4 Architecture for AKMA
33.5353GPPAuthentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)Release 17TS
4.1 Reference model
Figure 4.1-1 shows a fundamental network model of AKMA, as well as the interfaces between them.
Figure 4.1-1: Fundamental Network Model for AKMA
NOTE: Figure 4.1-1 shows the case where AAnF is deployed as a standalone function. Deployments can choose to collocate AAnF with AUSF or with NEF according to operators’ deployment scenarios.
Figure 4.1-2 shows the AKMA architecture using the reference point representation.
Figure 4.1-2: AKMA Architecture in reference point representation for (a) internal AFs and (b) external AFs
The AKMA service requires a new logical entity, called the AKMA Anchor Function (AAnF).
4.2 Network elements
4.2.1 AAnF
The AAnF is the anchor function in the HPLMN. The AAnF stores the AKMA Anchor Key (KAKMA) and SUPI for AKMA service, which is received from the AUSF after the UE completes a successful 5G primary authentication. The AAnF also generates the key material to be used between the UE and the Application Function (AF) and maintains UE AKMA contexts. The AAnF sends SUPI of the UE to AF located inside the operator’s network according to the AF request or sends to NEF.
4.2.2 AF
The AF is defined in TS 23.501 [3] with additional functions:
– AF with the AKMA service enabling requests for AKMA Application Key, called KAF, from the AAnF using A-KID.
– AF shall be authenticated and authorized by the operator network before providing the KAF to the AF.
– The AF located inside the operator’s network performs the AAnF selection.
4.2.3 NEF
The NEF is defined in TS 23.501 [3] with additional functions:
– The NEF enables and authorizes the external AF assessing AKMA service and forwards the request towards the AAnF.
– The NEF performs the AAnF selection.
4.2.4 AUSF
The AUSF is defined in TS 23.501 [3] with additional functions:
– AUSF provides the SUPI and AKMA key material (A-KID,KAKMA) of the UE to the AAnF.
– AUSF performs the AAnF selection.
4.2.5 UDM
The UDM is defined in TS 23.501 [3] with the additional functions:
– UDM stores AKMA subscription data of the subscriber.
4.3 AKMA Service Based Interfaces(SBIs)
4.3.0 General
The following interfaces are involved in AKMA network architecture:
– Nnef: Service-based interface exhibited by NEF.
– Nudm: Service-based interface exhibited by UDM.
NOTE 1: UDM services related to AKMA service are defined in TS 33.501 [2] clause 14.2.2.
– Naanf: Service-based interface exhibited by AAnF.
The AAnF interacts with the AUSF and the AF using Service-based Interfaces. When the AF is located in the operator’s network, the AAnF shall use Service-Based Interface to communicate with the AF directly. When the AF is located outside the operator’s network, the NEF shall be used to exchange the messages between the AF and the AAnF.
4.3.1 Void
4.4 Security requirements and principles for AKMA
4.4.0 General
The following security requirements are applicable to AKMA:
– AKMA shall reuse the same UE subscription and the same credentials used for 5G access.
– AKMA shall reuse the 5G primary authentication procedure and methods specified in TS 33.501 [2] for the sake of implicit authentication for AKMA services.
– The SBA interface between the AAnF and the AUSF shall be confidentiality, integrity and replay protected.
– The SBA interface between AAnF and AF/NEF shall be confidentiality, integrity and replay protected.
– The AKMA Application Key (KAF) shall be provided with a maximum lifetime.
NOTE: Roaming aspects are not considered in the present document.
4.4.1 Requirements on Ua* reference point
The Ua* reference point is application specific. The generic requirements for Ua* are:
– Ua* protocol shall be able to carry AKMA Key Identifier (A-KID) .
– The UE and the AKMA AF shall be able to secure the reference point Ua* using the AKMA Application Key derived from the AKMA Anchor Key.
NOTE 1: The exact method of securing the reference point Ua* depends on the application protocol used over reference point Ua*.
NOTE 2: Void
– The Ua* protocol shall be able to handle the expiration of KAF.
4.4.2 Requirements on AKMA Key Identifier (A-KID)
Requirements for AKMA Key Identifier (A-KID) are:
– A-KID shall be globally unique.
– A-KID shall be usable as a key identifier in protocols used in the reference point Ua*.
– AKMA AF shall be able to identify the AAnF serving the UE from the A-KID.
4.4.3 Requirements on the UE
The requirements on the UE are:
– Applications on the UE shall not be able to get access to KAKMA.
– An application on the UE shall only get the KAF keys related to specific AF Identifiers (AF_IDs) that the application is authorized to get.
– An application on the UE shall not be able to get access to the KAF keys that belong to other applications.
NOTE: How these requirements are satisfied is out of scope of 3GPP.
4.5 AKMA reference points
The AKMA architecture reuses the following reference point from the 5GC for the execution of the primary authentication procedure:
N1: Reference point between the UE and the AMF.
N2: Reference point between the (R)AN and the AMF.
N12: Reference point between AMF and AUSF.
N13: Reference point between the UDM and the AUSF.
N33: Reference point between NEF and an external AF.
The AKMA architecture defines the following reference points:
N61: Reference point between the AAnF and the AUSF.
N62: Reference point between the AAnF and an internal AF.
N63: Reference point between the AAnF and NEF.
Ua*: Reference point between the UE and an AF.
NOTE: The reference point Ua* carries the application protocol, which is secured using the key material agreed between UE and AAnF as a result of successful AKMA procedures.