�1���� Scope����������
�2���� References
�3���� Definitions
������� 3.1���� Terms defined elsewhere�������
������� 3.2���� Terms defined in this Recommendation�����������
�4���� Abbreviations and acronyms�������������
�5���� Conventions������������
�6���� Overview of security for the IMT-2020 communication system����������
������� 6.1���� Simplified IMT-2020 architecture��������
������� 6.2���� General architecture of IMT-2020 system��������
������� 6.3���� Domains of IMT-2020 system
������� 6.4���� General security requirements and capabilities�������������
�7���� Components and trustworthiness of the IMT-2020 communication system��
������� 7.1���� IMT-2020 components������������
������� 7.2���� Trustworthiness of the IMT-2020 communication system���������
�8���� Threats to components and functions�����������
������� 8.1���� Generic threats�����������
������� 8.2���� Threats to user equipment����
������� 8.3���� Threats to access networks����
������� 8.4���� Threats to software-defined networking����������
������� 8.5���� Threats to core network����������
������� 8.6���� Threats to network slicing�������
���� ���8.7���� Threats to multiaccess edge computing������������
������� 8.8���� Threats to network function virtualization�������
������� 8.9���� Threats to management����������
�9���� Requirements for security capabilities related to components and
functions
������� 9.1���� Security capabilities related to user equipment������������
������� 9.2���� Security capabilities related to access network��������������
������� 9.3���� Security capabilities related to software-defined networking��
������� 9.4���� Security capabilities related to core network��
������� 9.5���� Security capabilities related to network slicing���������������
������� 9.6���� Security capabilities related to multiaccess edge computing����
������� 9.7���� Security capabilities related to network function
virtualization
������� 9.8���� Security capabilities related to management function
Annex A � Security architecture for IMT-2020 communication system����
Appendix I � Generic network security architecture for providing end-to-end
network security����
Appendix II � Threat of service disruption from a manipulated radio resource
control (RRC) connection request and its capability����
������ II.1���� Overview��������
������ II.2���� Attack scenario�������������
������ II.3���� Consequence
������ II.4���� Countermeasures�������
Bibliography����