Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System

被引:28
作者
Fan, Chun-, I [1 ,2 ,3 ]
Shih, Yu-Tse [1 ]
Huang, Jheng-Jia [4 ]
Chiu, Wan-Ru [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
[2] Natl Sun Yat Sen Univ, Informat Secur Res Ctr, Kaohsiung 804, Taiwan
[3] Natl Sun Yat Sen Univ, Intelligent Elect Commerce Res Ctr, Kaohsiung 804, Taiwan
[4] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106335, Taiwan
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 01期
关键词
5G mobile communication; Authentication; Network slicing; Security; Heterogeneous networks; Cloud computing; Switches; 5G; network slicing; edge computing; low latency;
D O I
10.1109/TNSM.2021.3052208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fifth-generation mobile network (5G) integrates various application services in a heterogeneous network environment. Compared to the traditional networks, 5G is not just an extension of the 4th generation, which contains three important properties, enhanced mobile broadband (eMBB), massive machine type communications (mMTC), and ultra-reliable and low latency communications (URLLC). 5G applies the functionalities of Network Function Virtualization and Software-Defined Networking to support multiple services and proposes a new concept called Network Slicing. Users can access different services quickly in the 5G network supported by network slicing. In a traditional network like 4G, if a user wants to access different services, it will be necessary to perform different authentication procedures that cause additional burden and operation cost in the user's device. However, the 5G network inherits the previous network architecture. Hence, the user's device still needs to be authenticated by the core network. Besides, providing a guarantee of connecting to a correct network slice is one of the prime concerns. The paper presents an authentication scheme tailored for the 5G network. In the proposed scheme, the authentication is decentralized to the edge clouds to achieve low latency. Moreover, the authentication flow is no longer attached to the operator all the time to reduce time latency. The proposed scheme is secure against the attackers who aim to impersonate users, network operators, or even network slices, and it also provides secure session key exchange. Empirical performance assessment in terms of its functionalities gains better acceptability of the proposed scheme than other existing ones.
引用
收藏
页码:701 / 712
页数:12
相关论文
共 30 条
[1]  
[Anonymous], 2018, 23247 3GPP TS
[2]  
[Anonymous], 2019, OVERVIEW 3GPP 5G SEC
[3]  
[Anonymous], 2017, REP
[4]  
[Anonymous], 2015, IMT VISION FRAMEWORK
[5]  
[Anonymous], 2017, 33899 3GPP
[6]   A Formal Analysis of 5G Authentication [J].
Basin, David ;
Dreier, Jannik ;
Hirschi, Lucca ;
Radomirovic, Sasa ;
Sasse, Ralf ;
Stettler, Vincent .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :1383-1396
[7]  
Behrad S., 2020, AUTHENTICATION ACCES, P1
[8]  
Behrad S., 2020, THESIS I POLYTECHNIQ
[9]  
Behrad S, 2019, CONF INNOV CLOUD, P195, DOI [10.1109/ICIN.2019.8685884, 10.1109/icin.2019.8685884]
[10]   Threats to 5G Group-based Authentication [J].
Giustolisi, Rosario ;
Gehrmann, Christian .
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, :360-367