Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System

The fifth-generation mobile network (5G) integrates various application services in a heterogeneous network environment. Compared to the traditional networks, 5G is not just an extension of the 4th generation, which contains three important properties, enhanced mobile broadband (eMBB), massive machine type communications (mMTC), and ultra-reliable and low latency communications (URLLC). 5G applies the functionalities of Network Function Virtualization and Software-Defined Networking to support multiple services and proposes a new concept called Network Slicing. Users can access different services quickly in the 5G network supported by network slicing. In a traditional network like 4G, if a user wants to access different services, it will be necessary to perform different authentication procedures that cause additional burden and operation cost in the user’s device. However, the 5G network inherits the previous network architecture. Hence, the user’s device still needs to be authenticated by the core network. Besides, providing a guarantee of connecting to a correct network slice is one of the prime concerns. The paper presents an authentication scheme tailored for the 5G network. In the proposed scheme, the authentication is decentralized to the edge clouds to achieve low latency. Moreover, the authentication flow is no longer attached to the operator all the time to reduce time latency. The proposed scheme is secure against the attackers who aim to impersonate users, network operators, or even network slices, and it also provides secure session key exchange. Empirical performance assessment in terms of its functionalities gains better acceptability of the proposed scheme than other existing ones.

[1]  Noel Crespi,et al.  Authentication and Access Control for 5G , 2020 .

[2]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[3]  Wei-Tsung Su,et al.  A survey of performance improvement by group-based authentication in IoT , 2016, 2016 International Conference on Applied System Innovation (ICASI).

[4]  Victor Shoup,et al.  A Proposal for an ISO Standard for Public Key Encryption , 2001, IACR Cryptol. ePrint Arch..

[5]  M. Scott Implementing cryptographic pairings , 2007 .

[6]  Shanay Behrad Slice specific authentication and access control for 5G. (Authentification et contrôle d'accès spécifique aux slices pour 5G) , 2020 .

[7]  Jianhong Zhou,et al.  A Hybrid Authentication Protocol for LTE/LTE-A Network , 2019, IEEE Access.

[8]  Noël Crespi,et al.  Network Access Control for the IoT: A Comparison Between Cellular, Wi-Fi and LoRaWAN , 2019, 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).

[9]  Günther Horn,et al.  Towards 5G Security , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[10]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[11]  Keith M. Martin,et al.  On the Efficacy of New Privacy Attacks against 5G AKA , 2019, ICETE.

[12]  Xuemin Shen,et al.  SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.

[13]  Jin Cao,et al.  PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks , 2019, Ad Hoc Networks.

[14]  Roger Piqueras Jover,et al.  The current state of affairs in 5G security and the main remaining security challenges , 2019, ArXiv.

[15]  Xiaodong Lin,et al.  Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.

[16]  IMT Vision – Framework and overall objectives of the future development of IMT for 2020 and beyond M Series Mobile , radiodetermination , amateur and related satellite services , 2015 .

[17]  Security challenges and opportunities for 5 G mobile networks , 2017 .

[18]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[19]  Sudipta Chattopadhyay,et al.  An improved authentication and security scheme for LTE/LTE-A networks , 2020, J. Ambient Intell. Humaniz. Comput..

[20]  Ralf Sasse,et al.  A Formal Analysis of 5G Authentication , 2018, CCS.

[21]  Rosario Giustolisi,et al.  Threats to 5G Group-based Authentication , 2016, SECRYPT.

[22]  Sihem Mesnager,et al.  A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems , 2016, IACR Cryptol. ePrint Arch..

[23]  Narendra S. Chaudhari,et al.  PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks , 2019, Peer-to-Peer Networking and Applications.