Javascript must be enabled to continue!
Authentication and Access Control for5G
View through CrossRef
AbstractThe fifth generation of mobile cellular networks, 5G, is designed to support a set of new use cases and requirements that affect every aspects of human life. Therefore, the security in 5G systems becomes more important than the security in any other pre‐5G networks. Authenticating users and controlling their access to network services is one of the first procedures to provide the security requirements of the system. Since 3G, the main authentication and access control procedures in cellular networks are based on Authentication and Key‐Agreement (AKA) protocols. In addition to study the weaknesses of the authentication and access control procedures in the pre‐5G networks, it is crucial to consider the 5G new use cases and requirements in designing authentication and access control mechanisms for 5G. In this article, we study the 5G network architecture considering the network functions involved in the authentication and access control processes. Then, we review the vulnerabilities of the 5G‐AKA protocol, which is the main authentication and access control mechanism in 5G. Finally, we study the new use cases in 5G and depict that they have different security requirements and consequently they need different authentication and access control mechanisms.
Title: Authentication and Access Control for5G
Description:
AbstractThe fifth generation of mobile cellular networks, 5G, is designed to support a set of new use cases and requirements that affect every aspects of human life.
Therefore, the security in 5G systems becomes more important than the security in any other pre‐5G networks.
Authenticating users and controlling their access to network services is one of the first procedures to provide the security requirements of the system.
Since 3G, the main authentication and access control procedures in cellular networks are based on Authentication and Key‐Agreement (AKA) protocols.
In addition to study the weaknesses of the authentication and access control procedures in the pre‐5G networks, it is crucial to consider the 5G new use cases and requirements in designing authentication and access control mechanisms for 5G.
In this article, we study the 5G network architecture considering the network functions involved in the authentication and access control processes.
Then, we review the vulnerabilities of the 5G‐AKA protocol, which is the main authentication and access control mechanism in 5G.
Finally, we study the new use cases in 5G and depict that they have different security requirements and consequently they need different authentication and access control mechanisms.
Related Results
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract
Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
Smart Chatbot for User Authentication
Smart Chatbot for User Authentication
Despite being the most widely used authentication mechanism, password-based authentication is not very secure, being easily guessed or brute-forced. To address this, many systems w...
E-Authentication System using QR Code and OTP
E-Authentication System using QR Code and OTP
This paper proposes an authentication system that combines One-Time Password (OTP) and Quick Response (QR) code technologies to enhance security and user experience. The system gen...
Enhancing Security Within Restricted Hospital Zones by Integrating Finger Vein Authentication
Enhancing Security Within Restricted Hospital Zones by Integrating Finger Vein Authentication
The integration of finger vein authentication technology to enhance security measures within restricted zones in hospital environments, is the aim of this project. An advanced biom...
BCDAIoD: An Efficient Blockchain-Based Cross-Domain Authentication Scheme for Internet of Drones
BCDAIoD: An Efficient Blockchain-Based Cross-Domain Authentication Scheme for Internet of Drones
During long-distance flight, unmanned aerial vehicles (UAVs) need to perform cross-domain authentication to prove their identity and receive information from the ground control sta...

