A Survey on Security Aspects for 3GPP 5G Networks

With the continuous development of mobile communication technologies, Third Generation Partnership Project (3GPP) has proposed related standards with the fifth generation mobile communication technology (5G), which marks the official start of the evolution from the current Long Term Evolution (LTE) system to the next generation mobile communication system (5GS). This paper makes a large number of contributions to the security aspects of 3GPP 5G networks. Firstly, we present an overview of the network architecture and security functionality of the 3GPP 5G networks. Subsequently, we focus on the new features and techniques including the support of massive Internet of Things (IoT) devices, Device to Device (D2D) communication, Vehicle to Everything (V2X) communication, and network slice, which incur the huge challenges for the security aspects in 3GPP 5G networks. Finally, we discuss in detail the security features, security requirements or security vulnerabilities, existing security solutions and some open research issues about the new features and techniques in 3GPP 5G network.

[1]  Yukihiko Okumura,et al.  Cell selection scheme for handover reduction based on moving direction and velocity of UEs for 5G multi-layered radio access networks , 2018, 2018 International Conference on Information Networking (ICOIN).

[2]  Jing Yang,et al.  A physical-layer authentication scheme based on hash method , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).

[3]  Min Zuo,et al.  Toward a Secure Access to 5G Network , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[4]  Maode Ma,et al.  A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V , 2018, KSII Trans. Internet Inf. Syst..

[5]  Jin Cao,et al.  EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks , 2018, J. Netw. Comput. Appl..

[6]  Jere Backman,et al.  Blockchain network slice broker in 5G: Slice leasing in factory of the future use case , 2017, 2017 Internet of Things Business Models, Users, and Networks.

[7]  Dong Min Kim,et al.  An Enhanced Access Reservation Protocol With a Partial Preamble Transmission Mechanism in NB-IoT Systems , 2017, IEEE Communications Letters.

[8]  Antonios Argyriou,et al.  Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..

[9]  Po-Kai Huang,et al.  Energy efficient and scalable device-to-device discovery protocol with fast discovery , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[10]  William Whyte,et al.  A Security Credential Management System for V2X Communications , 2018, IEEE Transactions on Intelligent Transportation Systems.

[11]  Elisa Bertino,et al.  Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information , 2019, NDSS.

[12]  Jin Cao,et al.  Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network , 2019, IEEE Internet of Things Journal.

[13]  Xiaodong Lin,et al.  A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.

[14]  Aiqing Zhang,et al.  Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems , 2017, IEEE Transactions on Information Forensics and Security.

[15]  Mujahid Muhammad,et al.  Survey on existing authentication issues for cellular-assisted V2X communication , 2018, Veh. Commun..

[16]  Younghwan Yoo,et al.  Handover cell selection using user mobility information in a 5G SDN-based network , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).

[17]  Yinghui Zhang,et al.  Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks , 2017, Mob. Inf. Syst..

[18]  Hong Wen,et al.  Physical Layer Security Assisted 5G Network Security , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[19]  Bharat K. Bhargava,et al.  Adaptable Safety and Security in V2X Systems , 2017, 2017 IEEE International Congress on Internet of Things (ICIOT).

[20]  Aleksandr Ometov,et al.  Multi-factor authentication: A survey and challenges in V2X applications , 2017, 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).

[21]  Gaoxiang Zhang,et al.  Security in Use Cases of Vehicle-to-Everything Communications , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[22]  Maode Ma,et al.  An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks , 2018, Wirel. Commun. Mob. Comput..

[23]  Walid Abdallah,et al.  Access control in 5G communication networks using simple PKI certificates , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[24]  Rose Qingyang Hu,et al.  Security for 5G Mobile Wireless Networks , 2018, IEEE Access.

[25]  Günther Horn,et al.  Towards 5G Security , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[26]  Paul G. Spirakis,et al.  Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[27]  Weidang Lu,et al.  Small-Cell Assisted Secure Traffic Offloading for Narrowband Internet of Thing (NB-IoT) Systems , 2018, IEEE Internet of Things Journal.

[28]  Gaurang Naik,et al.  Coexistence of Wireless Technologies in the 5 GHz Bands: A Survey of Existing Solutions and a Roadmap for Future Research , 2018, IEEE Communications Surveys & Tutorials.

[29]  Amita Jain,et al.  5G: Evolution of a secure mobile technology , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[30]  Noël Crespi,et al.  Securing authentication for mobile networks, a survey on 4G issues and 5G answers , 2018, 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).

[31]  Valentin Rakovic,et al.  Visions Towards 5G: Technical Requirements and Potential Enablers , 2016, Wirel. Pers. Commun..

[32]  Arnaud Kaiser,et al.  On the Performance Evaluation of Vehicular PKI Protocol for V2X Communications Security , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[33]  Riri Fitri Sari,et al.  Optimization of Random Access Channel in NB-IoT , 2018, IEEE Internet of Things Journal.

[34]  Victor C. M. Leung,et al.  Improving handover of 5G networks by network function virtualization and fog computing , 2017, 2017 IEEE/CIC International Conference on Communications in China (ICCC).

[35]  Yuefeng Ji,et al.  Blockchain-based trusted authentication in cloud radio over fiber network for 5G , 2017, 2017 16th International Conference on Optical Communications and Networks (ICOCN).

[36]  Hong Wen,et al.  5G security architecture and light weight security authentication , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).

[37]  Georges Kaddoum,et al.  Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets , 2018, 2018 IEEE International Conference on Communications (ICC).

[38]  James Gross,et al.  On the Impact of Feature-Based Physical Layer Authentication on Network Delay Performance , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[39]  Jari Arkko,et al.  A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[40]  Gaoxiang Zhang,et al.  Toward Secure Crowd Sensing in Vehicle-to-Everything Networks , 2018, IEEE Network.

[41]  Jianfeng Ma,et al.  An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy , 2017, J. Inf. Sci. Eng..

[42]  Zhiguo Ding,et al.  Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..

[43]  Xiaodong Lin,et al.  Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.

[44]  Mi Wen,et al.  Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks , 2016, IEEE Internet of Things Journal.

[45]  Jose Ordonez-Lucena,et al.  Network Slicing for 5G with SDN/NFV: Concepts, Architectures, and Challenges , 2017, IEEE Communications Magazine.

[46]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[47]  Qinglei Kong,et al.  Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks , 2017, IEEE Internet of Things Journal.

[48]  Xianbin Wang,et al.  Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer , 2016, 2016 IEEE International Conference on Communications (ICC).

[49]  Shantanu Sharma,et al.  A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..

[50]  Tony Q. S. Quek,et al.  GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks , 2017, IEEE Transactions on Information Forensics and Security.

[51]  Yinghui Zhang,et al.  Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice , 2018, J. Netw. Comput. Appl..

[52]  Bin Han,et al.  Network Slicing to Enable Scalability and Flexibility in 5G Mobile Networks , 2017, IEEE Communications Magazine.

[53]  Zhichao Cao,et al.  GeneWave: Fast authentication and key agreement on commodity mobile devices , 2017, 2017 IEEE 25th International Conference on Network Protocols (ICNP).

[54]  Peter Schneider,et al.  Providing strong 5G mobile network slice isolation for highly sensitive third-party services , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[55]  Sami Tabbane,et al.  A novel green handover self-optimization algorithm for LTE-A / 5G HetNets , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[56]  Ralf Sasse,et al.  A Formal Analysis of 5G Authentication , 2018, CCS.

[57]  Xiaodong Lin,et al.  Anonymous Group Message Authentication Protocol for LTE-based V2X Communications , 2018, Internet Technol. Lett..

[58]  Valtteri Niemi,et al.  UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications , 2017, Mob. Networks Appl..

[59]  Steve A. Schneider,et al.  Formal Analysis of V2X Revocation Protocols , 2017, STM.

[60]  Jin Cao,et al.  UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks , 2018, Secur. Commun. Networks.

[61]  Frank Barickman,et al.  Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO , 2018, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[62]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[63]  Jin Cao,et al.  GBAAM: group-based access authentication for MTC in LTE networks , 2015, Secur. Commun. Networks.

[64]  Hui Fang,et al.  Unified Security Architecture Research for 5G Wireless System , 2014, 2014 11th Web Information System and Application Conference.

[65]  Ilsun You,et al.  Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET , 2018, IEEE Access.

[66]  Jin Cao,et al.  GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[67]  Jin Cao,et al.  G2RHA:Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks , 2017, IEEE Transactions on Vehicular Technology.

[68]  Hung-Yu Wei,et al.  Bio-Inspired Proximity Discovery and Synchronization for D2D Communications , 2013, IEEE Communications Letters.

[69]  Kazi J. Ahmed,et al.  Secure LTE-Based V2X Service , 2018, IEEE Internet of Things Journal.

[70]  Kim-Kwang Raymond Choo,et al.  V2X security: A case study of anonymous authentication , 2017, Pervasive Mob. Comput..

[71]  Zheng Yan,et al.  Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications , 2018, IEEE Transactions on Industrial Informatics.

[72]  Xin Li,et al.  Network Slicing for 5G: Challenges and Opportunities , 2017, IEEE Internet Computing.

[73]  Vuk Marojevic C-V2X Security Requirements and Procedures: Survey and Research Directions , 2018, ArXiv.

[74]  Maode Ma,et al.  Fast and efficient physical layer authentication for 5G HetNet handover , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).

[75]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[76]  Xuemin Shen,et al.  LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[77]  Jin Cao,et al.  UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[78]  Yinghui Zhang,et al.  PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice , 2017, 2017 International Conference on Networking and Network Applications (NaNA).

[79]  Wolfgang Kiess,et al.  Service-Based Slice Selection Function for 5G , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[80]  Wei You,et al.  5G network slice security trust degree calculation model , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[81]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.