Authentication mechanisms in the 5G system

被引:0
|
作者
Huang X. [1 ]
Yoshizawa T. [2 ]
Baskaran S.B.M. [3 ]
机构
[1] China Mobile Research Institute, Beijing
[2] ESAT, COSIC, KU Leuven, Kasteelpark Arenberg 10 Bus 2452, Leuven
[3] Lenovo, Motorola Mobility, Oberursel
来源
Journal of ICT Standardization | 2021年 / 9卷 / 02期
关键词
5G; 5G security; AKMA; Primary authentication; Secondary authentication; Slice authentication;
D O I
10.13052/jicts2245-800X.921
中图分类号
学科分类号
摘要
The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of ‘authentication’ has expanded. This is a new trend in the 5G system as it introduces new concepts that did not exist in the preceding generation systems. One such example is the slice authentication for which the authentication is performed at the network slice level. As a result, the authentication mechanisms become more complex. This paper clarifies the details of each of these different authentication mechanisms. © 2021 the Author(s). All rights reserved.
引用
收藏
页码:61 / 78
页数:17
相关论文
共 10 条
  • [1] Formal verification of secondary authentication protocol for 5G secondary authentication
    Edris E.K.K.
    Aiash M.
    Loo J.K.-K.
    Alhakeem M.S.
    International Journal of Security and Networks, 2021, 16 (04): : 223 - 234
  • [2] Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network
    Gong, Seonghyeon
    El Azzaoui, Abir
    Cha, Jeonghun
    Park, Jong Hyuk
    APPLIED SCIENCES-BASEL, 2020, 10 (02):
  • [3] An SM9-Based Secondary Authentication Framework for 5G Technology
    Wang, Rui
    Liu, Xin
    Liu, Donglan
    Zhang, Hao
    Ma, Lei
    Wang, Yong
    Liu, Han
    Chen, Jianfei
    Li, Zhenghao
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (06)
  • [4] USIM in 5G Era
    Pauliac M.
    Journal of ICT Standardization, 2019, 8 (01): : 29 - 40
  • [5] Design of Secure Authentication Handover Protocol for Innovative Mobile Multimedia Services in 5G MEC Environments
    Kim, Jiyoon
    Han, Dong-Guk
    You, Ilsun
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (06): : 1245 - 1261
  • [6] Privacy Preserving AKMA in 5G
    Khan, Mohsin
    Ginzboorg, Philip
    Niemi, Valtteri
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), 2019, : 45 - 56
  • [7] 5G-Compliant Authentication Protocol for RFID
    Munilla, Jorge
    Hassan, Adel
    Burmester, Mike
    ELECTRONICS, 2020, 9 (11) : 1 - 15
  • [8] Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol
    Edris, Ed Kamya Kiyemba
    Aiash, Mandi
    Loo, Jonathan Kok-Keng
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 256 - 261
  • [9] A 5G-based Authentication Framework for V2X Communication
    Magalhaes, Diana
    Ferreira, Vinicius C.
    Rodrigues, Nelson
    Fernandes, Joao M.
    2023 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING, CSCN, 2023, : 385 - 385
  • [10] AKMA for Secure Multi-access Edge Computing Mobility in 5G
    Akman, Gizem
    Ginzboorg, Philip
    Niemi, Valtteri
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2022 WORKSHOPS, PART IV, 2022, 13380 : 432 - 449