CONTENTS

 

 1     Scope 
        1.1     Relationship           
 2     References 
 3     Abbreviations   
 4     Security Requirements for Authentication Interworking     
 5     Network architecture for access authentication interworking in NGN        
 6     Authentication protocols based on EAP-AKA for heterogeneous access authentication     
 7     Security considerations    
Appendix I – Example authentication in heterogeneous environments     
        I.1        Example using EAP-AKA with UICC authentication mechanism   
        I.2        Example using EAP-AKA based on a password and the Diffie-Hellman algorithm 
        I.3        Example of fast re-authentication procedure          
Bibliography