5G Cyber Security

  1. Identity, Authentication, and Authorization
    1. Subscriber Identity Management
      1. Subscription Permanent Identifier (SUPI)
        1. SUPI Format and Storage
          1. Protection of SUPI in Transmission
            1. SUPI Privacy Protection
            2. Subscription Concealed Identifier (SUCI)
              1. SUCI Generation and Usage
                1. Cryptographic Protection of SUCI
                  1. Public Key Infrastructure for SUCI
                  2. Privacy Considerations for Subscriber Identity
                    1. Preventing Identity Exposure
                      1. Regulatory Compliance for Privacy
                        1. Identity Correlation Prevention
                      2. 5G Authentication and Key Agreement (5G-AKA)
                        1. Mutual Authentication Process
                          1. Authentication Steps and Message Flow
                            1. Protection Against Replay Attacks
                              1. Authentication Vector Generation
                              2. Key Hierarchy and Derivation
                                1. Master Key Management
                                  1. Session Key Generation and Distribution
                                    1. Key Separation and Isolation
                                    2. Protection Against Linkability Attacks
                                      1. Use of Temporary Identifiers
                                        1. Randomization Techniques
                                          1. Unlinkability Mechanisms
                                          2. Enhanced Authentication Features
                                            1. Anti-Bidding Down Protection
                                              1. Sequence Number Management
                                                1. Authentication Failure Handling
                                              2. Extensible Authentication Protocol (EAP) Framework
                                                1. EAP-AKA Prime
                                                  1. Protocol Overview
                                                    1. Security Enhancements over EAP-AKA
                                                      1. Key Derivation Functions
                                                      2. EAP-TLS
                                                        1. Certificate-Based Authentication
                                                          1. Mutual Authentication Process
                                                            1. Certificate Management
                                                            2. EAP Method Selection
                                                              1. Method Negotiation
                                                                1. Security Considerations
                                                              2. Authentication of Non-3GPP Access
                                                                1. Trusted Non-3GPP Access Networks
                                                                  1. Security Requirements for Trusted Access
                                                                    1. Integration with 5G Core
                                                                      1. Trust Establishment Procedures
                                                                      2. Untrusted Non-3GPP Access Networks
                                                                        1. Secure Tunneling Mechanisms
                                                                          1. Threats from Untrusted Access Points
                                                                            1. Security Gateway Functions
                                                                            2. Non-3GPP Interworking Function (N3IWF)
                                                                              1. Role and Security Functions
                                                                                1. Secure Communication with 5G Core
                                                                                  1. IPSec Tunnel Management
                                                                                2. Device Identity and Attestation
                                                                                  1. Device Certificate Management
                                                                                    1. Certificate Provisioning
                                                                                      1. Certificate Validation
                                                                                        1. Certificate Revocation
                                                                                        2. Hardware Security Modules
                                                                                          1. Secure Element Integration
                                                                                            1. Trusted Platform Modules
                                                                                              1. Hardware Root of Trust