Overview on the security in 5G phase 2

被引:0
作者
Henda N.B. [1 ]
机构
[1] Ericsson, Torshamnsgatan 23, Stockholm
来源
Journal of ICT Standardization | 2019年 / 8卷 / 01期
关键词
3GPP; 5G; Privacy; Security;
D O I
10.13052/jicts2245-800X.811
中图分类号
学科分类号
摘要
During the early development stages of the 5G specifications by 3GPP, it was quickly identified that it is not possible to address all the use cases of the 5G System within the normal Release timeframe. Therefore, it was decided to split the work in two phases. The 5G Phase 1 work focused on the foundation of the new system while 5G Phase 2 focused more on the needed enhancements to address the use cases. The work on the security in 5G Phase 1 was ample enough to deliver all the needed mechanisms not only to secure the communication between the different entities but also to protect the privacy of the user. Therefore, it is expected that the work on 5G Phase 2 will unlikely have impact on the security mechanisms. Nevertheless, some of the new features in 5G Phase 2 give rise to subtle security challenges which may require enhancements to the existing mechanisms. In this article, we consider some of the 5G Phase 2 features and shed light on such security aspects. © 2020 the Author(s). All rights reserved.
引用
收藏
页码:1 / 14
页数:13
相关论文
共 20 条
  • [1] Service requirements for next generation new services and markets
  • [2] Rupprecht D., Kohls K., Holz T., Popper C., Breaking LTE on Layer Two" 'Designing power-efficient WDM ring networks, 2019 IEEE Symposium on Security and Privacy (SP), (2019)
  • [3] Aboba B., Blunk L., Vollbrecht J., Carlson J., Levkowetz H., IETF, (2004)
  • [4] Security architecture and procedures for 5G System
  • [5] Prasad A. R., Arumugam S., Sheeba B., Zugenmaier A., 3GPP 5G Security, Journal of ICT, 6, 1&2, pp. 137-158, (2018)
  • [6] Study on authentication and key management for applications based on 3GPP credential in 5G
  • [7] Authentication and key management for applications based on 3GPP credentials in the 5G System (5GS)
  • [8] Generic Authentication Architecture (GAA)
  • [9] Generic Bootstrapping Architecture (GBA)
  • [10] Niemi A., Arkko J., Torvinen V., IETF, (2002)