CONTENTS

 1     Scope 
        1.1     Relationship           
 2     References 
 3     Abbreviations   
 4     Threats on access networks         
 5     Conventions     
 6     Security requirements for access networks           
 7     Signalling protocol architecture for authentication  
        7.1     Basic authentication model 
        7.2     EAP-based authentication architecture in access networks  
        7.3     EAP authentication model  
        7.4     Integrated authentication model in NGN     
        7.5     Authentication scenarios based on network architecture      
Bibliography