Authentication mechanisms in the 5G system

被引:0
|
作者
Huang X. [1 ]
Yoshizawa T. [2 ]
Baskaran S.B.M. [3 ]
机构
[1] China Mobile Research Institute, Beijing
[2] ESAT, COSIC, KU Leuven, Kasteelpark Arenberg 10 Bus 2452, Leuven
[3] Lenovo, Motorola Mobility, Oberursel
来源
Journal of ICT Standardization | 2021年 / 9卷 / 02期
关键词
5G; 5G security; AKMA; Primary authentication; Secondary authentication; Slice authentication;
D O I
10.13052/jicts2245-800X.921
中图分类号
学科分类号
摘要
The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of ‘authentication’ has expanded. This is a new trend in the 5G system as it introduces new concepts that did not exist in the preceding generation systems. One such example is the slice authentication for which the authentication is performed at the network slice level. As a result, the authentication mechanisms become more complex. This paper clarifies the details of each of these different authentication mechanisms. © 2021 the Author(s). All rights reserved.
引用
收藏
页码:61 / 78
页数:17
相关论文
共 50 条
  • [21] An Efficient Handover Authentication Mechanism for 5G Wireless Network
    Han, Kaihong
    Ma, Maode
    Li, Xiaohong
    Feng, Zhiyong
    Hao, Jianye
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [22] Secure Authentication Protocol for 5G Enabled IoT Network
    Sharma, Suraj
    Satapathy, Shaswat
    Singh, Shivani
    Sahu, Amiya Kumar
    Obaidat, Mohammad S.
    Saxena, Sanjay
    Puthal, Deepak
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 621 - 626
  • [23] A Security Enhanced 5G Authentication Scheme for Insecure Channel
    Hu, Xinxin
    Liu, Caixia
    Liu, Shuxin
    Cheng, Xiaotao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (03): : 711 - 713
  • [24] A Fault Tolerant Mechanism for UE Authentication in 5G Networks
    Leu, Fang-Yie
    Tsai, Kun-Lin
    Susanto, Heru
    Gu, Cheng-Yan
    You, Ilsun
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1650 - 1667
  • [25] General Multimedia Trust Authentication Framework for 5G Networks
    Xing, Ling
    Ma, Qiang
    Wu, Honghai
    Xie, Ping
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [26] A Fault Tolerant Mechanism for UE Authentication in 5G Networks
    Fang-Yie Leu
    Kun-Lin Tsai
    Heru Susanto
    Cheng-Yan Gu
    Ilsun You
    Mobile Networks and Applications, 2021, 26 : 1650 - 1667
  • [27] A Blockchain-Based Authentication Scheme for 5G Applications
    Ren, Lanfang
    Huang, Xiaoting
    Zhou, Huachun
    Yang, Bo
    Su, Li
    MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 155 - 168
  • [28] Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain
    Liu, Jian
    Huang, Chin-Tser
    30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [29] 5G-SSAAC: Slice-specific Authentication and Access Control in 5G
    Behrad, Shanay
    Bertin, Emmanuel
    Tuffin, Sephane
    Crespi, Noel
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2019), 2019, : 281 - 285
  • [30] A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
    Bedari, Aseel
    Wang, Song
    Yang, Wencheng
    SENSORS, 2022, 22 (19)