CONTENTS

 1     Scope
 
2     Introduction
 3     Specification conventions
 4     Terms and definitions
 5     Abbreviations and symbols
 6     References
        6.1     Normative references
        6.2     Non-normative references
 7     Security requirements and constraints for mobility
 8     Hop-by-hop security with symmetric cryptographic techniques
        8.1     Assumptions
        8.2     Secure location updating procedures
                  8.2.1     MT to V-GK
                  8.2.2     V-GK to MRP
                  8.2.3     MRP to V-BE
                  8.2.4     V-BE to H-BE
                  8.2.5     H-BE to MRP
                  8.2.6     MRP to AuF
        8.3     Terminal authentication
        8.4     Unregistration
        8.5     Application of the symmetric security protocol in the home domain
        8.6     List of Object Identifiers
 9     End-to-end security