1 Scope
2 Introduction
3
Specification conventions
4
Terms and definitions
5
Abbreviations and symbols
6
References
6.1 Normative references
6.2 Non-normative references
7
Security requirements and constraints for mobility
8
Hop-by-hop security with symmetric cryptographic techniques
8.1 Assumptions
8.2 Secure location updating
procedures
8.2.1 MT to V-GK
8.2.2 V-GK to MRP
8.2.3 MRP to V-BE
8.2.4 V-BE to H-BE
8.2.5 H-BE to MRP
8.2.6 MRP to AuF
8.3 Terminal authentication
8.4 Unregistration
8.5 Application of the symmetric
security protocol in the home domain
8.6 List of Object Identifiers
9
End-to-end security