Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview of security for the IMT-2020 communication system          
        6.1     Simplified IMT-2020 architecture        
        6.2     General architecture of IMT-2020 system        
        6.3     Domains of IMT-2020 system
        6.4     General security requirements and capabilities             
 7     Components and trustworthiness of the IMT-2020 communication system  
        7.1     IMT-2020 components            
        7.2     Trustworthiness of the IMT-2020 communication system         
 8     Threats to components and functions           
        8.1     Generic threats           
        8.2     Threats to user equipment    
        8.3     Threats to access networks    
        8.4     Threats to software-defined networking          
        8.5     Threats to core network          
        8.6     Threats to network slicing       
        8.7     Threats to multiaccess edge computing            
        8.8     Threats to network function virtualization       
        8.9     Threats to management          
 9     Requirements for security capabilities related to components and functions
        9.1     Security capabilities related to user equipment            
        9.2     Security capabilities related to access network              
        9.3     Security capabilities related to software-defined networking  
        9.4     Security capabilities related to core network  
        9.5     Security capabilities related to network slicing               
        9.6     Security capabilities related to multiaccess edge computing    
        9.7     Security capabilities related to network function virtualization
        9.8     Security capabilities related to management function
Annex A – Security architecture for IMT-2020 communication system    
Appendix I – Generic network security architecture for providing end-to-end network security    
Appendix II – Threat of service disruption from a manipulated radio resource control (RRC) connection request and its capability    
       II.1     Overview        
       II.2     Attack scenario             
       II.3     Consequence
       II.4     Countermeasures       
Bibliography