1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of security for the IMT-2020 communication system
6.1 Simplified IMT-2020 architecture
6.2 General architecture of IMT-2020 system
6.3 Domains of IMT-2020 system
6.4 General security requirements and capabilities
7 Components and trustworthiness of the IMT-2020 communication system
7.1 IMT-2020 components
7.2 Trustworthiness of the IMT-2020 communication system
8 Threats to components and functions
8.1 Generic threats
8.2 Threats to user equipment
8.3 Threats to access networks
8.4 Threats to software-defined networking
8.5 Threats to core network
8.6 Threats to network slicing
8.7 Threats to multiaccess edge computing
8.8 Threats to network function virtualization
8.9 Threats to management
9 Requirements for security capabilities related to components and
functions
9.1 Security capabilities related to user equipment
9.2 Security capabilities related to access network
9.3 Security capabilities related to software-defined networking
9.4 Security capabilities related to core network
9.5 Security capabilities related to network slicing
9.6 Security capabilities related to multiaccess edge computing
9.7 Security capabilities related to network function
virtualization
9.8 Security capabilities related to management function
Annex A – Security architecture for IMT-2020 communication system
Appendix I – Generic network security architecture for providing end-to-end
network security
Appendix II – Threat of service disruption from a manipulated radio resource
control (RRC) connection request and its capability
II.1 Overview
II.2 Attack scenario
II.3 Consequence
II.4 Countermeasures
Bibliography