Token-Based Authentication Framework for 5G MEC Mobile Networks

被引:9
作者
Niewolski, Wojciech [1 ]
Nowak, Tomasz W. [1 ]
Sepczuk, Mariusz [1 ]
Kotulski, Zbigniew [1 ]
机构
[1] Warsaw Univ Technol, Inst Telecommun, Nowowiejska 15-19, PL-00665 Warsaw, Poland
关键词
5G mobile networks; MEC; access control; 5G MEC security architecture; MEC Enabler; JWT; ACCESS-CONTROL; SECURITY; SCHEME; ARCHITECTURE; PRIVACY;
D O I
10.3390/electronics10141724
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
MEC technology provides a distributed computing environment in 5G mobile networks for application and service hosting. It allows customers with different requirements and professional competencies to use the services offered by external suppliers. We consider a service access control framework on 5G MEC networks that is efficient, flexible, and user-friendly. Its central element is the MEC Enabler, which handles AAA requests for stakeholders accessing services hosted on the edge servers. The JSON Web Token (JWT) open standard is a suitable tool for the MEC Enabler to manage access control credentials and transfer them securely between parties. In this paper, in the context of access control, we propose the token reference pattern called JSON MEC Access Token (JMAT) and analyze the effectiveness of its available protection methods in compliance with the standard requirements of MEC-hosted services in 5G networks.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Trust Management Framework for Containerized Workloads Applications to 5G Networks
    Miloudi, Aicha
    Suarez, Luis
    Cuppens, Nora Boulahia
    Cuppens, Frederic
    Preda, Stere
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 378 - 393
  • [22] Secure Federated Learning in 5G Mobile Networks
    Isaksson, Martin
    Norrman, Karl
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [23] Token Based Privacy Preserving and Authentication Technique for Wireless Mobile Networks
    Fatahpour, Saman
    2018 4TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2018, : 155 - 161
  • [24] Authentication and Access Control in 5G Device-to-Device Communication
    Panicker, Jithu Geevargheese
    Salehi, Ahmad S.
    Rudolph, Carsten
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1575 - 1582
  • [25] Security and QoS framework for 5G and Next Generation Mobile Broadband Networks
    Shuminoski, T.
    Janevski, T.
    Risteski, A.
    Bogdanoski, M.
    17TH IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES - IEEE EUROCON 2017 CONFERENCE PROCEEDINGS, 2017, : 104 - 109
  • [26] Modelling and Analysis of 5G Networks Based on MEC-NFV for URLLC Services
    de Souza, Caio B. B.
    Falcao, Marcos R. M.
    Balieiro, Andson M.
    Dias, Kelvin L.
    IEEE LATIN AMERICA TRANSACTIONS, 2021, 19 (10) : 1745 - 1753
  • [27] A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks
    Abdel-Malek, Mai A.
    Akkaya, Kemal
    Bhuyan, Arupjyoti
    Ibrahim, Ahmed S.
    IEEE ACCESS, 2022, 10 : 57485 - 57498
  • [28] Modelling and analysis of 5G networks based on MEC-NFV for URLLC Services
    Souza C.
    Falcao M.
    Balieiro A.
    Dias K.
    1745, IEEE Computer Society (19): : 1745 - 1753
  • [29] Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach
    Herbst, Jan
    Rueb, Matthias
    Sanon, Sogo Pierre
    Lipps, Christoph
    Schotten, Hans D.
    NETWORK, 2024, 4 (02): : 133 - 149
  • [30] A lightweight authentication scheme for 5G mobile communications: a dynamic key approach
    Pothumarti, Raghu
    Jain, Kurunandan
    Krishnan, Prabhakar
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,