1
Scope
1.1 Relationship
2 References
3 Abbreviations
4 Security Requirements for
Authentication Interworking
5 Network architecture for access
authentication interworking in NGN
6 Authentication protocols based
on EAP-AKA for heterogeneous access authentication
7 Security considerations
Appendix I – Example authentication in heterogeneous
environments
I.1 Example using
EAP-AKA with UICC authentication mechanism
I.2 Example using EAP-AKA
based on a password and the Diffie-Hellman algorithm
I.3 Example of fast
re-authentication procedure
Bibliography