Authentication mechanisms in the 5G system

被引:0
|
作者
Huang X. [1 ]
Yoshizawa T. [2 ]
Baskaran S.B.M. [3 ]
机构
[1] China Mobile Research Institute, Beijing
[2] ESAT, COSIC, KU Leuven, Kasteelpark Arenberg 10 Bus 2452, Leuven
[3] Lenovo, Motorola Mobility, Oberursel
来源
Journal of ICT Standardization | 2021年 / 9卷 / 02期
关键词
5G; 5G security; AKMA; Primary authentication; Secondary authentication; Slice authentication;
D O I
10.13052/jicts2245-800X.921
中图分类号
学科分类号
摘要
The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of ‘authentication’ has expanded. This is a new trend in the 5G system as it introduces new concepts that did not exist in the preceding generation systems. One such example is the slice authentication for which the authentication is performed at the network slice level. As a result, the authentication mechanisms become more complex. This paper clarifies the details of each of these different authentication mechanisms. © 2021 the Author(s). All rights reserved.
引用
收藏
页码:61 / 78
页数:17
相关论文
共 50 条
  • [1] AKMA: Delegated Authentication System of 5G
    Khan, Mohsin
    Ginzboorg, Philip
    Niemi, Valtteri
    IEEE Communications Standards Magazine, 2021, 5 (03): : 56 - 61
  • [2] A Formal Analysis of 5G Authentication
    Basin, David
    Dreier, Jannik
    Hirschi, Lucca
    Radomirovic, Sasa
    Sasse, Ralf
    Stettler, Vincent
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1383 - 1396
  • [3] 5G Authentication and Key Management for Applications
    Huang, Xiaoting
    Tsiatsis, Vlasios
    Palanigounder, Anand
    Su, Li
    Yang, Bo
    IEEE Communications Standards Magazine, 2021, 5 (02): : 142 - 148
  • [4] Formal verification of secondary authentication protocol for 5G secondary authentication
    Edris E.K.K.
    Aiash M.
    Loo J.K.-K.
    Alhakeem M.S.
    International Journal of Security and Networks, 2021, 16 (04): : 223 - 234
  • [5] A Vulnerability in 5G Authentication Protocols and Its Countermeasure
    Hu, Xinxin
    Liu, Caixia
    Liu, Shuxin
    Li, Jinsong
    Cheng, Xiaotao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (08) : 1806 - 1809
  • [6] Intelligent authentication of 5G healthcare devices: A survey
    Sodhro, Ali Hassan
    Awad, Ali Ismail
    van de Beek, Jaap
    Nikolakopoulos, George
    INTERNET OF THINGS, 2022, 20
  • [7] Blockchain-based Authentication for 5G Networks
    Haddad, Zaher
    Fouda, Mostafa M.
    Mahmoud, Mohamed
    Abdallah, Mohamed
    2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020, 2020, : 189 - 194
  • [8] Threats to 5G Group-based Authentication
    Giustolisi, Rosario
    Gehrmann, Christian
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 360 - 367
  • [9] An Efficient Authentication Protocol for 5G Heterogeneous Networks
    El Hajjaji El Idrissi, Younes
    Zahid, Noureddine
    Jedra, Mohamed
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 496 - 508
  • [10] 5G Security Artifacts (DoS / DDoS and Authentication)
    Javed, M. Awais
    Niazi, Sohaib Khan
    2019 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2019, : 127 - 133