Table of Contents
1Scope
2Introduction
3Specificationconventions
4Termsanddefinitions
5Abbreviationsandsymbols
6References
6.1Normativereferences
6.2Non-normativereferences
7Securityrequirementsandconstraintsformobility
8Hop-by-hopsecuritywithsymmetriccryptographictechniques
8.1Assumptions
8.2Securelocationupdatingprocedures
8.2.1MTtoV-GK
8.2.2V-GKtoMRP
8.2.3MRPtoV-BE
8.2.4V-BEtoH-BE
8.2.5H-BEtoMRP
8.2.6MRPtoAuF
8.3Terminalauthentication
8.4Unregistration
8.5Applicationofthesymmetricsecurityprotocolin
thehomedomain
8.6ListofObjectIdentifiers
9End-to-endsecurity Abstract
Describe security procedures for an H.323 multimedia mobility environment. This Recommendation provides the details about the security procedures for H.510.