1
Scope
2 References
3 Definitions
3.1 Terms defined
elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
6.1 Use case description
6.2 Security considerations
7 Security architecture
7.1 Authentication model
7.2 Network elements
7.3 Reference points
7.4 Requirements for
authentication information
7.5 Key structure
8 Authentication procedures
8.1 Authentication
procedures overview
8.2 Entity initial
authentication procedure
8.3 Entity
re-authentication procedure
8.4 Authentication
inquiring procedure with key generation
8.5 Mutual authentication
procedure between SS and SP
9 Overall
authentication procedures
Appendix I – Some examples of entity authentication procedure
I.1 HTTP digest AKA
used in 3GPP
I.2 HTTP digest AKA used in 3GPP2
I.3 TLS-Cert based
authentication mechanism
I.4 Authentication
procedure based on public key certificate authentication mechanism
I.5 Authentication
procedure based on a biometric authentication mechanism
Appendix II – Examples of mutual authentication between SS and
SP
II.1 Standardized cases
II.2 Other possible cases
Appendix III – Key lifetime
Appendix IV – Mapping of the reference points to those in
3GPP/3GPP2
Bibliography