1
Scope
1.1
Relationship
2 References
3 Abbreviations
4 Threats
on access networks
5 Conventions
6 Security
requirements for access
networks
7 Signalling
protocol architecture for authentication
7.1
Basic authentication model
7.2
EAP-based authentication architecture in access
networks
7.3
EAP authentication model
7.4
Integrated authentication model in
NGN
7.5
Authentication scenarios based on network
architecture
Bibliography