|
Work item:
|
XSTR.sec-Dba-eSIM
|
|
Subject/title:
|
Technical Report: Security considerations for DLT-based authentication of IoT devices with eSIM
|
|
Status:
|
Under study
|
|
Approval process:
|
Agreement
|
|
Type of work item:
|
Technical report
|
|
Version:
|
New
|
|
Equivalent number:
|
-
|
|
Timing:
|
2027-10 (Medium priority)
|
|
Liaison:
|
GSMA, W3C, 3GPP
|
|
Supporting members:
|
China Telecom; China Mobile; Pengcheng Laboratory
|
|
Summary:
|
As the application scenarios for Internet of Things (IoT) increase, user identities will carry more attributes. Traditional IoT identity authentication mainly relies on centralized authentication schemes, which depends on third trusted parties such as Certificate Authorities (CAs) and authentication servers. As a distributed ledger technology, blockchain has gained significant attention in recent years as a decentralized solution for autonomous IoT identity management.
Traditional SIM cards are limited by specific geographical regions and can only represent a single identity attribute, which is insufficient to meet the future demands for massive connectivity in IoT. In contrast, eSIM devices, with their advantages of small size and excellent convenience, can save space in IoT terminal devices. They also offer the benefits of remote flexible configuration and efficient management, making them promising for widespread adoption in IoT scenarios. The application of eSIM in IoT can transform device connectivity, which addresses the physical limitations and operational challenges of traditional SIM cards and also brings new opportunities for the development of ubiquitous connectivity in IoT.
The proposed Technical Report provides security considerations for the DLT-based authentication of IoT devices with eSIM to authenticate various identities of users. It includes the analysis of security threats, considerations and the procedure of authentication. The proposed Technical Report will serve as a valuable guide for IoT systems, ensuring the safety of various identities accessing IoT.
|
|
Comment:
|
-
|
|
Reference(s):
|
|
|
Historic references:
|
|
Contact(s):
|
|
| ITU-T A.5 justification(s): |
|
|
|
|
First registration in the WP:
2025-12-10 14:23:45
|
|
Last update:
2025-12-11 09:31:29
|
|