Authentication mechanisms in the 5G system

被引:0
|
作者
Huang X. [1 ]
Yoshizawa T. [2 ]
Baskaran S.B.M. [3 ]
机构
[1] China Mobile Research Institute, Beijing
[2] ESAT, COSIC, KU Leuven, Kasteelpark Arenberg 10 Bus 2452, Leuven
[3] Lenovo, Motorola Mobility, Oberursel
来源
Journal of ICT Standardization | 2021年 / 9卷 / 02期
关键词
5G; 5G security; AKMA; Primary authentication; Secondary authentication; Slice authentication;
D O I
10.13052/jicts2245-800X.921
中图分类号
学科分类号
摘要
The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of ‘authentication’ has expanded. This is a new trend in the 5G system as it introduces new concepts that did not exist in the preceding generation systems. One such example is the slice authentication for which the authentication is performed at the network slice level. As a result, the authentication mechanisms become more complex. This paper clarifies the details of each of these different authentication mechanisms. © 2021 the Author(s). All rights reserved.
引用
收藏
页码:61 / 78
页数:17
相关论文
共 50 条
  • [31] Secure and effective authentication for 5G networks (SEA-5G) using blockchain
    R. Bala
    R. Manoharan
    Journal of Ambient Intelligence and Humanized Computing, 2025, 16 (1) : 51 - 66
  • [32] 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy
    You, Ilsun
    Kim, Gunwoo
    Shin, Seonghan
    Kwon, Hoseok
    Kim, Jongkil
    Baek, Joonsang
    SENSORS, 2024, 24 (01)
  • [33] 5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks
    Xiao, Yuelei
    Wu, Yang
    INFORMATION, 2022, 13 (03)
  • [34] 5G K-Simulator: 5G System Simulator for Performance Evaluation
    Kim, Yongjae
    Bae, Jimin
    Lim, Jinteak
    Park, Eunhye
    Baek, Jaeuk
    Han, Sang Ik
    Chu, Chol
    Han, Youngnam
    2018 IEEE INTERNATIONAL SYMPOSIUM ON DYNAMIC SPECTRUM ACCESS NETWORKS (DYSPAN), 2018,
  • [35] 5G System Level Simulation Calibration Using MATLAB 5G Toolbox
    Xue, Yu
    Zhai, Yuxiao
    Sousa, Elvino
    Li, Wei
    Zhang, Liang
    Hong, Zhihong
    Wu, Yiyan
    2022 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2022,
  • [36] Cloud Native 5G: an Efficient Orchestration of Cloud Native 5G System
    Khichane, Abderaouf
    Fajjari, Ilhem
    Aitsaadi, Nadjib
    Gueroui, Mourad
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [37] Location based Authentication Service using 4G/5G Devices
    Nisar, Farhan
    2019 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2019, : 120 - 126
  • [38] A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    Sahoo, Kshira Sagar
    Daneshmand, Mahmoud
    Gandomi, Amir H.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (17) : 15087 - 15099
  • [39] An Agreement Graph-Based-Authentication Scheme for 5G Networks
    Gharam, Maroua
    Boudriga, Noureddine
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 509 - 520
  • [40] A Blockchain-Based User Identity Authentication Method for 5G
    Tu, Zhe
    Zhou, Huachun
    Li, Kun
    Song, Haoxiang
    Wang, Weilin
    MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 335 - 351