This page is being moved to a new, faster, and mobile-friendly application! Access the enhanced and centralized experience now on MyWorkspace.
ITU's 160 anniversary

Connecting the world and beyond

  •  

ITU-T work programme

[2025-2028] : [SG17] : [Q6/17]

[Declared patent(s)]  - [Associated work]

Work item: XSTR.sec-Dba-eSIM
Subject/title: Technical Report: Security considerations for DLT-based authentication of IoT devices with eSIM
Status: Under study 
Approval process: Agreement
Type of work item: Technical report
Version: New
Equivalent number: -
Timing: 2027-10 (Medium priority)
Liaison: GSMA, W3C, 3GPP
Supporting members: China Telecom; China Mobile; Pengcheng Laboratory
Summary: As the application scenarios for Internet of Things (IoT) increase, user identities will carry more attributes. Traditional IoT identity authentication mainly relies on centralized authentication schemes, which depends on third trusted parties such as Certificate Authorities (CAs) and authentication servers. As a distributed ledger technology, blockchain has gained significant attention in recent years as a decentralized solution for autonomous IoT identity management. Traditional SIM cards are limited by specific geographical regions and can only represent a single identity attribute, which is insufficient to meet the future demands for massive connectivity in IoT. In contrast, eSIM devices, with their advantages of small size and excellent convenience, can save space in IoT terminal devices. They also offer the benefits of remote flexible configuration and efficient management, making them promising for widespread adoption in IoT scenarios. The application of eSIM in IoT can transform device connectivity, which addresses the physical limitations and operational challenges of traditional SIM cards and also brings new opportunities for the development of ubiquitous connectivity in IoT. The proposed Technical Report provides security considerations for the DLT-based authentication of IoT devices with eSIM to authenticate various identities of users. It includes the analysis of security threats, considerations and the procedure of authentication. The proposed Technical Report will serve as a valuable guide for IoT systems, ensuring the safety of various identities accessing IoT.
Comment: -
Reference(s):
  Historic references:
-
Contact(s):
Yu JIANG, Editor
Xiang LIU, Editor
Qianran WANG, Editor
Junzhi YAN, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2025-12-10 14:23:45
Last update: 2025-12-11 09:31:29