1
Scope
2 References
3 Terms and Definitions
3.1 Terms defined
elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Home network architecture
6.1 General model
6.2 Service architecture
for user authentication
7 Classification of home entities
for user authentication
8 Consideration for user
authentication between home entities
8.1 Remote terminal (RT)
and application server (AS)
8.2 Remote terminal (RT)
and secure home gateway (SHG)
8.3 Remote terminal (RT)
and home application server (HAS)
8.4 Remote terminal (RT)
and type A device (HD_A)
8.5 Remote terminal (RT)
and type B device (HD_B)
8.6 Remote terminal (RT)
and type C device (HD_C)
8.7 Type A device (HD_A)
and application server (AS)
8.8 Type A device (HD_A)
and secure home gateway (SHG)
8.9 Type A device (HD_A)
and home application server (HAS)
8.10 Type A device (HD_A)
and type B device (HD_B)
8.11 Type A device (HD_A)
and type C device (HD_C)
9 Security threats and security
requirements for user authentication mechanisms
9.1 Security threats
9.2 Resistance against
security threats
9.3 Security requirements
10 User authentication mechanism
10.1 Scope of user
authentication mechanism
10.2 Security components of
the user authentication mechanism
10.3 Set-up for the user
authentication mechanism
10.4 Required security services for
user authentication between home entities
10.5 Security association
10.6 Security assurance
level
10.7 Protection level of
SALs
10.8 Authentication models
10.9 Relationship between
SAL and home network security requirement
Appendix I – Security association used in IPsec
Appendix II – Existing authentication
mechanisms
Bibliography