Table of Contents

 1     Scope          
 2     References               
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Security requirements for mobility in NGN 
        5.1     Security threats            
        5.2     Security requirements               
 6     Security capabilities supported by relevant function entities              
        6.1     Transport user profile functional entity (TUP-FE)           
        6.2     Transport authentication and authorization functional entity (TAA-FE)
        6.3     Mobile location management functional entity (MLM-FE)         
        6.4     Handover decision control functional entity (HDC-FE) 
        6.5     Network information distribution functional entity (NID-FE)    
        6.6     Access management functional entity (AM-FE)              
        6.7     Layer3 handover execute function (L3HEF)      
        6.8     Access node functional entity (AN-FE)               
 7     Key management and authentication           
        7.1     Key management framework
        7.2     Authentication              
 8     Establishment of security context   
        8.1     Security context transfer between serving AM-FE and target AM-FE   
        8.2     Security context transfer between serving AR-FE and target AR-FE      
        8.3     Security context transfer between UE and HDC-FE       
 9     IP mobility security
        9.1     Host-based mobility security  
        9.2     Network-based mobility security          
10     Security between UE and HDC-FE  
       10.1     Host-initiated security association establishment between UE and HDC-FE      
       10.2     Network-initiated security association establishment between UE and HDC-FE             
       10.3     Security association pre-establishment between UE and HDC-FE based on PKI              
11     Security between UE and NID-FE   
       11.1     Host-initiated security association establishment between UE and NID-FE       
       11.2     Network-initiated security association establishment between UE and NID-FE              
       11.3     Security association establishment between UE and NID-FE based on PKI        
12     Security for transport functions      
       12.1     Security between UE and access node function entity               
       12.2     Security between UE and L3HEF (Layer3 Handover Execute Function)
Appendix I    
        I.1     Example of full authentication procedure          
        I.2     Example of fast re-authentication procedure   
        I.3     Example of host-based mobility             
Bibliography