Authentication mechanisms in the 5G system

被引:0
|
作者
Huang X. [1 ]
Yoshizawa T. [2 ]
Baskaran S.B.M. [3 ]
机构
[1] China Mobile Research Institute, Beijing
[2] ESAT, COSIC, KU Leuven, Kasteelpark Arenberg 10 Bus 2452, Leuven
[3] Lenovo, Motorola Mobility, Oberursel
来源
Journal of ICT Standardization | 2021年 / 9卷 / 02期
关键词
5G; 5G security; AKMA; Primary authentication; Secondary authentication; Slice authentication;
D O I
10.13052/jicts2245-800X.921
中图分类号
学科分类号
摘要
The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of ‘authentication’ has expanded. This is a new trend in the 5G system as it introduces new concepts that did not exist in the preceding generation systems. One such example is the slice authentication for which the authentication is performed at the network slice level. As a result, the authentication mechanisms become more complex. This paper clarifies the details of each of these different authentication mechanisms. © 2021 the Author(s). All rights reserved.
引用
收藏
页码:61 / 78
页数:17
相关论文
共 50 条
  • [41] An Enhanced Cross-Network-Slice Authentication Protocol for 5G
    Yadav, Awaneesh Kumar
    Wijethilaka, Shalitha
    Braeken, An
    Misra, Manoj
    Liyanage, Madhusanka
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2023, 8 (04): : 555 - 573
  • [42] New Media Identity Authentication and Traffic Optimization in 5G network
    Zhao, Yanling
    Zhang, Xinchang
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 1331 - 1334
  • [43] Survey on authentication and security protocols and schemes over 5G networks
    Tashtoush, Yahya
    Darweesh, Dirar
    Karajeh, Ola
    Darwish, Omar
    Maabreh, Majdi
    Swedat, Safa'
    Koraysh, Rawan
    Almousa, Omar
    Alsaedi, Nasser
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (10):
  • [44] A new authentication and key agreement protocol for 5G wireless networks
    Tian Liu
    Fan Wu
    Xiong Li
    Chaoyang Chen
    Telecommunication Systems, 2021, 78 : 317 - 329
  • [45] Fast and Efficient Physical Layer Authentication for 5G HetNet Handover
    Ma, Ting
    Hu, Feng
    Ma, Maode
    2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 269 - 271
  • [46] Device authentication for 5G terminals via Radio Frequency fingerprints
    Dong, Ping
    Hou, Namin
    Tang, Yuting
    Cheng, Yushi
    Ji, Xiaoyu
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (04):
  • [47] CRC-Based Message Authentication for 5G Mobile Technology
    Dubrova, Elena
    Naslund, Mats
    Selander, Goran
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1186 - 1191
  • [48] A Fast and Secure Uniform Handover Authentication Scheme for 5G HetNets
    Ozhelvaci, Alican
    Ma, Maodess
    INTELLIGENT HUMAN COMPUTER INTERACTION, IHCI 2020, PT II, 2021, 12616 : 119 - 131
  • [49] Efficient privacy protection authentication protocol for vehicle network in 5G
    Zhang, Guixian
    Zhao, Xiaoyu
    Chen, Menglu
    Ma, Shuyi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022,
  • [50] Practical and secure multifactor authentication protocol for autonomous vehicles in 5G
    Miao, Junfeng
    Wang, Zhaoshun
    Ning, Xin
    Xiao, Nan
    Cai, Weiwei
    Liu, Ruimin
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (10): : 1852 - 1869