Security among UPFs belonging to Different 5G/B5G/6G Networks

被引:1
|
作者
Hsiao, Liang-Sheng [1 ]
Tsai, Kun-Lin [2 ]
Liu, Jung-Chun [1 ]
Leu, Fang-Yie [1 ]
Lu, Yu-Syuan [3 ]
Lin, I-Long [1 ]
机构
[1] Tatung Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Tunghai Univ, Elect Engn Dept, Taichung 40704, Taiwan
[3] Tunghai Univ, Comp Sci Dept, Taichung 40704, Taiwan
关键词
5G/B5G/6G; Edge Computer; Symmetric/Asymmetric Cryptography; n-party Cryptography; Initial Key Agreement;
D O I
10.1007/s10796-024-10510-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, 5G/B5G/6G networks (5G for short) have been gloriously developed to give us colorful lives and make our daily activities more convenient than before. On the other hand, online meetings, like video conferences and online educations, have been popularly held everywhere in the world. Nevertheless, in such a meeting on 5G networks, a packet P transmitted from a User Plane Function (UPF), e.g., UPF1 of a 5G, e.g., 5G(1), to P's destinations, e.g., the set {UPF2, UPF3, . . .UPFn}, respectively, in {5G(2), 5G(3), . . .5G(n)}, is not secure, even not encrypted, particularly when P goes through the Internet. Hackers may duplicate P, i.e., data leakage on the connections among these UPFs. The situation needs to be avoided when data of the meetings ought not to be leaked, e.g., for an important military conference. Therefore, in this study, we propose a security architecture, named Group Key using IKA (GKIKA), which encrypts/decrypt packets before sending them, e.g., EC1 in 5G(1) encrypts P and then sends P's ciphertext which will be decrypted by edge computers {EC2, EC3, . . .ECn} where ECj is in 5G(j), 2 <= j <= n. Our security scenarios include data transmission among n-parties, n >= 2. When n = 2, symmetric or asymmetric cryptography is adopted depending on the security level and time constraints required. As n > 2, the Initial Key Agreement (IKA) is utilized to establish a secret key for all participating ECs. Other security mechanisms, like message authentication code and time stamp, are also utilized to enhance the security level of data transmission. Our analyses show that the GKIKA can effectively avoid some types of attacks.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Positioning in 5G and 6G Networks-A Survey
    Mogyorosi, Ferenc
    Revisnyei, Peter
    Pasic, Azra
    Papp, Zsofia
    Toros, Istvan
    Varga, Pal
    Pasic, Alija
    SENSORS, 2022, 22 (13)
  • [22] Software Defined 5G and 6G Networks: a Survey
    Qingyue Long
    Yanliang Chen
    Haijun Zhang
    Xianfu Lei
    Mobile Networks and Applications, 2022, 27 : 1792 - 1812
  • [23] Software Defined 5G and 6G Networks: a Survey
    Long, Qingyue
    Chen, Yanliang
    Zhang, Haijun
    Lei, Xianfu
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (05): : 1792 - 1812
  • [24] LICENSED AND UNLICENSED SPECTRUM FOR FUTURE 5G/B5G WIRELESS NETWORKS
    Mumtaz, Shahid
    Jamalipour, Abbas
    Gacanin, Haris
    Rayes, Ammar
    Ashraf, Muhammad Ikram
    Ting, Rulei
    Zhang, Di
    IEEE NETWORK, 2019, 33 (04): : 6 - 8
  • [25] Intelligent Network Slicing for B5G and 6G: Resource Allocation, Service Provisioning, and Security
    Wang, Jiadai
    Li, Yuanhao
    Liu, Jiajia
    Kato, Nei
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (03) : 271 - 277
  • [26] Licensed and Unlicensed Spectrum for Future 5G/B5G Wireless Networks
    Mumtaz, Shahid
    Jamalipour, Abbas
    Gacanin, Haris
    Rayes, Ammar
    Ashraf, Muhammad Ikram
    Ting, Rulei
    Zhang, Di
    IEEE Network, 2019, 33 (04): : 6 - 8
  • [27] Special Issue on Reconfigurable Intelligent Surface for B5G & 6G
    Zhu, Zhengyu
    Pan, Cunhua
    Wu, Qingqing
    Di Renzo, Marco
    Swindlehurst, A. Lee
    Zhao, Yajun
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2022, 24 (05) : 513 - 517
  • [28] B5G/6G通信的IRS技术综述
    李刚
    王瑜新
    章秀银
    陈真
    陈艺戬
    窦建武
    杨军
    陆海涛
    电子技术应用, 2021, 47 (06) : 1 - 5+9
  • [29] Broadcast/multicast delivery integration in B5G/6G environments
    Landrove, Orlando
    Cabrera, Rufino
    Iradier, Eneko
    Jimenez, Erick
    Angueira, Pablo
    Montalban, Jon
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 230
  • [30] From 5G to 6G: Technologies, Architecture, AI, and Security
    Mitra, Rupendra Nath
    Rong, Bo
    Yarali, Abdulrahman
    IEEE WIRELESS COMMUNICATIONS, 2023, 30 (06) : 6 - 6