protecting the UE data. The TLS can be established based on key shared between the UE and the data collection function. The shared key is generated bas...
7e61f3f3ff87235057f609e496a8620d
33.785
6.6.3 Evaluation
Editor's note: Further evaluation is needed. Editor's note: How the UE perform data collection and its dependency on the solution is subject to SA2 progress.
7e61f3f3ff87235057f609e496a8620d
33.785
6.7 Solution #6: UE-side Data Collection Exposure
7e61f3f3ff87235057f609e496a8620d
33.785
6.7.1 Introduction
This solution addresses Key Issue #2. This solution builds on TR 23.700-04 [2] (for the standardized transfer of standardized data over UP for UE-side data collection) for the secure, authorized, and privacy-preserving exposure of UE-related data towards OTT servers via the 5GC exposure function (e.g., NEF).
7e61f3f3ff87235057f609e496a8620d
33.785
6.7.2 Solution details
Architecture scope and roles - DCF in the MNO domain manages Data Collection Profiles (DCPs) and orchestrates UE data collection and transfer towards the OTT server via NEF. The NEF exposes authorized subsets of collected data with any applicable post-processing done by DCF prior to being forwarded to OTT servers. S...
7e61f3f3ff87235057f609e496a8620d
33.785
6.7.3 Evaluation
Editor's note: evaluation is FFS.
7e61f3f3ff87235057f609e496a8620d
33.785
6.8 Solution #7: Security and Authorization for Exposure of UE Data towards OTT Servers
7e61f3f3ff87235057f609e496a8620d
33.785
6.8.1 Introduction
This clause outlines the security considerations for AF authentication, communication security between NEF and AF and authorization for data collection procedure between both AFs and DCF utilizing NRF token-based approach. General mechanism to utilise the token-based authorization is specified in clause 13.4.1 of TS 33...
7e61f3f3ff87235057f609e496a8620d
33.785
6.8.2 Solution details
Editor's note: Whether the DCF is a new NF or the existing one is FFS and is depending on SA2 progress. Figure 6.8.2-1: Authorization for Exposure of UE Data towards OTT Servers 1a. In case of untrusted AF OTT server, the NEF registers its NF profile at the NRF with AF’s related parameters that includes AF ID, data...
7e61f3f3ff87235057f609e496a8620d
33.785
6.8.3 Evaluation
TBD
7e61f3f3ff87235057f609e496a8620d
33.785
6.9 Solution #8: Authorization for Exposure of UE Data towards OTT Servers
7e61f3f3ff87235057f609e496a8620d
33.785
6.9.1 Introduction
As studied in TR 23.700-04 [2], the CN may exposure the data to the OTT Servers. These data are collected by the CN from various UEs which may belong to different Vendors or TACs. And some vendors or chipsets vendors may have concern to exposure the data of its product (e.g., UE or chipset) to other vendors. The CN nee...
7e61f3f3ff87235057f609e496a8620d
33.785
6.9.2 Solution details
Figure 6.9.2-1: Authorization for Exposure of UE Data towards OTT Servers 0. The OTT servers register the data exposure concerns to the CN. The data exposure concerns include: UE information (e.g., Vendor ID, TAC) and its allowed vendor list. The OTT server agree to exposure the data collected from the UE in the UE ...
7e61f3f3ff87235057f609e496a8620d
33.785
6.9.3 Evaluation
TBD
7e61f3f3ff87235057f609e496a8620d
33.785
6.10 Solution #9: Secure mechanism for NEF and OTT/AF interaction
7e61f3f3ff87235057f609e496a8620d
33.785
6.10.1 Introduction
This solution addresses KI#2. Specifically, existing mechanisms defined in TS 33.501 [3] are reused to address the issue.
7e61f3f3ff87235057f609e496a8620d
33.785
6.10.2 Solution details
TLS based mechanism defined in clause 12.2 of TS 33.501 [3] is reused for mutual authentication between the NEF and the OTT/AF servers handling UE-related data. Authorization mechanism defined in clause 12.4 or 12.5 of TS 33.501 [3] is reused for authorizing services related to exposure of UE-related data to the OTT ...
7e61f3f3ff87235057f609e496a8620d
33.785
6.10.3 Evaluation
Existing TLS based mechanism defined in clause 12 of TS 33.501 [3] can be reused for mutual authentication and communication protection between NEF and the OTT/AF servers handling UE-related data. Editor’s note: Further evaluation is FFS.
7e61f3f3ff87235057f609e496a8620d
33.785
6.11 Solution #10: Granular authorization for OTT/AF
7e61f3f3ff87235057f609e496a8620d
33.785
6.11.1 Introduction
This solution addresses requirements of key issue #2.
7e61f3f3ff87235057f609e496a8620d
33.785
6.11.2 Solution details
When AF or OTT requests UE-side model training data from DCF via NEF, the exposure of such UE data outside the 3GPP domain introduces security risks requiring control at the exposure interface, particularly for authorization. Figure 6.11.2-1: Granular authorization for OTT/AF 1: An AF/OTT server requests UE-side mo...
7e61f3f3ff87235057f609e496a8620d
33.785
6.11.3 Evaluation
FFS.
7e61f3f3ff87235057f609e496a8620d
33.785
6.12 Solution #11: Security of UE connection setup with Data Collection NF using TLS
7e61f3f3ff87235057f609e496a8620d
33.785
6.12.1 Introduction
This solution addresses Key Issue #1 "Security of UE connection setup with Data Collection NF".
7e61f3f3ff87235057f609e496a8620d
33.785
6.12.2 Solution details
This solution proposes that the security between the UE and the Data Collection NF is based on TLS. TLS is a well-established security protocol at the transport layer and provides authentication, confidentiality, integrity and replay protection. Authentication of the Data Collection NF towards the UE can be based on ...
7e61f3f3ff87235057f609e496a8620d
33.785
6.12.3 Evaluation
Editor's note: Evaluation is FFS.
7e61f3f3ff87235057f609e496a8620d
33.785
7 Conclusions
Editor’s note: This clause captures the conclusions of this study. Annex A: Change history Change history Date Meeting TDoc CR Rev Cat Subject/Comment New version 2025-08 SA3#123 S3-253064 S3-252564, S3-252988, S3-252990 for endorsed TR skeleton, overview and new key issue 0.0.0 2025-10 SA3#...
d3002a76697e4bc670268c4c89d2da07
33.786
1 Scope
The present document has the following objectives: • Identify and study the authentication and authorization aspects for AIMLE services specified in TS 23.482 [3]. • Study the solutions to address the identified scenarios to support AIMLE service security. NOTE 1: For the above objectives existing SEAL se...