CONTENTS

 

 1     Scope 
 2     References 
 3     Terms and Definitions      
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Home network architecture          
        6.1     General model       
        6.2     Service architecture for user authentication 
 7     Classification of home entities for user authentication         
 8     Consideration for user authentication between home entities          
        8.1     Remote terminal (RT) and application server (AS)  
        8.2     Remote terminal (RT) and secure home gateway (SHG)     
        8.3     Remote terminal (RT) and home application server (HAS)  
        8.4     Remote terminal (RT) and type A device (HD_A)  
        8.5     Remote terminal (RT) and type B device (HD_B)   
        8.6     Remote terminal (RT) and type C device (HD_C)  
        8.7     Type A device (HD_A) and application server (AS)           
        8.8     Type A device (HD_A) and secure home gateway (SHG)  
        8.9     Type A device (HD_A) and home application server (HAS)           
       8.10     Type A device (HD_A) and type B device (HD_B)          
       8.11     Type A device (HD_A) and type C device (HD_C)          
 9     Security threats and security requirements for user authentication mechanisms        
        9.1     Security threats      
        9.2     Resistance against security threats  
        9.3     Security requirements         
10     User authentication mechanism    
       10.1     Scope of user authentication mechanism    
       10.2     Security components of the user authentication mechanism 
       10.3     Set-up for the user authentication mechanism         
       10.4     Required security services for user authentication between home entities     
       10.5     Security association          
       10.6     Security assurance level    
       10.7     Protection level of SALs   
       10.8     Authentication models       
       10.9     Relationship between SAL and home network security requirement           
Appendix I – Security association used in IPsec     
Appendix II – Existing authentication mechanisms     
Bibliography