§Alternatives explored
□Core as a 1609.2 CA
▪Would
require establishing CA hierarchy among Cores, additional
system security requirements
□Core as a 1609.2 RA
▪Led to
complex arrangements, unclear if privacy could be preserved
□Core as CA and RA
▪Potential exposure of mobile user
identity