Table of Contents

Declaration .................................................................................................................................................... i
Acknowledgement ....................................................................................................................................... ii
Glossary ................................................................................................................................................... iii-iv
List of Abbreviations .................................................................................................................................... v
Table of Use cases and clusters .................................................................................................................. vi
Company Overview ...................................................................................................................................... 1
Chapter 1 Introduction ................................................................................................................................. 2
Chapter 2 Identity Management ............................................................................................................ 3-15
2.1 Actors .................................................................................................................................................. 3
2.2 Use Cases ............................................................................................................................................ 4
2.2.1 Use Case 1.1: Factory Device Identity Management for 5G Access ........................................... 4

2.2.1.1 Introduction ......................................................................................................................... 4
2.2.1.2 Preconditions ........................................................................................................................ 4
2.2.1.3 Description ........................................................................................................................... 5
2.2.1.4 Properties of Solution .......................................................................................................... 6
2.2.2 Use Case 1.2: Using Enterprise Identity Management for Bootstrapping 5G Access ................. 7

2.2.2.1 Introduction ......................................................................................................................... 7
2.2.2.2 Description ........................................................................................................................... 7
2.2.2.3 Properties of Solution .......................................................................................................... 9
2.2.3 Use Case 1.3: Satellite Identity Management for 5G Access ....................................................... 9

2.2.3.1 Introduction .......................................................................................................................... 9

2.2.3.2 Preconditions ........................................................................................................................ 9

2.2.3.3 Descriptions .......................................................................................................................... 9

2.2.3.4 Properties of Solution ......................................................................................................... 13

2.2.4 Use Case 1.4: MNO Identity Management Service.................................................................... 13

2.2.4.1 Introduction ........................................................................................................................ 13

.........................................................................................................................................1.....................................................................1 Precondition.........3........ 18 3............3........3..4.......2...... 13 2.......................................2..............1: Device Identity Privacy .................................................................... 17 3........ 18 3..........3...........................................2 Description ..............................3.................................4 Properties of Solution ......... 20 3........................................................2 Preconditions .3 Vulnerabilities and Consequences ................................. 16 3....................................................................3...........................3.....2: Subscriber Identity Privacy......................1........ 22 ................... 20 3.......................................................................1 Use Case 2................ 16 3....................................................................................... 18 3....3..........4 Properties of Solution .............................4.2 Description ...................... 17 3..............................................................................................1..........................2 Description .................................................................... 16 3................................................3 Use Cases ..................................... 16 3..................................4 Properties of Solution ................................................... 21 References ....3 Vulnerabilities and Consequences .........3............................................3................3 Use Case 2.........................................................1 Precondition.....................................2..... 13 2...................2.....................................................................................................................2 Use Case 2..................................................3.............................. 20 3.. 19 3.................................................4 Properties of Solution .....................2 Actors .....................................................3........................ 16 3...............................................................3................................................................3........................................................................................................3............................................... 19 3......2......................................... 16 3..............3 Vulnerabilities and Consequences ...................................3 5G Vision ...............................1...............3.....................................................................2.........3...................................................3: Enhanced Communication Privacy .......................................................................................3............... 15 Chapter 3 Enhanced Identity Protection and Authentication ..2..................... 2...........................4............ 20 3... 15 2.....4 5G Vision ......................................1 Introduction ........1 Precondition.................................................................................................................3............................................................................ 16-21 3.........3 Description ................ 20 3....................