3GPP Wi-Fi Access

The standard way of integrating Wi-Fi with cellular core networks

TRUSTED & UNTRUSTED

3GPP Options for Wi-Fi Access

In this section, we will cover all 3GPP Wi-Fi Access (non-3GPP Access) architectures and two widely adopted alternatives for Wi-Fi offloading: Local WLAN Breakout (LBO) and Access Through DPI. Although these two methods are not part of the official 3GPP specifications, we include them to provide a comprehensive overview and ensure an easy comparison of all available offloading approaches.

The 3GPP specifications define two types of non-3GPP access: trusted and untrusted. Non-3GPP access includes technologies such as Wi-Fi, WiMAX, fixed-line, and CDMA networks.

In the following sections, we will explore the differences between trusted and untrusted 3GPP Wi-Fi Access and the various 3GPP standard methods for integrating these access types with cellular networks across different cellular generations (3G/4G/5G). We will only focus on 4G and 5G as the methods for 3G are essentially the same as for 4G, only with different names on the 3GPP nodes.

The numerous acronyms introduced with each new 3GPP release can be overwhelming and confusing. We’ve provided a ‘ translation table ‘ to assist those of you already familiar with the terminology for 3G, 4G, or 5G.

3GPP Access Acronyms

Please note that these are simply ‘functions’ that may be delivered as a combined solution with one or more nodes, deployed as containerized functions, or integrated into the same virtual or physical gateway node.

Trusted 3GPP Wi-Fi Access integrates seamlessly with secure 802.1x or Passpoint-enabled Wi-Fi networks, using SIM-based authentication (EAP-SIM/AKA/AKA′/5G-AKA) as the preferred method for secure access. SIM Authentication is also involved in establishing the device IPsec tunnel for untrusted 3GPP Wi-Fi Access.

the why & how of

Wi-Fi Offloading

Download our white papers now.

Why? : An overview of the business benefits for mobile network operators (MNOs).

How?: A deep technical dive into successfully deploying a Wi-Fi offloading solution.

Download our white papers Wi-Fiu Offloading Why? and How?

Use the tabs below to learn more about trusted and untrusted non-3GPP access and how the standards support cellular and Wi-Fi convergence for 4G and 5G networks. Under the 5G Standalone tab, you will also find more information about Access Traffic Steering, Switching, and Splitting (ATSSS).

 

Below we will explain the practical principles behind trusted and untrusted 3GPP Wi-Fi access.

Trusted 3GPP Wi-Fi Access

3GPP Wi-Fi Access Trusted

Trusted non-3GPP (Wi-Fi) access was first introduced with the LTE standard in 3GPP Release 8 (2008). Trusted access typically refers to operator-managed Wi-Fi networks that use encryption (enabled by 802.1x) within the Wi-Fi radio access network (RAN) and secure authentication methods like EAP.

In the case of trusted access, the user device (UE) connects through a Wireless Access Gateway (WAG/TWAG/TNGF/TWIF) in the Wi-Fi core. The gateway, in turn, establishes a secure tunnel directly with the Packet Gateway (GGSN/P-GW/UPF), which is also used for cellular traffic in the Mobile Core. For 5G standalone (5G SA) architectures, a null-encrypted tunnel is utilized between the device and the TNGF/TWIF—more details on this can be found in the Wi-Fi and 5G convergence section.

SIM authentication (EAP-SIM/AKA/AKA′ or 5G-AKA), performed by a 3GPP AAA server, is crucial for trusted non-3GPP access. Beyond authenticating, the device for access to the Wi-Fi network, it also generates cryptographic keys used for the Wi-Fi encryption (WPA2/WPA3).

 

Untrusted 3GPP Wi-Fi Access

3GPP untrusted Wi-Fi Access

Untrusted non-3GPP (Wi-Fi) access was first introduced in the Wi-Fi specification of 3GPP Release 6 (2005). At that time, Wi-Fi access points with advanced security features were uncommon, so Wi-Fi was generally considered open and unsecured by default.

Untrusted access refers to any Wi-Fi network over which the operator has no control, including public hotspots, subscribers’ home Wi-Fi, and corporate Wi-Fi networks. This also encompasses Wi-Fi networks that lack adequate security mechanisms, such as EAP authentication and radio link encryption (802.1x enabling WPA2/WPA3 encryption). Conversely, a Wi-Fi network using EAP and 802.1x outside the operator’s control, for instance, an Enterprise Wi-Fi network, is still considered untrusted.

The flexibility of untrusted non-3GPP access, which works over any Wi-Fi network, makes it the preferred method for services like Wi-Fi Calling (aka Voice over Wi-Fi).

The untrusted model requires no modifications to the Wi-Fi network itself but does impact the device side, as an IPsec client must be deployed natively on the device. The device connects through a secure IPsec tunnel directly to an IPsec Termination Gateway (TTG/ePDG/N3IWF) in the Mobile Core, which is then linked through an encrypted tunnel to the Packet Gateway (GGSN/P-GW/UPF). This Packet Gateway handles both cellular and Wi-Fi traffic.

On the core network side, this integration means that the 3GPP AAA server must interface with mobile core network components like the HLR/HSS/AUSF-UDM for SIM-based EAP authentication (EAP-SIM/AKA/AKA′ or 5G-AKA) to establish the IPsec tunnel, but not for granting Wi-Fi access. This ensures the same level of authentication security as in the cellular network.

  • People from all over the world will flock to Brazil to celebrate the World Cup and Olympics. The ability to offload mobile data to Wi-Fi will ease network congestion significantly and increase data speeds, for an exceptional user experience.
    Rafael Marques
    Marketing Director at TIM Intelig