Token-Based Authentication Framework for 5G MEC Mobile Networks

被引:9
|
作者
Niewolski, Wojciech [1 ]
Nowak, Tomasz W. [1 ]
Sepczuk, Mariusz [1 ]
Kotulski, Zbigniew [1 ]
机构
[1] Warsaw Univ Technol, Inst Telecommun, Nowowiejska 15-19, PL-00665 Warsaw, Poland
关键词
5G mobile networks; MEC; access control; 5G MEC security architecture; MEC Enabler; JWT; ACCESS-CONTROL; SECURITY; SCHEME; ARCHITECTURE; PRIVACY;
D O I
10.3390/electronics10141724
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
MEC technology provides a distributed computing environment in 5G mobile networks for application and service hosting. It allows customers with different requirements and professional competencies to use the services offered by external suppliers. We consider a service access control framework on 5G MEC networks that is efficient, flexible, and user-friendly. Its central element is the MEC Enabler, which handles AAA requests for stakeholders accessing services hosted on the edge servers. The JSON Web Token (JWT) open standard is a suitable tool for the MEC Enabler to manage access control credentials and transfer them securely between parties. In this paper, in the context of access control, we propose the token reference pattern called JSON MEC Access Token (JMAT) and analyze the effectiveness of its available protection methods in compliance with the standard requirements of MEC-hosted services in 5G networks.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Token-Based Lightweight Authentication to Secure IoT Networks
    Dammak, Maissa
    Boudia, Omar Rafik Merad
    Messous, Mohamed Ayoub
    Senouci, Sidi Mohammed
    Gransart, Christophe
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [2] Token-based Authentication for Smartphones
    Koschuch, Manuel
    Hudler, Matthias
    Eigner, Hubert
    Saffer, Zsolt
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING (DCNET 2013), 2013, : 49 - 54
  • [3] MEC Architectures in 4G and 5G Mobile Networks
    Zhang, Jianmin
    Wu, Zhouyun
    Xie, Weiliang
    Yang, Fengyi
    2018 10TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2018,
  • [4] Token-based graphical password authentication
    John Charles Gyorffy
    Andrew F. Tappenden
    James Miller
    International Journal of Information Security, 2011, 10 : 321 - 336
  • [5] Token-based graphical password authentication
    Gyorffy, John Charles
    Tappenden, Andrew F.
    Miller, James
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (06) : 321 - 336
  • [6] Token-based authentication for Hadoop platform
    Haggag, Mohamed
    Tantawy, Mohsen M.
    El-Soudani, Magdy M. S.
    AIN SHAMS ENGINEERING JOURNAL, 2023, 14 (04)
  • [7] Management Optimization of Mobile Edge Computing (MEC) in 5G Networks
    Wang, Zhi
    Cai, Yigang
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
  • [8] General Multimedia Trust Authentication Framework for 5G Networks
    Xing, Ling
    Ma, Qiang
    Wu, Honghai
    Xie, Ping
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [9] Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks
    Cui, Hui
    Yang, Xuechao
    Yang, Wencheng
    Qin, Baodong
    Yi, Xun
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (04): : 2347 - 2357
  • [10] Blockchain-based Authentication for 5G Networks
    Haddad, Zaher
    Fouda, Mostafa M.
    Mahmoud, Mohamed
    Abdallah, Mohamed
    2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020, 2020, : 189 - 194